Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
General question about hacks
Message
<blockquote data-quote="Victor M" data-source="post: 1087142" data-attributes="member: 96560"><p>How the hack was done. The hackers might have gotten in through a downloaded email attachment, an infected program that was installed, or a direct attack, thru your modem and router, to any internet connected program like your browser, email program or even OneDrive. It probably involved some form of keylogging. Or it could involve manipulation of your browser. The hack probably involved ex filtration of the stolen card numbers - they have to sent it back to themselves in order to use it. We security folks break it down into stages. And then try to do things to prevent every stage from happening again. Security is a field of study.</p><p></p><p>As for the question who did it. It is fruitless to ask. Because there is too much cybercrime happening for police to investigate. Because police tend to focus on big ticket items, small amounts have short sentences, so they consider it a waste of their effort. Which is not fair of course, but they have limited man power, so they choose. Then, hackers always hide their tracks and make tracing difficult. Their servers disappear, and they don't re-use the same ip addresses. Without any links to their PC's, you cannot know where they are or search their PC's to find out who they are.</p><p></p><p>Now, you said you have mostly cleaned up the mess. But It happened 5 times, so I want to be sure. Hacking definitely involves trying their best to stay on your PC for a long long time. Anything short of re-installing Windows cannot guarantee total eradication. So do that. We don't want a 6th time.</p><p></p><p>The stages that we have identified allows us to find prevention for each. Firewall stops some methods of direct attack by hackers. Anti-malware can detect and remove bad email attachments. Antii-malware can also stop suspicious programs from installing, and their behavior based detection may stop keylogging. Intrusion Prevention Systems stop browser manipulation. Free ones include Security Onion, Snort and Suricata. Security Onion requires an extra old PC, includes Snort and Suricata, and is easier to use. WHHLight is a simple free tool you can find here on MT. It belongs to the hardening Windows category. Windows is full of security flaws and hardening remedies that. Good security involves layers. You cannot rely solely on the firewall and anti-malware; they can fail. So you make sure there are additional layers. The last step requires some manual work: review your bank and credit card statements. It is only a detection method and not prevention, but data loss prevention programs are only affordable to companies. Some security things are technical, some are procedural. We have looked at technical things, so lets look at procedural. Upload your downloads to <a href="https://www.virustotal.com/gui/home/upload" target="_blank">VirusTotal</a> , You can only install 1 anti-malware program and that limits you. VirusTotal has some 40 anti-malware engines ready to scan things. Other procedures are like verifying from the sender via phone before you download an email attachment. Don't download from BitTorrent. I hope I have answered your questions.</p></blockquote><p></p>
[QUOTE="Victor M, post: 1087142, member: 96560"] How the hack was done. The hackers might have gotten in through a downloaded email attachment, an infected program that was installed, or a direct attack, thru your modem and router, to any internet connected program like your browser, email program or even OneDrive. It probably involved some form of keylogging. Or it could involve manipulation of your browser. The hack probably involved ex filtration of the stolen card numbers - they have to sent it back to themselves in order to use it. We security folks break it down into stages. And then try to do things to prevent every stage from happening again. Security is a field of study. As for the question who did it. It is fruitless to ask. Because there is too much cybercrime happening for police to investigate. Because police tend to focus on big ticket items, small amounts have short sentences, so they consider it a waste of their effort. Which is not fair of course, but they have limited man power, so they choose. Then, hackers always hide their tracks and make tracing difficult. Their servers disappear, and they don't re-use the same ip addresses. Without any links to their PC's, you cannot know where they are or search their PC's to find out who they are. Now, you said you have mostly cleaned up the mess. But It happened 5 times, so I want to be sure. Hacking definitely involves trying their best to stay on your PC for a long long time. Anything short of re-installing Windows cannot guarantee total eradication. So do that. We don't want a 6th time. The stages that we have identified allows us to find prevention for each. Firewall stops some methods of direct attack by hackers. Anti-malware can detect and remove bad email attachments. Antii-malware can also stop suspicious programs from installing, and their behavior based detection may stop keylogging. Intrusion Prevention Systems stop browser manipulation. Free ones include Security Onion, Snort and Suricata. Security Onion requires an extra old PC, includes Snort and Suricata, and is easier to use. WHHLight is a simple free tool you can find here on MT. It belongs to the hardening Windows category. Windows is full of security flaws and hardening remedies that. Good security involves layers. You cannot rely solely on the firewall and anti-malware; they can fail. So you make sure there are additional layers. The last step requires some manual work: review your bank and credit card statements. It is only a detection method and not prevention, but data loss prevention programs are only affordable to companies. Some security things are technical, some are procedural. We have looked at technical things, so lets look at procedural. Upload your downloads to [URL='https://www.virustotal.com/gui/home/upload']VirusTotal[/URL] , You can only install 1 anti-malware program and that limits you. VirusTotal has some 40 anti-malware engines ready to scan things. Other procedures are like verifying from the sender via phone before you download an email attachment. Don't download from BitTorrent. I hope I have answered your questions. [/QUOTE]
Insert quotes…
Verification
Post reply
Top