Uncategorized

How you can be Hacked – Prajjwal Srivastava



How you can be HACKED

Are we secure? This question can ignite multiple debates but the harsh reality is that our technology is not smart enough to predict future. We humans have a capability to modify ourselves and update us time to time but we ignore the mistakes of past and we also don’t accept the present reality which makes us more vulnerable. And Hackers only want your vulnerabilities to exploit you.
Here are some most famous attacks which can exploit your inner peace.

By Phishing

Phishing is the easiest but crucial part of social engineering. Phishing is often used to gain access in corporate or governmental networks and steal user data including login credentials and credits card numbers. It occurs when an attacker, masquerading as a trusted entity and send victim a malicious link to gain private credentials of the organizations.
The Ukrainian Power Grid Attack
(famous phishing attack)
In December 2015, an attack shocked cyber security researcher as an Ukrainian Power Grid was shut down by a firmware. This was the second time when any malicious firmware was developed specifically for the purpose to destroy physical machinery. Unlike the STUXNET used by U.S. and Israel to shutdown Iranian Nuclear plant in 2009 it was done by an E-mail Phishing. It was also the first to use automated scalable malicious firmware updates so that a small team could disable multiple sites at the same time. It was custom-coded malicious firmware for electrical power station nodes means that once cyber criminal gain access to a network they can potentially override anything on it – from printers and refrigerators to aeroplanes and airport command towers.

By Virus

As like biological viruses, computer viruses are the new and considerable threat to IoTs. They are the type of programs specially made to restricts users to use their computer services.
The first ever virus (worm) was created by Alvi Brothers in January 1986 by just modifying a floppy disk containing computer instructions that were executed when the computer was first turned on. The instructions were set to replicate and make a copy of itself on the other floppy disks when we insert it in our computer, but Brain virus was not potentially harmful and was instructed only to replicate itself. But it was just a start of a new world.
STUXNET
(famous virus attack)
Stuxnet was the most horrifying virus of all time. It was built by the government of U.S. and Israel with the intension of obstructing NUKES from being built in Iran.
It was spread by USB thumb drive and targeted software controlling a facility in Iran that held Uranium. The virus was so effective that it caused their centrifuges to self-destruct, setting Iran’s Nuclear development back and costing millions of dollars.
Stuxnet was the first step to start cyber war.
Carding
Now days, Carding is one of the most popular attacks in which attackers tricks victims to gain access to their bank accounts either by phishing or directly exploiting to their vulnerabilities by their computers devices and sell it on the web that is not access by regular visitors.
“BrainsClubs” one of the largest underground market store for buying stolen credit or debit cards data recently got Hacked. The data stolen from BrainsClub encompasses more than 26 million credit and debit cards records taken from hacked online retailers over the past years.
So we will ask the same question again Are you safe enough..??
Are you curious about Ransomware?

Leave a Reply

Your email address will not be published.