Hackers use social engineering skills to trick users into clicking on malicious content, thereby gaining access to personal data. Though many computer literates think they are not susceptible to social engineering or other cyber-attacks, truth is that majority of the intelligent are vulnerable.
There are three types of hackers (a) Black hat – Steals valuable information for malicious reasons. (b) White hat – They strive to improve the security of an organisation’s security systems. (c) Grey hat – Hacker sometimes violate laws ethical standards but does not have malicious intent.
Categories of hackers
* Bank robber – Sole purpose to steal money
* Nation/State – Creates malicious back doors for cyber warfare purposes
* Professional hacking group for hire – Expert hackers develop malware to steal for a fee
* Rogue gamer – Specialised hackers for the gaming industry
* Crypto Jackers – For mining cryptocurrencies
* Hacktivists – Political or corporate propaganda
* Botnet masters – Create bots for command-and-control (C&C) servers
* Adware spammer – Redirecting your browser to an alternate site
* Thrill hacker – Sole Motive to break laws of the land.
* Accidental hacker – Has no intention to hack unethically, just do for testing.
Zero-click attack
Technology moved on from regular phishing to spear-phishing methods where scammers used to send text links or messages, leading to a malware installation in your gadgets, while a zero-click attack helps spyware/malware to gain control over a device without any human interaction. These attacks are hard to detect given their nature, they function only when the system is idle and it becomes more challenging because, in encrypted environments, there is zero visibility on the data packets used while sending or receiving.
Spot the unusual behaviour
* You get ransomware messages asking for bitcoins
* Unwanted toolbars on the browser
* Internet searches are redirected
* Phone turns on/off by itself.
* Phone/social media accounts get random popups
* Friends receive invitations/ recommendations that you didn’t send
* Unexpected software installations on your devices
* Task Manager, Anti-Virus Software or Registry Editor is disabled
* Money deducted from your account
* Online subscriptions made without your intervention
* You observe strange network/data traffic patterns
* End-to-end encrypted Messengers – Information will be transmitted using a secret code rather than insecure plain text
* Child Protection – Enable Parental Control, Safe Search, and Play It Safe features on children’s gadgets
* Storage – Never use public storage for private information; use legitimate cloud locations
* Antivirus / Malware – Use Original antivirus/malware software
* Charging – Never charge your phones in public places; You can become victim to phishing/juice jacking
* QR Code – Never Scan QR Code, unless you are sure what it is meant for
Stay Tuned to Cyber Talk to know more on internet ethics and digital wellness brought to you by Anil Rachamalla, End Now Foundation, www.endnowfoundation.org