时间:2024-11-22 01:44:00 来源:网络整理编辑:探索
There's been a lot of talk about Russian hackers infiltrating the Democratic National Committee's se
There's been a lot of talk about Russian hackers infiltrating the Democratic National Committee's servers and then leaking sensitive emails via WikiLeaks.
The breach, which happened in June but was revealed this week, may sound like a high-level hacking plot by international spies that doesn't have anything to do with your personal cybersecurity. We are here to tell you, that is incorrect.
SEE ALSO:Hackers have found a way to turn WikiLeaks into a weaponIn times like this, it is good to remember Russia, or any government for that matter, could turn its attention to you -- if, for some reason, they decided you had some information they needed to obtain. Perhaps you work for an important company or you are the love child of a Soviet spy. Whatever the reason, it is a good time to consider your privacy online.
The attack on the DNC was investigated by cybersecurity firm CrowdStrike, which not only claimed the Russian government was behind the hack but also noted it was due to "spear phishing." And they are not referring to the sport.
Spear phishing is the term for when a hacker sends you an email that pretends to be from someone you trust, but is in fact a scammer. "The spear phisher thrives on familiarity. He knows your name, your email address, and at least a little about you," security firm, Norton, warned.
In other words, these scammers are getting smarter and they may be using you to get into your company's networks. So how do you prevent being the one that exposes your company to an attack? There are a few crucial things you can do.
Knowledge is power when dealing with hackers. Understanding a little about how hackers think will put you ahead of the pack when it comes to protecting yourself.
"Get educated on exactly what spear phishing is," Steve Morgan, Cybersecurity VenturesCEO and founder, said in an email toMashable. "First off, a spear phishing email has a spoofed (forged) address and appears to be coming from a trusted source -- for instance a co-worker or manager -- when in fact it is coming from a malicious person (hacker)."
In the case of the DNC attack, there were two groups that infiltrated the systems. The first group, codenamed "Cozy Bear" for no obvious reason, is known for its use of a spear phishing method that sends a person web links to programs which install themselves on your computer. These programs normally include sophisticated tools that allow the hacker to remotely access your computer, CrowdStrike's Dmitri Alperovitch wrote in a blog post.
The second group, "Fancy Bear," is a little more detailed in its approach. With groups using this method, you really need to be on the look out. Fancy Bear registers domain names that resemble ones of the legitimate organizations they plan to target, according to Alperovitch. The group then copies the look of the victim's email service and goes in for the kill.
"When it comes to phishing scams, attackers look to the emotional aspects of human decision making to execute their attacks."
"When it comes to phishing scams, attackers look to the emotional aspects of human decision-making to execute their attacks," a spokesperson from Norton Security told Mashable. "Cyber criminals will use social engineering as a method to try and get people to divulge sensitive information or install malicious malware onto their computers."
Social engineering includes hackers researching the victim by looking at their social media profiles and online activity to find out everything they can about them and the organization.
When you receive an email from someone who knows who you are, appears to be from your organization or is someone you trust and is asking for an urgent response, it is much easier to respond without paying much attention. This is their evil plan. Next thing, you are exposed.
Firstly, don't have your cat's name, your mum's home and your friend's engagement splashed all over Facebook. Try and keep as much private as you can, especially when signing up to websites. It can all be pieced together to make an in-depth profile of who you are, where you live, who you are friends with and what you do. If you want to freak yourself out over your social media sharing, a visit to TakeThisLollipop.com should do the trick.
To check how vigilant you have been, do a Google search of yourself and see what you can find. Terrifying.
Passwords can not be the same for multiple sites. They should also be super difficult and preferably not contain the word "password." Use a program such as LastPass or any of these brilliant tools to generate and store the most difficult passwords you can imagine.
If you can remember it, it can probably be easily hacked. Throw in a couple of exclamation points for good measure.
You should also turn on two-step authentication. Even though it's the most annoying thing on Earth, think of the security it brings. Google made it a little bit easier recently by adding a one-click verification option. For instructions on getting it set up, check out this link.
If your friend or brother's cousin is asking you to wire transfer them money via email, alarm bells should go off. That is the most obvious example, though, and the people doing the phishing at the level of the DNC attacks are way more sophisticated than that.
Be on the lookout for anything suspicious in an email. If your friend is writing in a slightly different tone, give them a call or a text to check it is them. The same goes for dealing with organizations you are familiar with. If you aren't expecting an email, be cautious about downloading attachments.
In other words: be alert, all the time.
Human error is responsible for 95 percent of all security issues, according to IBM, so companies should step up and train their staff to be alert for phishing attacks. It's not all your fault.
"Human error is in fact simply a lack of security awareness training when it comes to hacks and data breaches."
"Human error is in fact simply a lack of security awareness training when it comes to hacks and data breaches. Users are careless and make mistakes because they have no idea what to be on guard for," Morgan said.
Organizations can also block emails from strange sources with email authentication, according to Alexander Garcia-Tobar, the CEO of email security company ValiMail, which allows a company to control who sends email using their identity.
"With email authentication properly in place these spoofed emails are blocked before end users ever see them," Garcia-Tobar explained. "Therefore, no clever con artist has the opportunity to trick well-meaning employees into giving away the company's money or secrets."
(He also noted that, according to his company's tests, the emailing domains for the RNC, DNC and Donald Trump's campaign were "wide open to phishing," while Hillaryclinton.com was protected.)
He believes that because so many threats are hard to spot with the naked eye, companies need to take responsibility for their security and not rely on humans. "Rather than attempting to train employees to detect the undetectable, companies need to eliminate these attacks in the first place with a strong email authentication system," he said.
Not exactly -- unless you work for a government agency -- but one thing Fancy and Cozy Bear have done is help raise awareness for these kinds of attacks.
"The main takeaway should be that Cozy Bear and Fancy Bear -- which are hacking groups affiliated with (and potentially sponsored by) Russian intelligence agencies aimed at political and financial espionage -- have been around for years," Morgan said.
"Unfortunately it takes a high-profile cyberattack to get the public's attention -- which is exactly what's happening with the DNC hack ... To be clear, these are not the only 'Russian Bears' the U.S. should be concerned with."
If that last sentence doesn't terrify you into being vigilant online, nothing will.
Have something to add to this story? Share it in the comments.
TopicsCybersecurity
Nancy Pelosi warns colleagues after info hacked2024-11-22 01:11
第二屆克拉瑪依編劇節再聚編劇“核力”—“為中國編劇原創加油!”2024-11-22 00:57
白月光秦嵐 戲裏風格多變 戲外溫柔如一2024-11-22 00:52
TOMMY HILFIGER X 天貓超級品牌日 大牌新品首秀開啟“即看即買”模式2024-11-22 00:41
Nate Parker is finally thinking about the woman who accused him of rape2024-11-22 00:29
短視頻演繹城市人文 ,微視講述老城新故事2024-11-22 00:21
荔枝主播亮相南京 ,“梨苑聲音之夜”大放異彩2024-11-22 00:20
買條gai國潮一姐阿紅老師空降西湖 ,迷倒男女老少中外遊人2024-11-21 23:59
PlayStation Now game streaming is coming to PC2024-11-21 23:45
2018武漢時裝周倒計時24小時,我們在幹什麽 ?2024-11-21 23:07
Airbnb activates disaster response site for Louisiana flooding2024-11-22 01:42
2018全民星歌聲城市賽圓滿收官 南北爭霸賽即將打響2024-11-22 01:20
法恩莎少女10強誕生 ,星級培訓即將啟航2024-11-22 01:15
2018世界亞裔小姐選美大賽中國總決賽在京完美落幕2024-11-22 01:00
Carlos Beltran made a very interesting hair choice2024-11-22 00:47
2018武漢時裝周倒計時24小時 ,我們在幹什麽?2024-11-22 00:40
灘塗地上的奇跡 PP視頻《尋味中國》揭秘海紅香米生長的奧秘2024-11-22 00:13
心係天下三星W2019新品無錫發布 十年匠心堅守2024-11-21 23:42
Fake news reports from the Newseum are infinitely better than actual news2024-11-21 23:17
易烊千璽18歲生日萬千寵愛回來了 未成年組合TFBOYS全體成年2024-11-21 23:07