In the era of social media, users freely share a plethora of information with their connections and followers, often overlooking the potential threat to their privacy. Opportunistic hackers seize on these vulnerabilities, infiltrating or impersonating accounts and causing significant trouble for the users.

So, what should be the response when one’s social media account is compromised?

Here are some swift steps to take in order to prevent future embarrassment:

1. Facebook: For users facing a breach on Facebook, a dedicated reporting page exists for issue resolution. Simply log in and visit https://www.facebook.com/help/contact center to provide the necessary details. If there is no response from the FB contact center within 72 business hours, reaching out to law enforcement for guidance becomes a viable option.

2. Twitter: Twitter offers a dedicated contact page for lodging complaints. However, the varied response times for different complaint types can be confusing. If prompt resolution is not achieved, considering law enforcement involvement is advisable.

3. WhatsApp: This mobile-based messaging platform provides a dedicated contact page where users can fill out a form for resolution within a 2-day period. Failure to receive a response within this timeframe warrants contacting law enforcement with the provided acknowledgement number.

4. Instagram: As a subsidiary of Meta, Instagram, a popular photo and video sharing platform, also has a dedicated contact page for addressing impersonation and hacking activities within 48 hours.

It’s crucial to note that every social networking company offers a contact paeg to gather feedback from users. Finding the correct contact page is essential, and users should exercise caution with impersonating web URLs designed to extract sensitive information.

Time is a critical factor in minimizing damage caused by incidents, so reaching out to customer service promptly is essential. Collecting evidence such as screenshots and emails that confirm identity compromise is also crucial.

Additionally, never accept friend or connection requests from unknown individuals, and change your password immediately upon receiving a digital alert about an account login attempt.

Implementing 2-factor authentication and using a strong alphanumeric password with special characters can enhance security.

Staying informed about online scams and cyber threats is essential to safeguarding one’s digital presence.

The post What to do when social media accounts get hacked or impersonated appeared first on Cybersecurity Insiders.

Hackers have recently intensified their efforts to pilfer digital information pertaining to students, encompassing a wide array of sensitive data such as health records, attendance information, homework, grades, medical details, photos, disciplinary records, educational records, home communication information, assignments, and other assessment-related data. The value of these pilfered datasets can range from $10 to $120, contingent upon the sensitivity of the information contained.

In the year 2022 alone, an alarming 960 schools fell victim to various forms of cyberattacks, spanning across 45 districts. A report by Emsisoft revealed that data pertaining to over 2 million individuals was illicitly obtained from diverse data points within student management systems.

One common vulnerability exploited by hackers is misconfigured systems, providing an entry point into school computer networks. Additionally, students unknowingly divulge significant details about their private lives on social media and email accounts, serving as an inadvertent gateway for cybercriminals to infiltrate school networks through a student’s PC.

The modus operandi is deceptively simple – hackers deploy malicious links via email or messaging platforms, enticing recipients to click on the links with promises of financial gain. In some instances, threat actors impersonate acquaintances of the victim, coercing them into disclosing digital credentials such as passwords for Facebook, Twitter, or iCloud accounts. Subsequently, hackers not only gain access to the student’s personal life but also infiltrate the school network, accessing data restricted to staff, students, and parents.

The potential repercussions are concerning, ranging from a hacker threatening a child by manipulating their photos to engaging in identity theft for future malicious use.

To counteract these threats, it is imperative to raise awareness among students about the existing dangers. This involves adopting robust cybersecurity practices such as using a minimum 14-character password comprising a combination of alphabets, numbers, and symbols, maintaining stringent privacy settings on social media accounts, and refraining from accepting invitations from unknown numbers on messaging and social media platforms. Concurrently, educational institutions, including schools, colleges, and universities, should implement proactive measures and develop efficient incident response plans to mitigate such cybersecurity risks.

The post School student info proving valuable to hackers appeared first on Cybersecurity Insiders.

The Telegram messaging app has emerged as a hub for criminal activities, serving as a platform for data exchange among various illicit networks. Criminals, ranging from drug and child traffickers to cybercriminals, are increasingly utilizing Telegram to facilitate their nefarious operations.

One recent instance of cybercrime involves the distribution of hacked intimate CCTV videos, which are being sold on the platform. These videos, featuring content from bedrooms, are in high demand, with a dedicated Telegram channel named Vnexpress offering them for sale. The videos are priced at $3 per clip, and subscription options for quarterly, half-yearly, and annual plans are available at a cost-effective rate of $29.

Particularly disturbing is the demand for videos containing intimate moments from bedrooms, shedding light on the perverse interests of those purchasing such content. The Vnexpress channel, operating out of Russia, specializes in selling these compromising videos, exposing the private lives of families and businesses in Vietnam.

Notably, certain videos showcase bedroom footage of couples from countries like Canada, the United States, Australia, and Britain. The content is allegedly hacked from CCTV cameras installed in hotels and resorts, commanding prices ranging from $16 to $19 per clip.

Hackread.com, an online news resource, has highlighted that surveillance camera footage from homes in Vietnam is contributing to the content available to these criminal groups. The public is urged to refrain from installing CCTV cameras in sensitive areas like changing rooms, trial rooms, bedrooms, and bathrooms, as this footage becomes a valuable resource for criminals. Despite global prohibitions on the installation of cameras in such private spaces due to privacy concerns, it seems that individuals continue to neglect these regulations.

In light of these developments, there is a growing call for Telegram to implement stringent measures to monitor and control illicit activities on its platform. Major social media platforms such as Facebook, Twitter, and Google employ AI technology to combat the spread of various crimes, and it is hoped that Telegram will follow suit to effectively curb criminal activities within its user base.

The post Vietnam hacked CCTV videos selling like hotcakes on Telegram appeared first on Cybersecurity Insiders.

Smartphones have become indispensable in our daily lives, but with their ubiquity comes the lurking threat of hackers seeking to infiltrate these devices and gain access to our personal information. This danger is particularly heightened for individuals in the public eye, such as celebrities, elected representatives, or journalists.

If you suspect that your phone may have been compromised, it’s crucial to be vigilant for signs that can vary from person to person or device to device but are common among average online users.

Dot on the Screen: For Android phones, a green dot may appear just below the notification light or above the network antenna signal. Apple iPhone may show an orange dot. If you observe this light emitting constantly or blinking when your phone is not in use, it could indicate a compromised device. Malware may be discreetly taking snapshots or recording audio in the background. Note that Android 13 OS users may see a similar light when using their camera app, disappearing upon app closure. Tip: Review your application count and remove any unknown or suspicious apps.

Mobile Device Warming: A phone heating up when not in use suggests a potential hack. Unusual battery drain is another sign of background malware activity. Malicious software may strain the processor, causing the phone to heat up.

Password Change Email/Message:  Beware of alerts requesting password changes for bank or social media accounts. Such messages might be phishing attempts to compromise login credentials. Exercise caution before clicking on email links or those embedded in messages.

Bogus Bank Calls: Be skeptical of calls claiming to be from your bank requesting sensitive information. Legitimate banks won’t ask for sensitive details over the phone; visit a branch in person if necessary. Report suspicious calls to law enforcement.

Note: Any device connected to the internet is susceptible to cyber threats. While it’s not necessary to disable mobile data, take precautions such as downloading apps from trusted sources, keeping your device updated, using anti-malware solutions, and avoiding clicking on links from messaging platforms or emails.

 

The post Watch out for these signs when your smart phone is hacked appeared first on Cybersecurity Insiders.

Iran-backed hackers are alleged to have successfully breached the IT infrastructure serving the Water Authority of Pennsylvania in the United States. Disturbing reports indicate that their objective was to disrupt the water supply, potentially causing chaos and panic among the populace.

This attack underscores not only the criminal lengths to which these hackers are willing to go for financial gain but also highlights a glaring absence of humanitarian ethics in their actions. The Iranian hacking group, Cyber Av3ngers, has claimed responsibility for targeting the water facility, proudly broadcasting their actions on Twitter as if it were a noteworthy achievement.

However, what these hackers seem to overlook is the potential for a crisis that could result in the loss of innocent lives. The reckless nature of their activities raises concerns about the lack of consideration for the broader consequences of their actions.

Geopolitically, nations like Iran, North Korea, Russia, and China, finding themselves at odds with the West, resort to adversarial tactics. These include attempts to create chaos in various spheres, such as the economy, politics (as seen in the US 2016 election controversy), or health (as evidenced by the global impact of Covid-19). In this particular instance, it appears that a pro-Iranian cyber squad orchestrated the attack due to the Biden administration’s support for Israel.

Matthew Mottes, Chairman of the Municipal Water Authority Board of Aliquippa, has acknowledged the incident and assured the public that more details will be disclosed as the investigation progresses.

The motives of modern hackers seem to revolve primarily around financial gain, with an increasing trend of targeting companies providing essential or critical services. Victims are often coerced into paying ransom, and in cases where they resist, the stolen credentials or data may be sold on the dark web for monetary gain.

It is noteworthy that, in this specific incident, only the water management facility was affected. Authorities are diligently utilizing backup tools to maintain water supply and pressure, ensuring that there will be zero compromise to the sanctity of the drinking water.

The criminals exploited a vulnerability in Unitronics software, an Israel-based business providing technological support to water facilities, to carry out the cyber attack. The incident serves as a stark reminder of the growing threats to critical infrastructure and the need for robust cybersecurity measures to safeguard against such malicious activities.

The post Iran launches cyber attack on water authority in the United States appeared first on Cybersecurity Insiders.

General Electric, commonly referred to as GE, a multinational corporation engaged in the fields of renewable energy, aerospace, and power, has fallen prey to a cyber attack resulting in the leakage of sensitive information related to DARPA Military operations.

The severity of the attack remains uncertain as the American multinational company diligently investigates the incident.

As per information obtained from a Telegram source, a hacking group identifying itself as ‘Cyber Niggers’ has claimed responsibility for the attack and is demanding a substantial ransom for the return of the compromised data.

This incident signifies a ransomware attack, wherein the perpetrators engage in a double extortion strategy.

IntelBroker, a member of the cybercrime group, has asserted the intention to sell the pilfered data on a hacker’s forum for $500. Several screenshots have been posted, revealing information pertaining to the US Government Defense Advanced Research Projects Agency (DARPA). The exposed data encompasses details from SQL databases, military secrets, aviation information, maintenance reports, and more.

CyberNigger is the same hacking group that has previously infiltrated prominent firms such as Volvo, Hilton Hotels, Autotrader, Verizon, AT&T, and the US Immigration Service.

Law enforcement agencies are actively investigating the identity and activities of this group. The criminals, meanwhile, are threatening to release data related to additional victimized companies as the holiday season progresses.

It is essential to note that criminals from such groups often attempt to coerce victims into paying a ransom in exchange for a decryption key and the promise of returning the stolen data. However, the veracity of such assurances remains uncertain, raising concerns about whether the perpetrators might retain a copy of the siphoned data on their servers for future use.

The post GE servers hacked n DARPA Military Info Leaked appeared first on Cybersecurity Insiders.

When you discover that your device has been compromised, it’s important not to panic. Such incidents can happen to anyone, and taking swift action within a couple of hours can help mitigate potential risks to your personal information.

The first step is to search for a reliable anti-malware solution capable of scanning your device for anomalies. Immediately disconnect the compromised device from the internet, and scrutinize recently downloaded applications for any signs of suspicious activity.

Upon identifying a questionable application, promptly uninstall it. Ensure that all your essential data, including contacts, photos, videos, documents, and messages, are regularly backed up to the cloud and synced every day or two.

Perform a factory reset on your device, keeping in mind that this process will delete all stored data. Consider using reputable anti-malware solutions such as ESET Mobile Security, Malwarebytes, Norton, TotalAV, McAfee, or AVG.

Implementing two-factor authentication (2FA) adds an extra layer of security when accessing sensitive data on applications or messaging platforms.

Diversify your reliance on different solutions instead of depending on a single company. For example, use Google Photos for storing videos and photos, One Drive for documents, and WhatsApp for messaging. This approach ensures that if one platform experiences issues, you can seamlessly continue your day-to-day activities with alternative solutions.

Exercise caution when encountering links in messages, emails, or PDF formats. Clicking on these links may lead to malicious intent, potentially compromising your information or funds in e-wallet platforms or crypto wallets.

By following these steps and staying vigilant, you can better protect your device and personal information from potential security threats.

The post What to do if the phone is hacked or becomes espionage target appeared first on Cybersecurity Insiders.

Several ethical hackers recently accepted a challenge posed by the European Space Agency (ESA) to assess the resilience of satellite infrastructure by attempting to infiltrate servers and compromise satellite imaging sensors and data. Fortunately, this hacking exercise was conducted solely for the purpose of evaluating the satellites’ operational security, and we can assume that no sensitive data fell into the wrong hands, thus averting potential risks to millions of lives.

In September of the previous year, the ESA invited seasoned professionals from the security industry to organize drills aimed at testing the cyber resilience of satellites, which we heavily rely on for communication and other critical needs. A group of ethical hackers, known as white hat hackers, willingly stepped forward to test the effectiveness of the existing security measures.

As reported in a recent media update, the hackers successfully gained control of a satellite, including its global positioning management systems. This meant they had technical control over the electronics that stored information about specific devices and their locations on Earth.

Furthermore, they managed to exploit a significant vulnerability to insert a malicious code into the system, enabling the ethical hackers to assume control over the altitude control system and the onboard cameras responsible for transmitting satellite imagery.

Interestingly, the white hat hackers were able to compromise some of the data being transmitted to Earth and manipulate the regular operations in a manner that deceived the camera capturing images.

Sharing details with the media, a cybersecurity expert emphasized the benefits of such exercises in raising awareness about potential vulnerabilities within current satellite systems. These drills enable the responsible entities to identify and rectify flaws before any untoward incidents occur. This reference includes recent satellite hacking incidents involving SpaceX, owned by Elon Musk, the CEO of Twitter, and satellite-based internet resources utilized to provide web services to the Ukrainian population.

It’s worth noting that China appears to be ahead in securing its space assets, as it has developed a new cyber defense infrastructure capable of automatically detecting flaws in orbiting satellites and addressing them promptly. The US Space Force has also established Space Delta 6, a combat brigade focused on countering space threats, including the detection and prevention of adversarial attacks in a timely manner. Hopefully, these proactive measures will enhance the overall security of satellite systems.

The post Cyber Attack on European Space Agency to compromise satellite imaging data appeared first on Cybersecurity Insiders.

The rise of cloud computing has provided individuals and businesses with a convenient way to store and access their data. However, with this convenience comes a concern about data security. Cloud storage services have become a target for hackers, and the theft of personal and sensitive information can have serious consequences. So, how is information stored in the cloud secured from hacks?

One way to secure information in the cloud is through encryption. Encryption is the process of converting information into a code that only authorized parties can access. Cloud providers use encryption to protect data at rest, which means when the data is stored on the provider’s servers. They also use encryption to protect data in transit, which means when the data is being transferred between the user and the cloud provider. Encryption ensures that even if a hacker gains access to the data, they will not be able to read it.

Another way to secure information in the cloud is through access controls. Access controls are mechanisms that limit access to data and systems based on a user’s identity and privileges. Cloud providers implement access controls through authentication and authorization. Authentication is the process of verifying a user’s identity, while authorization is the process of granting or denying access based on the user’s identity and privileges. By implementing access controls, cloud providers can prevent unauthorized access to data.

Cloud providers also employ security measures such as firewalls, intrusion detection systems, and antivirus software to prevent attacks. Firewalls are barriers that prevent unauthorized access to a network or system. Intrusion detection systems monitor the network for signs of unauthorized access or malicious activity. Antivirus software scans files for known viruses and malware.

In addition to these technical measures, cloud providers also implement physical security measures. Cloud providers store their servers in data centers that are physically secure. Data centers have security guards, surveillance cameras, and other measures to prevent unauthorized access. Cloud providers also perform regular audits and assessments to ensure that their security measures are effective.

In conclusion, information stored in the cloud is secured from hacks through a combination of technical and physical security measures. Cloud providers use encryption, access controls, firewalls, intrusion detection systems, antivirus software, and physical security measures to protect data. However, it is important for users to also take precautions such as using strong passwords and two-factor authentication to further enhance the security of their data in the cloud.

The post How is information stored in cloud secure from hacks appeared first on Cybersecurity Insiders.

Cyber attacks on public websites have become an increasing concern for governments across the world, and this article is related to one such news. An Indonesian hackers’ group claimed on the dark web that they are responsible for cyber attacks launched on over 12,000 Indian websites, and more will follow in the coming days.

After suspicion pointed towards Anonymous Sudan, the Indian Cyber Crime Coordination Centre, in coordination with the Ministry of Home Affairs, disclosed that the culprit is an Indonesian hackers’ group that has been assigned the task to take down crucial infrastructure via denial-of-service attacks or ransomware.

According to a source from the Home Ministry, the attacks were supposed to trigger concerns among the government and the populace. But fortunately, most of the attacks were neutralized at the entry point by related software tools, thus bringing a big relief to the BJP-led government, which otherwise would have been prone to a major embarrassment.

Interestingly, a few healthcare and defense websites related to Central and State governments were also targeted by a pro-Islamic hacktivist group named “Anonymous Sudan” in the last week of March this year. Their plan was to target the digital operations being carried out at the seaports, airports, and major hospitals.

US-based cybersecurity firm Radware confirmed that the attacks were politically motivated and might be the work of those who were acting on the words of the opposition parties to divert attention. Those impacted were the airport websites in Hyderabad, New Delhi, Cochin, Goa, and the Airports Authority of India, IRCTC, and Income Tax websites.

Security analysts state that the work could be that of those who were interested in churning out cyber warfare. Not long ago, the All-India Institute of Medical Sciences (AIIMS) was also hit by a malware attack, disrupting the digital operations of the medical institute for weeks.

The post Over 12k Indian Govt websites disrupted due to cyber-attack from Indonesia appeared first on Cybersecurity Insiders.