<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

Hackers Are Hijacking Credentials Email Data Create Specialized Economy

31 Jul, 2020
Hackers Are Hijacking Credentials Email Data Create Specialized Economy

Recently cybercriminals are getting active because during this pandemic situation all the country are following lockdown so the people are doing work from home so the people are busy using social media platform and hackers are getting stealthier and findings new ways of remain undetected and hijacking accounts for long period of time stealing the vital information and sending spam mails to different e-mail id's.

Hackers have created a specialised economy and taking over various email accounts via different methods like social engineering, brand impersonation and spear phishing holding that vital data for long period of time to make more money by reselling in to another set cybercriminals on a Dark Web.

In 31% of the compromises one set of attack focused on hijacking accounts and sold the set of accounts access to other cybercriminals who are focused in monetising the hijacking accounts according to several reports.

Nearly 20% of compromised accounts appear in at least one online password data breach, which suggests the cybercriminals are exploiting credentials reuse across employee's personal and organisational accounts according to the report.

A Cybercriminals is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or a target or as both.

Cybercriminals use computers in three board ways:

  1. Select computer as a target:-these criminals attack other computers to perform malicious activates such as sores ding virus, data theft, etc.
  2. Use computer as their weapon:-they cybercriminals use computers to carry out conventional crime such as fraud, gambling, spam, etc.
  3. Use computer as their accessory:-they use the computer to save stolen or illegal data. Nearly 78 percent of attackers did not access any applications outside of email.

After examining 159 compromised accounts that span 111 organisations, they identified the ways account takeover happens, how long attackers have access to the compromised account, and how attackers use and extract information from these accounts.

Barracuda researches teamed up with leading researchers at University of California-Berkley to study end to end lifecycle compromised accounts.

10 ways to protect yourself from being hacked:

  1. Use a password manager and two-factor authentication wherever possible.
  2. If signing up for a new email service, check for 2FA support.
  3. Don't click suspicious links in email or text.
  4. Use a VPN on your computer and your phone.
  5. Don't use public Wi-Fi or public computers, if you can help it.
  6. Get a strong antivirus.
  7. Secure your router and Wi-Fi.
  8. Keep your computer and smart phone OS up-to-date.
  9. Keep all of your computer and smart phone apps regularly updated.
  10. Consider putting a credit freeze on your account.

Read more latest news: https://www.isoeh.com/breaking-news.html.

Read Other Breaking News

Read All Breaking News »

Exclusive Blog

Read All Exclusive Blog »
A few tips for the perfect homework
A few tips for the perfect homework

With world working from home, it's time to make it enjoyable and effective.

Read Details

Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UDP based FTP with encryption

UFTP is an encrypted multicast file transfer program for secure, reliable & efficient transfer of files. It also helps in data distribution over a satellite link.

Read Details