They have many names: hackers, crackers, black hats, cyber criminals. All of them do the same thing: steal data to make money or taking political advantage of it.
- For hacker individuals and small hacker groups, the motive is always the same: it’s nothing personal; they just want your money.
- For state-sponsored hacker groups, the motive is also always the same: to obtain state secrets that can be used internationally.
A hacker is a criminal similar to a burglar, but who works on the Internet. There are several ways they can get hold of data or money.
Data erasure: The Trojan horse could also be intended to destroy. It erases all data in its path and when all data is gone, the company or authority is also effectively “gone”. In this case, the Trojan usually comes from a competing company or a rogue state.
Password theft: If the hacker is allowed into your facility, pretending to be e.g. a technician, serviceman or similar, he may be able to get people’s passwords to the company network by simply talking to them or handing out gifts. This is surprisingly common. He may be able work undisturbed and steal or modify data, falsify web pages and basically see everything that goes on in the company and use this to stifle competition or sell the information to competitors.
Once a hacker has entered the company via a Trojan horse, some sort of hostage situation is automatically arranged
Spearphishing is becoming increasingly common. An impostor pretending to be the boss sends an e-mail or calls (voice fraud) the finance department and states: Hello, this is Charlie. I am stuck in X-land and I immediately need 123,456 pounds to take me home and to pay certain debts. Please transfer the money into my private account 123456-7 so I can pay for flights and living. The villain has done some research and found out that the boss is out and about, which increases credibility.
As long as the staff has
- little or no knowledge of cyber crime and IT security
- substandard passwords on their accounts and servers
- never had any training regarding fraudulent conduct on the Internet
this will continue. Businesses, the media, schools, government and the state administration must begin to educate and make staff, students and the general public aware of the risks. Training must be followed up regularly. But it is expensive and takes time, and so is rarely done.
1 Please!
Backup your stuff! Back it up sufficiently often for the backup to be useful for day-to-day restoration. Better to lose one day’s work, than to lose the whole company.
The backup you cannot touch, you don’t have. Keep the back-ups in house.
Backup your stuff! Back it up sufficiently often for the backup to be useful for day-to-day restoration.
MORE ARTICLES TO READ
Internet Security
Integrity – Nag, Nag, Nag!
The problem with integrity is that it is a bit abstract and difficult to grasp as a con...
Hacks and Incidents
The Big Hacks that Shook the World
Hackers are international criminals. The Internet allows them to operate anywhere in th...
Internet Security
How to recognise phishing email
Do you think all the exciting emails that land in your inbox came from your friends or ...
Privacy
How to be invisible online
Taking just a few smart steps can aide your invisibility online and remember it’s impor...
VPN
Hidden24 top 10 rated in Tech Advisors VPN review
Tech Advisor's VPN review praised Hidden24’s simplicity of install, detailed graphical ...
VPN
VPN: The Ultimate Beginners Guide
VPNs are quite popular with everyone in today’s world. VPNs are quite popular with ever...