Have you ever been hacked and wondered how your system was infiltrated? Is there a way to catch them?

First before we answer those questions, lets dive into some fun hacking facts.

  • There is a hacker attack every 39 seconds.
  • Russian hackers are and will always be the fastest.
  • Roughly 300,000 new malware are created every day.
  • Multi-factor authentication and encryption are the biggest and only best hacker obstacles.
  • The average cost of data breaches will be about $150 million in 2020.
  • The annual cybersecurity budget in the US is $14.98 billion.


Those are some scary facts. However, who are hackers and why do they want to hack us?

When we think of hackers we think of the evil Mr. Kitty below trying to break in to our computer and steal our information.

Evil Mr.Kitty

However, do they really want to do us harm?

The reality is that if you’re an average person with a 9-5 job, with no position of power, its more than likely your hacker will be a script kiddy.

A script kiddy is someone who uses existing computer scripts or code to hack into computers. They’re normally have limited expertise to do some real damage. They would be using your machine as a test to see if they have enough skills to break in.

On the other hand, if you are a bank manager or a director of a hedge fund, then you and your company will likely be a target by criminal gangs. Even if you or your company disrespects a political figure, you too, are a target.

A great example is Sony pictures when releasing the film “The Interview”, It was about a fictional story of a CIA plot to kill North Korean leader Kim Jong-un which triggered a cyber attack against Sony Pictures.

The hackers released all kinds of information they could find in their system. They exposed CEO salaries, Angile Jolie’s passport details and even released films on the web which costed Sony Pictures millions in losses.

The three FBI most wanted who were also responsible for the Sony attack are:

These are just some of the hacks they have been involved in:

  • Cyberattacks on Sony
  • Cyber-Enabled Heists from Banks
  • Cyber-Enabled ATM Cash-Out Thefts
  • Ransomware and Cyber-Enabled Extortion
  • Creation and Deployment of Malicious Cryptocurrency Applications
  • Targeting of Cryptocurrency Companies and Theft of Cryptocurrency
  • Spear-Phishing Campaigns

How they could target you?

A lot of people think that hackers gain access into the system through a tiny key hole or through an unattended colleagues machine. However, this is far from the truth. A lot of hackers gain access by stalking you and by trying to phish you. Believe it or not 74% of organizations in the United States experienced a successful phishing attack.

What is Phishing?

Phishing is the fraudulent attempt to obtain your sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity through electronic communication.

The core of phishing is by using Social Engineering, the success rate also depends only and only on human error. Suppose you got a link that asks you to login with your account and the link is suspicions there is a high chance that it will send your details to someone else and you may get phished.

One of the tools available is Hidden Eye which is one of the best tools available for phishing it also has features such as keylogger, ngrok support and much more.

I have taken a quick screenshot to how hackers would set up their phishing attack.


Why Cant You Catch A Hacker

Hackers don’t use VPN, Socks, etc as claimed in most answers to hack, but script kiddies do!

Most hackers started from Rookie to Script Kiddies then advanced to a good, better, or advanced hacker.

A good hacker will not buy any VPN, socks just to hack and cover his tracks, because you know that you are not covering anything.

A good hacker will own or hack into different computers, servers, mobile phones, smart tv or any connected devices and place a hidden backdoor to allow undetected access back to the pawned system.

For example, attackers hacked into a mobile phone named MobileA in California, then hacked a server named ServerB in China, hack into a SmartWatchC in Zimbabwe, etc. Now he could easily SSH into MobileA and SSH into ServerB, then SmartWatchC, and so on using encrypted connections before any attack is launched.

This method allows such hackers to create a chained connection that enables the attacker to bounce from one computer to another before carrying out any attack.

For example, a cyber attack in a particular city may originate from 3 to 5 different chained connections from different countries, which makes it difficult to track and make prosecution to be extremely difficult because of jurisdictions and country’s laws from where those connections originated from.

Conclusion

Hackers come in all shapes and forms, all ages and from all walks of life. This is why you need to be on guard as the we share more information on the world wide web. They will mainly be stalking you and be looking for your psychological weaknesses to gain your trust.

When talking to anyone online for the first time or sharing any information on your social, professional and work related on the world wide web, you must think about who could be reading it and how they could use it access your finances or your personal information.

The only thing to do is be on guard and connect with more people in the real world if you want to share whats on your mind as you’ll never know who is on the other side of that computer.