Monday, December 17, 2012

HAKMAGEDON:
HACKER ATTACKS SPRINGING UP LIKE MUSHROOMS AFTER RAIN
Written by, Lidiya Belcheva and Mihail Mihov, ICM3A


    source: Phandroid.com

Who would have thought that Sony may become the victim of a hacker attack, and affect about 100 million people? Or will ever have a virus for Apple? Such things happen in the wonderful world of technology in which we live. If you are not impressed, let me remind you - in the last two months groups like Anonymous and Lulz Security managed to break the defenses of some of the most famous companies in the world and to obtain data and information on many, many users (Press, 2012). And now, the last once are standing in nervous anticipation of what could be the consequences of this fact. The answer is: not pretty.

According to official data from the International Cyber Security Protection Alliance (ICSPA), each year over 475,000 people become victims of cybercrime. In fact, the victims are much more, since not all were registered complaints (About, 2012).

How to prevent cybercrime in today's hectic times is a matter that concerns all of us?
How do we know that our personal information will fall into the wrong hands? Many questions and answers are very difficult to answer.

Cybercrime opportunities are almost limitless, as it is cyberspace. The cybercriminals are actively using the tactic of "precision strikes", which is to intentionally attack certain companies to steal confidential data and financial information.

Cybercriminals continue to inflict major blows, using new methods. Here are some of them:



USB STICK, THAT’S OK, BUT HOW SECURE?

The USB flash memory sticks have become bigger and bigger “friend” with the hackers. You cannot be sure if the information you own is going to be safe for long if you plug your FlashDrive inside a computer that contains valuable information. Hackers use this type of devices as a “bridge” between them and your information mainly because you feel comfortable with it and you cannot suspect that it can contain any viruses and warms (Cluley, 2010).

Typical for that malware is that, it starts automatically when the flash memory is placed in the USB port on your computer, while the AutoRun function of your operation system is not disabled. According to the analysis of experts from the computer security giant, McAfee in the first quarter of 2012 this type digital infections are on third place for computer threat (Mostyn-Brown, 2012).
                                                                                        
You have to bear in mind the two main ways that you can acquire insecure or infected Flash drive:

1.       If you transfer infected fail from internet to your flash drive;

2.      Recently the hackers founded really creative way to distribute infected USBs via the employees of the large companies that they are targeting. The way it works may be, by “accidently” dropping a USB stick on the parking of the company. Then it being found by an unsuspected worker, he will plug it in a computer that is connected to the corporate system… and that’s it. The hackers have direct inside access to the files of your company (Manjoo, 2010).

Tip: Always scan the USB flash drive via antivirus program before to access it.  

Do not be naive and if you find a USB on the parking lot, just leave it on there. J


E-MAIL PHISHING… DON’T BE A DUMMY!

The first thing that you have to know about the security of your email is that: Free e-mail services are not designed for security! Hackers can crack most email passwords in a minute via the illegal activity called”Phishing”. 

E-mail phishing and fraudulent links. How does “phishing” look like?

Phishing e-mails are used for steal your identity through the Internet - usernames, passwords, bank accounts, addresses, emails, files, documents, information etc. In most cases they want from you to enter your personal information or they want you to access direct links to websites. If you do that, you are becoming a victim of phishing.

Email phishing have many different forms (Mills, 2010):

·         They can look like e-mails sent from your bank or other financial institution, from a company that you have regular business relations with, your Internet service provider or even from the site of the social network that you are using.

·         They can be disguised as letters from someone you know. This is called "spear phishing". Those letters used to form a unified form of mass messages from a company that the victim knows well, institutions or sites like eBay and PayPal. The sender can be someone who is working in the organization or generally a person whose job involves relations with customers or employees.

·         Phishing emails may contain the official logos or other distinctive signs that are taken directly from legitimate websites! It can also contain compelling information relating to you that the scammers found on social networks (Mills, 2010).

·         Another very significant feature of the phishing e-mail-it is that it may contain references to fake websites. Those websites look like the original once, but they differ in logo colors or misspelling of the name. For instance, a shopper might accidentally land on the domain, wallmatt.com, as opposed to the big-box retailer's actual walmart.com (Anglen, 2011). After your first appearance there, they immediately ask you to enter some personal information.

Tip: Don’t use your e-mail for confidential information carrier and change your password regularly ones a month. Try to make it as difficult as possible via using combinations of capital letters and numbers.

Don’t download the attached files from suspicious emails and also don’t load the links inside them.      

       

ANTI-SOCIAL MEDIA

Security in the social media channels. That sounds like an oxymoron. Big part of our lives is happening in the social networks right now. We are communicating trough them and sharing personal information freely. However, recently, the social networking has become the tool for stealing personal information. Communicating via such networks is fast and preferred method, but, of course, carries risks that most of the people won’t even think of. The level of security inside the social media networks is presented by aNewDomain.net, which is an info-graphics showing the opinions, views and expectations of the users, regarding the safety of their personal information (Smith, 2012).

You can no longer trust anyone (well, almost no one)

 2/3 of people do not believe in campaigns that are taking place on Facebook, even though they use the platform daily. The reason for this is the fear of abuse and fraud that the users are undergoing. The number of consumers that thinks they are victims of hacker attacks in those platforms is gradually increasing.



A small percentage of the people know how to protect themselves and their personal data in the social networks.

The users of Social networks are hungry for more control over their own shared information. The social networks must take use of the advantage that they have and to enhance their effectiveness. This can be done by allowing the users to have more control over their own information. 61% of them are willing to give away more info, if they can control who can see what they shared (Smith, 2012).



Social media is really useful and comfortable for the hackers. They can select from a variety of scanning tools by which they can easily screen your keywords, and mostly names of banks, mobile operators and other organizations close to their “victim”. Trout social media, hackers provide themselves with the materials that they need for designing their way into the organization that they are targeting (Roos, 2012).

Tip: Always consider the information that you are sharing on your profile and don’t give away too much.

Be aware of what terms and conditions you are accepting.


Wi-Fi

Another widespread method of stealing personal details is the insecure collection of data over wireless networks, particularly Wi-Fi. Currently, many cafes, restaurants and other public places offer free Internet access, which is often not password-protected or encrypted. This means that anyone can use the network that you are using. At the same time capture and analysis the personal information via such networks is a relatively easy task for the hackers.

"O + K Research" found that 46% of the Smartphone users and 48% of the tablet owners use unsecured public wireless networks. 29% of the owners of portable computers are also using free Wi-Fi access. Furthermore, nearly half of respondents of the survey are using these networks daily or at least 2-3 times a week (Kaspersky, 2012).

This rather disturbing statistics validate clearly that consumers underestimate the dangers of the free Wi-Fi access. As for wireless networks, the threat of interception of data can be avoided very easily by using only protected areas with wireless internet access.

Personal data protection requires not only standard anti-malware software but also an integrated solution that combines protection of both, data exchange over the Internet and encryption of financial transactions ( Market Moose, 2011).

The so-called hot-spot hackers prefer places with large concentration of business people, mainly foreigners (e.g. airports, the cafes of the international business centers). They prefer exactly those areas because people there tend to connect to free hot-spot networks, in order to avoid the high roaming tariffs. Hotspot hackers are more likely to “hunt” for credit cards details, rather than corporate secrets (Garcia, 2012)

Tips: It is always better to pay for a secure hotspot, rather than joining the free one.

Never ignore the warnings of the anti-virus system, regarding to your internet connection.


NOT SO SMARTPHONE

As much useful they are, the more dangerous Smartphones and tablets have become. The latest trends among cybercriminals hacking have become exactly those high-tech gadgets. The attacks on Smartphones and tablets, the devices through which we already do everything - talking on the phone, send and receive emails, pay our bills - have become the latest modern crimes in the currently online crime (Micro, 2012). Phones are attacked, by being installed with bugged software. It is only enough an infected e-mail, to be sent and you not knowing what exactly is it, to activate it. Another way is through a short message on Skype or Facebook. We know how only weeks ago the media was booming with news about the thousands of stolen Facebook profiles (Paganini, 2012).

For the past year, the number of malicious programs for mobile devices grew 10 times, according to security company G Data Software. In the second half of 2011 new threats to Smartphones and tablets have increased 2.5 times. Especially interesting for cybercriminals devices are Android - their growth is 8 times (Micro, 2012).

According to “O+K Research”, 35% of tablet owners use these devices to store correspondence related to work, 20% of respondents store data required for remote access to the company LAN (Kapersky, 2012).

Around 19% of Smartphone users store passwords of the official server for storing email on their Smartphone’s memory. About 14% of the data stored on these devices, include user names and passwords for remote access virtual private network (VPN). In case of contamination, the loss or theft of these devices, the information will be valuable prey in the hands of scammers and other criminals (Kaspersky, 2012).

For companies it is important to control the use of personal devices for work purposes only. This may require applying a single corporate security policy and using appropriate security solutions. Consumers should also consider protecting both personal and official data on their mobile phones.

Tip:     Set up a PIN number on your mobile.

Be careful of what you download from the App Stores.


THE FENCED GARDEN OF APPLE

Over the next 10 years, the IT environment is expected to deteriorate as the attacks will continue to increase and target a wider range of platforms (Schwab, 2012).

An example is the considered to be an impenetrable Mac OS X from Apple. It appeared Apple is one fenced garden, guarded only by his company founder, in which case hackers can easily go over the hedge. The problem for users of the platform's most successful IT Company in recent years is that they have no real safeguards (James, 2012). Moreover, bugs are spreading really fast, i.e. writing viruses for Mac OS is already one profitable business. Yes, business, and a very profitable one. Because cybercriminals act like any normal company – they calculate whether it is worth working on a leak, how much revenue can this bring them, and if it is worth, they ACT (Kosner, 2012).

Obviously they are successful, because the first Trojan for OS Apple Mac Defender managed to infect more than 120 thousand computers, and the company was forced to release a "patch" for the operating system with which to protect consumers. They, themselves have bigger problems - after a lifetime being admonished that there is nothing to worry about - no viruses for Mac, now this comes as a shock for Apple (Palis, 2012). There is no doubt that there will be another similar malware against the platform. And while this time are affected 120 thousand people (who have even provided information about their credit card on the software), the following can be much more (Keizer, 2011).
                             

Tip: Download apps from recognized sources only, such as Apple's App Store, Google's Android Market and Amazon's App Store…


THE BOTTOM LINE

The vast and fast spreading of cybercrime during the ages has even lead countries to take measures on dealing with this problem. Security agencies and companies in the field of information security laid the foundations of the International Cyber Security Protection Alliance (ICSPA) for protection from hacker attacks, in London. This new structure aims is to fight cybercrime globally (About Section , 2012)

The organization members are governments, international business associations and law enforcement agencies, including Europol. Among the members of the alliance are companies like McAfee and Trend Micro (About, 2012).

British Prime Minister David Cameron expressed his approval. He announced that the government has already invested 650 million pounds to improve national infrastructure and providing protection against cybercrime (Rutt, 2011).

"Cybercrime is a global problem and to deal with it, we need a strong partnership between the public and private sectors." commented the British government.
Cameron does believe that the nature of this type of crime requires international cooperation in combating. Among the objectives of the structure is to improve national legislation and the ability to fight "unprecedented threat". The European Union and several foreign governments will fund the new body (Rutt, 2011).

One of the main activities of the new organization will be providing particular assistance to countries that need it most - as China (Shea, 2012).

And finally, now talking about more serious measures against hackers- The EU wants at least five years in prison for computer crimes and a proven unified strategy for preventing such crimes on a European level. U.S. also pays more attention to the problem, but the issue is that the weakest link remains the user (Masnick, 2012). By means, the one who does not know where to click, what to look at and with what he will be infected. And as proved the case with IMF - that's more than enough (Haris, 2011). 


CAUSE AND EFFECT

If I have to summarize all the threats, they move into two directions. One of them is, of course, social networks, where users are slightly more trusting than they should. At least those networks are supposed to only for friends. Is this true- well nobody can guarantee this, but still. Second leading trend are the mobile phones, which in most cases have access to very sensitive both company and personal level of information. And the attacks against them are really, really just in their beginning.


Bibliography


Market Moose. (2011, Nov 11). 3 Rules of Using Free Public Wi-Fi to Prevent Session Hacking of Your Laptop or Other Device. Retrieved Dec 14, 2012, from Market Moose : http://marketmoose.com/2011/11/3-rules-of-using-free-public-wi-fi-to-prevent-session-hacking-of-your-laptop-or-other-device/

About. (2012). Who we are? Retrieved Dec 15, 2012, from The International Cyber Security Protection Alliance: https://www.icspa.org/

Anglen, R. (2011, Dec 26). Misspelled websites aim to steal information. Retrieved dEC 14, 2012, from USA Today, Tech: http://usatoday30.usatoday.com/tech/news/story/2011-12-26/typosquatting/52229886/1

Cluley, G. (2010, jan 5). Flash drive manufacturers warn: Hackers can decrypt 'secure' USB sticks. Retrieved Dec 14, 2012, from NakedSecurity : http://erratasec.blogspot.com/2008/01/hacking-flash-memory.html

Garcia, A. (2012, Nov 18). Hacking Easy at Free Public Wi-Fi Spots. Retrieved Dec 05, 2012, from NBC: http://www.nbclosangeles.com/news/tech/Free-Public-Wi-Fi-Privacy-Hacking-133976113.html

Haris, M. (2011, June 12). Pirates of the document e-mail hacking IMF. Retrieved Dec 14, 2012, from All voices: http://www.allvoices.com/contributed-news/9370398-pirates-of-the-document-email-hacking-imf

James, C. (2012, Nov). Our beloved Macs and the hidden costs of cybercrime. Retrieved Dec 14, 2012, from Cynthia James on Cybercrime: http://cjonsecurity.com/cj-security/our-beloved-macs/

Kaspersky. (2012, May 22). Number of the week: 32% of users have connected infected storage devices to their computers . Retrieved Dec 10, 2012, from Kaspersky: http://www.kaspersky.com/about/news/virus/2012/Number_of_the_week_32_of_users_have_connected_infected_storage_devices_to_their_computers

Keizer, G. (2011, Sept 28). Cyber criminals hack Macs. Retrieved Dec 14, 2012, from Computerworld UK: http://www.computerworlduk.com/news/security/16806/cyber-criminals-hack-macs/

Kosner, A. W. (2012, Aug 08). New Trojan Backdoor Malware Targets Mac OS X And Linux, Steals Passwords And Keystrokes. Retrieved Dec 15, 2012, from http://www.forbes.com/sites/anthonykosner/2012/08/31/new-trojan-backdoor-malware-targets-mac-os-x-and-linux-steals-passwords-and-keystrokes/

Kaspersky. (2012). Perception and knowledge of IT threats: the consumer’s point of view. Retrieved Dec 15, 2012, from Kaperski: http://www.kaspersky.com/downloads/pdf/kaspersky-lab_ok-consumer-survey-report_eng_final.pdf

Manjoo, F. (2010, Oct 5). Don't Stick It In! Retrieved Dec 11, 2012, from Slate: http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html

Masnick, M. (2012, Apr 4). EU Cybercrime Bill Targets Anonymous: Makes It A Criminal Offense To Conduct 'Cyber Attack'. Retrieved Dec 14, 2012, from Tech Dirt: http://www.techdirt.com/articles/20120403/02335718342/eu-cybercrime-bill-targets-anonymous-makes-it-criminal-offense-to-conduct-cyber-attack.shtml

Micro, T. (2012). Security in the Age . Tokyo: Trend Micro, Incorporated.

Mills, E. (2010, Nov 17). How to recognize phishing e-mails. Retrieved Dec 06, 2012, from CNet: http://howto.cnet.com/8301-11310_39-10396786-285/how-to-recognize-phishing-e-mails/

Mostyn-Brown, M. (2012, May 29). McAfee Reports 2012 First-Quarter Malware Spike. Retrieved Dec 12, 2012, from Midsize Insider: http://midsizeinsider.com/en-us/article/mcafee-reports-2012-first-quarter-malwar

Paganini, P. (2012, Apr 26). Cyber threats in mobile environment. Retrieved Dec 14, 2012, from Security Affairs: http://securityaffairs.co/wordpress/4560/cyber-crime/cyber-threats-in-mobile-environment.html

Palis, C. (2012, June). Mac Flashback Trojan Affecting Thousands: Apple Issues Fix (UPDATE). Retrieved Dec 15, 2012, from Huffington Post : http://www.huffingtonpost.com/2012/04/05/mac-flashback-trojan_n_1405766.html

Press, A. A. (2012, June 26). Cyberattacks expose network weaknesses. Retrieved 12 16, 2012, from CIO: http://www.cio.com.au/article/390361/cyberattacks_expose_network_weaknesses/

Roos, D. (2012, Aug 11). How Online Social Networks Work . Retrieved Dec 08, 2012, from HowStuffWorks? : http://computer.howstuffworks.com/internet/social-networking/information/how-online-social-networks-work2.htm

Rutt, E. (2011, Dec). The international Security Review - Innovators go head to head in security challenge . Retrieved Dec 15, 2012, from Global Response Publishing: http://www.arktis-detectors.com/fileadmin/downloads/media/2011-12_GlobalResponse_12_11.pdf

Schwab, K. (2012). Global Risks 2012. Geneva: World Economic Forum.

Shea, D. C. (2012). 2012 REPORT TO CONGRESS OF THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION. Washington: U.S. GOVERNMENT PRINTING OFFICE.

Smith, G. (2012, Feb 22). Social Media Privacy: Trust No One (infographic). Retrieved Dec 10, 2012, from ANewDomain : http://anewdomain.net/2012/02/22/the-sad-state-of-social-media-infographic/


 



No comments:

Post a Comment