What Hackers Do with Theft Data
*Information theft:*
There are some cyber threats been raised day-by-day in this cyber world!
This post helps you know about some major cyber threat, and keeps you away from those threat!
One of those threat is *Information theft!*
*_Information theft:_*
Information theft is nothing but a information of someone got stealed by attackers (hackers)!
Here the information which is someone’s personal data!
You already know what I am convey to you! Yeah it’s your Name, email address, Date Of Birth, Contact Number, security questions sometimes the encrypted password too..
This threat can also be called as Identity theft.
_*What they do with your Identity:*_
Hackers uses this personal data for his own personal benefit!
Hacker uses this personal data for his planned cyber attack.
So if police traces the guy who done cyber attack then, there victim will only be caught still hacker is in safe zone!
_*Is it good idea to be using someone’s identity of personal data?*_
Well, Yes!
Its better to mask your identity by using someone’s identity!
You may thought that,
*What can he do with your email address?*
*What can he do after connecting with your mobile number?*
Let me explain the first one ,
a guy (data broker) name called mark, comes from an organisation of somewhat, he talks about their organisation , tricks you and ask your email address and phone number for providing their better service to you!
At that time, you gave your email address/phone number, right?
Don’t you?
By having the email address, he can easily find what platform the email address been hosted like Gmail, Yahoo! They started trying brute-force or spam email via phishing with social engineering and got your passwords! (If your password is weak then it will easy for a hacker to access your accounts)
And once he got access to your mail, he knows your personal data which you registered for your mail account!
And he tries the other websites with your accounts and steal other accounts too!
This all happens only when you have a weak password and progress blindly of every URL links which is on your inbox!
Now the second one, once he got your phone or mobile number after social engineering the internet service provider(airtel), he tries to steal your other accounts which you registered by this mobile number!
While trying to access your accounts, You can also get the OTP when the user activates the two-factor authentication for his account.
Otherwise you can also pretending to act like a victim and chat with his friends on any social media and gathering his personal information which he sets as a security question for his account!
And now it’s very easy to access your accounts for a hacker and he can use that for his own personal benefit!
This may happens when he doesn’t protect his phone with some password protection while in public!
_*How it been done?*_
Cyber attackers steals this personal data via malware ,social engineering, open WiFi networks, dustbin (carbon copies)
*_Malware_* is an malicious software, which is installed once on your computer or any device, it will be controlled remotely by running commands!
So hacker can steal your information remotely by running commands!
When a computer system gets compromised, sensitive details of the user such as browsing habits, banking credentials, contact details, etc. are collected by spyware in the background.
_*Social engineering*_ is also have successful attack rate for Identity theft!
Many complex methods are there but the goal remains the same!
Here the identity can be stealed by someone who is trying to trick you into giving up sensitive information about yourself!
They are called data brokers! They take your data from yourself and sell it in darkweb to hackers!
Considering _*Open Wifi networks*_, once he got your network by using FAP (Fake access point), he capture the data packets ( from your network!
Last one is _*dustbin*_, yeah you may throw some carbon copies containing some personal information on it, which is also helps a hacker to use on cyber attack!
_*Prevention:*_
๐Don’t write your passwords on some paper.
๐Keep your devices with password protected.
๐Have a good antivirus like Malwarebytes to detect Malware.
๐Use a strong password for better protection of your accounts.
๐Don’t browse with open network(open wifi in public).
๐Don’t share your valuable information to strangers who act like legit!
_Article by_
*PRABHAT TECHVISION*
Cyber Expert ๐
There are some cyber threats been raised day-by-day in this cyber world!
This post helps you know about some major cyber threat, and keeps you away from those threat!
One of those threat is *Information theft!*
*_Information theft:_*
Information theft is nothing but a information of someone got stealed by attackers (hackers)!
Here the information which is someone’s personal data!
You already know what I am convey to you! Yeah it’s your Name, email address, Date Of Birth, Contact Number, security questions sometimes the encrypted password too..
This threat can also be called as Identity theft.
_*What they do with your Identity:*_
Hackers uses this personal data for his own personal benefit!
Hacker uses this personal data for his planned cyber attack.
So if police traces the guy who done cyber attack then, there victim will only be caught still hacker is in safe zone!
_*Is it good idea to be using someone’s identity of personal data?*_
Well, Yes!
Its better to mask your identity by using someone’s identity!
You may thought that,
*What can he do with your email address?*
*What can he do after connecting with your mobile number?*
Let me explain the first one ,
a guy (data broker) name called mark, comes from an organisation of somewhat, he talks about their organisation , tricks you and ask your email address and phone number for providing their better service to you!
At that time, you gave your email address/phone number, right?
Don’t you?
By having the email address, he can easily find what platform the email address been hosted like Gmail, Yahoo! They started trying brute-force or spam email via phishing with social engineering and got your passwords! (If your password is weak then it will easy for a hacker to access your accounts)
And once he got access to your mail, he knows your personal data which you registered for your mail account!
And he tries the other websites with your accounts and steal other accounts too!
This all happens only when you have a weak password and progress blindly of every URL links which is on your inbox!
Now the second one, once he got your phone or mobile number after social engineering the internet service provider(airtel), he tries to steal your other accounts which you registered by this mobile number!
While trying to access your accounts, You can also get the OTP when the user activates the two-factor authentication for his account.
Otherwise you can also pretending to act like a victim and chat with his friends on any social media and gathering his personal information which he sets as a security question for his account!
And now it’s very easy to access your accounts for a hacker and he can use that for his own personal benefit!
This may happens when he doesn’t protect his phone with some password protection while in public!
_*How it been done?*_
Cyber attackers steals this personal data via malware ,social engineering, open WiFi networks, dustbin (carbon copies)
*_Malware_* is an malicious software, which is installed once on your computer or any device, it will be controlled remotely by running commands!
So hacker can steal your information remotely by running commands!
When a computer system gets compromised, sensitive details of the user such as browsing habits, banking credentials, contact details, etc. are collected by spyware in the background.
_*Social engineering*_ is also have successful attack rate for Identity theft!
Many complex methods are there but the goal remains the same!
Here the identity can be stealed by someone who is trying to trick you into giving up sensitive information about yourself!
They are called data brokers! They take your data from yourself and sell it in darkweb to hackers!
Considering _*Open Wifi networks*_, once he got your network by using FAP (Fake access point), he capture the data packets ( from your network!
Last one is _*dustbin*_, yeah you may throw some carbon copies containing some personal information on it, which is also helps a hacker to use on cyber attack!
_*Prevention:*_
๐Don’t write your passwords on some paper.
๐Keep your devices with password protected.
๐Have a good antivirus like Malwarebytes to detect Malware.
๐Use a strong password for better protection of your accounts.
๐Don’t browse with open network(open wifi in public).
๐Don’t share your valuable information to strangers who act like legit!
_Article by_
*PRABHAT TECHVISION*
Cyber Expert ๐
Comments
Post a Comment