programming4us
programming4us
SECURITY

The Hacked Man (Part 2) - Digital gold: passwords and mail addresses

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Digital gold: passwords and mail addresses

Hackers who struck gold in the hunt for user accounts hold the most valuable digital product in their hands: passwords. These passwords are not just keys to unlimited data from the personal accounts of the victims. In many cases they also open doors to more user accounts: Google, Amazon, PayPal, mail services and many more.

Description: Attackers can actually hack user accounts by using authentic password-crackers like this one.

Attackers can actually hack user accounts by using authentic password-crackers like this one.

Various surveys undertaken in the last few years show that more than half of web users use the same password for several (¡f not all) of their user accounts. A single password can be worth up to $200, contrary to the value in cents of pure, unadulterated personal user data. This was revealed in the process of a court battle between two Kuwaiti Billionaires, wherein one of them instructed the Chinese hacker group, "Invisible Hacking Group", to crack open the password of the other.

This business-related case shows that Social Hacking threatens not just the private user, but also into other areas. This is also claimed in a recently published study by the security service provider Imperva. This study perceives companies and government organisations as the ones fuelling such attacks. There can also be a threat to human lives if, for example, details of planned military operations are inadvertently revealed in the open on the social networks.

Description: Social Hacking is so popular that many of its rip-offs also exist, used by the hacker to fool people.

Social Hacking is so popular that many of its rip-offs also exist, used by the hacker to fool people.

This happened in an Israeli military mission in March 2010. The mission had to be called off when a soldier divulged the time and place of the mission by an update on Facebook. It sparked fears within the military of a possible counter-attack triggered by this information.

Similarly, it can pose a problem for companies when an employee publishes internal details on his personal profile on social networks. It can be information related to the personnel structure, when his official position in the company is posted on the network (or even on career related networks like Xing). Information from closed user groups on Facebook which are used by companies as discussion platforms can also be the target. Such data can rarely be of real value, particularly on the black market. But it can be the basis for further and more Social Engineering attacks with a higher potential of causing harm.

When the hacker gains control of a user profile, he or she can use this identity to attack more users - without using a password bypass at all! The security loophole that the hacker makes use of is the implicit trust of the user and the gullibility of other users, either known or unknown. The biggest strength of Facebook, according to the hackers, now reveals itself here: whoever sees a link or video posted on Facebook, does not, as a rule, think about where it has originated from.

The Bait: "Like" buttons

Symantec's security expert Stefan Wesche says that "Like- baiting" is the prevailing, most employed method. The hacker sends links as baits in the form of posts, chat or direct notifications under the assumed identity of the hacked user. These links refer users mostly to fan pages which, for example, promise users a gif: voucher upon becoming a "fan" of that page. The coupon can be provided simply by clicking on the "Like" button. That is followed by a survey to be taken by the user through which provides the hacker with more personal information about the user. This enables the hacker to make more money. "That's because, as an intermediary, the hacker earns a commission from anywhere between 20 cents to $50, depending on the amount of the information and its scope. This commission is paid by the survey provider", says Stefan Wesche. Social networks are also very lucrative for blackmailers.

The unrestricted behaviour of users on the social network is very gainful for blackmailers! In February, a US student was threatened by an alleged Facebook friend from England. He threatened to publish a private video of the victim if he was not paid $500. In another case, a Californian man has racked the email passwords of hundreds of women. What helped him was the "forgotten password" function of email services wherein he could answer the security questions with the helpful information from the victim's Facebook profiles (like the favourite colour or the second name of the father). He blackmailed some women with the photos found in the email accounts, partially naked photos, or directly mailed these photos to the email contacts of the victims. This hacker also used some mail addresses to reset the Facebook password and hijack these accounts.

Hackers who are active on Facebook under the victims' identities enjoy a great benefit which was not available in Social Engineering before the advent of Facebook. Earlier, such attacks took place over telephone calls using false names.

Description: Hackers who are active on Facebook under the victims' identities enjoy a great benefit which was not available in Social Engineering before the advent of Facebook

Hackers who are active on Facebook under the victims' identities enjoy a great benefit which was not available in Social Engineering before the advent of Facebook

The hacker had to react in real time, had to have a convincing story which he had to convey without the slightest bit of hesitation. On the other hand, Facebook enables him to take more time to react to notifications or chat at his own leisure. He utilises this time to investigate deeper into the victim's personal information and think up a good answer. Stefan Schumacher says, "This asynchronism in communication is one of the biggest advantages available to hackers on Facebook".

Given these conditions, Facebook shall remain a much preferred target of hackers even in the future - with newer attack strategies. Schumacher says that Spear-phishing can be the next step. Spear-phishing are targeted phishing attacks - based on psychological profiles - which will be automatically drawn up on from Facebook. Facebook has set up a team of around 300 security engineers and an analysis system which will supervise the network against these attacks. For this purpose, Facebook collaborated with security firms McAfee, Sophos, Symantec and Trend Micro at the end of April this year to effectively filter such dangerous links. However, each person can, on his own, cover these security loopholes with disciplined user behaviour, and by nursing a healthy distrust towards contents and people on the social networks.   

Other  
  •  Implementing Security in Windows 7 : Set the Junk E-mail Protection Level
  •  Implementing Security in Windows 7 : Delete Your Browsing History
  •  Web Security : Attacking AJAX - Checking for Cross-Domain Access, Reading Private Data via JSON Hijacking
  •  Web Security : Attacking AJAX - Subverting AJAX with Injected XML, Subverting AJAX with Injected JSON
  •  .NET Security : Programming the Event Log Service (part 3) - Using Custom Event Logs, Monitoring Event Logs
  •  .NET Security : Programming the Event Log Service (part 2) - Reading Event Logs, Writing Events
  •  .NET Security : Programming the Event Log Service (part 1) - Querying the Event Log System, Using Event Sources
  •  .NET Security : The Event Log Service Explained
  •  Web Security : Attacking AJAX - Intercepting and Modifying Server Responses, Subverting AJAX with Injected Data
  •  Web Security : Attacking AJAX - Intercepting and Modifying AJAX Requests
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us