5 ways hackers can steal passwords (and how to stop them) //The Translation Club

Greetings, dear Turkish Hack Team members and esteemed executives:
In this position, I will tell you "5 ways for hackers to steal (and how to stop) passwords."
Have a good read.

The password concept has been going on for centuries and passwords have been used in computing in less time than most of us can remember. One of the reasons why passwords are popular for a long time is that people know how they work instinctively. But there's also a problem. The passwords are the heels of many people's digital lives, especially at a age where the average person has 100 login IDs to remember and this number has been increasing in recent years. As a result, no wonder many people cut corners and suffer security difficulties.

Given that this password is usually the only thing that's left between a cybercriminal and your personal and financial data, fraudsters are more than just trying to steal or break this login information. We have to make at least the same effort to protect our online accounts.

What can a hacker do with my password?
Passwords are virtual keys to your digital world, providing access to your online banking, email and social media services, Netflix and Uber accounts, and all the data hosted in our cloud storage. With employee logins, a hacker (hacker) can:

They can steal your personal credentials and sell it to other criminals

He can give the account itself access. Sites such as Dark web crime take a quick action to log in.

Bad-tempered buyers can use everything from free taxi journeys to video streams and missed Air miles accounts to discounted travel

They can use passwords to unlock other accounts that you use the same password
How do hackers steal passwords?
You will learn these typical cybercrime techniques and have a much better position to manage the threat:
1.Phishing and Social Engineering
People are fake and obscene creatures. We tend to make bad decisions when we hurry. Cybercriminals are exploiting these vulnerabilities through social engineering, a psychological canoe designed to make us do something we're not supposed to do. Phishing is perhaps the most famous example. Here hackers cheat as legitimate assets: For example, friends, family, and companies you do business with, etc. like, the email or text you receive looks real, but includes a malicious link or attachment that will download malware when clicked on it or take you to a page to fill in your personal information.

Fortunately, as we explained here, there are many ways to detect warning signs of a phishing attack. Fraudsters use phone calls to log in directly from their victims and to receive other personal information, often acting as technical support engineers. This is defined as "phone phishing".

2. Malware
Another popular way to protect your passwords is malware. Phishing emails are a primary vector for such attacks, but you can be a victim by clicking on a malicious ad online (incorrect ad) or visiting a compromised website (individual download). As ESET researcher Lukas Stefanko has shown many times, malware can often be hidden even in a legitimate looking mobile app in third-party app stores.

There are several malware that steals information, but some of the most common ones are designed to record your keystrokes or take screenshots of your device and send them back to the attackers.

3. Brute Force
The average number of passwords that an average person should manage increased by 25% year-on-year in 2020. Most of us use passwords that are easy to remember (and to guess) as a result, and we reuse them on multiple sites. However, this can open the door to doors called brute force techniques.

One of the most common is credential filling. Here, attackers feed large volumes of previously violated user name/password combinations to automatic software. The tool then tries these tools on multiple sites and hopes to find a match. So hackers can open most of your accounts with a single password. According to a guesswork, it is estimated that last year there were 193 billion attempts worldwide. One of the most important victims recently was the Canadian government.

Another brute force technique is to inject a password. Where hackers use automated software to try a list of frequently used passwords against your account.

4. Guess
Even though hackers have automated tools to force your passwords, sometimes they don't need them: Despite the more systematic approach used in brute force attacks, even simple predictions can do the job. The 2020 most common passwords were “123456” and then “123456789”. There was only one and only “password” from number four.
If you like a lot of people and recycle the same password, or if you use a similar derivative on multiple accounts, you make things easier for the attackers and expose yourself to the risk of identity theft and fraud.

5. Shoulder surfing
We've discovered it so far, and all the ways to compromise the password have been virtual. However, it is important to note that although locking is easier and many employees return to the office, some tried and tested listening techniques pose a risk. This is not the only reason shoulder surfing is still a risk, and ESET's Jake Moore recently tried to find out how easy it was for someone to get their Snapchat using this simple technique.

The higher-tech version, known as the "middle man" attack with Wi-Fi Internet listening, can enable hackers sitting on public Wi-Fi connections to insert your password when they are connected to the same hub. Both techniques have been going on for years, but that still doesn't mean it's not a threat.
Protect your login credentials
There are many things you can do to block these techniques: Add a second authentication form to the mix, manage your passwords more effectively, or take the steps necessary to stop theft at the first stage. Consider the following:

In all your online accounts, especially banking, use only strong and unique passwords in your email and social media accounts
Avoid reusing your login information on multiple accounts and making any other common password errors
Turn on two-factor authentication (2FA) in all your accounts
Store and log in strong and unique passwords for each site and account use a password manager that makes operations simple and secure
If a provider tells you that your data has been violated, change your password immediately
Use only HTTPS sites to log in
Do not click or open links in spam emails
Download apps from official app stores only (App Store/Play Store)
Invest in security software from a reputable provider for all your devices
Make sure that all operating systems and applications are in the latest version
Pay attention to shoulder surfers in public areas
Never sign in to an account if you are in public Wi-Fi; Use VPN if you need to use such a network
Password expiration has been estimated for more than a decade. However, password alternatives are often forced to replace the password, which means users need to take the important things into their own hands. Be careful and keep your login data safe.


Original Source: Bilgisayar korsanlarının parolaları çalması (ve bunları nasıl durdurulacağı) için 5 yol

Have a nice day.


Good Lessons <3
 

axenaspm

Üye
12 Şub 2022
56
20
Greetings, dear Turkish Hack Team members and esteemed executives:
In this position, I will tell you "5 ways for hackers to steal (and how to stop) passwords."
Have a good read.

The password concept has been going on for centuries and passwords have been used in computing in less time than most of us can remember. One of the reasons why passwords are popular for a long time is that people know how they work instinctively. But there's also a problem. The passwords are the heels of many people's digital lives, especially at a age where the average person has 100 login IDs to remember and this number has been increasing in recent years. As a result, no wonder many people cut corners and suffer security difficulties.

Given that this password is usually the only thing that's left between a cybercriminal and your personal and financial data, fraudsters are more than just trying to steal or break this login information. We have to make at least the same effort to protect our online accounts.

What can a hacker do with my password?
Passwords are virtual keys to your digital world, providing access to your online banking, email and social media services, Netflix and Uber accounts, and all the data hosted in our cloud storage. With employee logins, a hacker (hacker) can:

They can steal your personal credentials and sell it to other criminals

He can give the account itself access. Sites such as Dark web crime take a quick action to log in.

Bad-tempered buyers can use everything from free taxi journeys to video streams and missed Air miles accounts to discounted travel

They can use passwords to unlock other accounts that you use the same password
How do hackers steal passwords?
You will learn these typical cybercrime techniques and have a much better position to manage the threat:
1.Phishing and Social Engineering
People are fake and obscene creatures. We tend to make bad decisions when we hurry. Cybercriminals are exploiting these vulnerabilities through social engineering, a psychological canoe designed to make us do something we're not supposed to do. Phishing is perhaps the most famous example. Here hackers cheat as legitimate assets: For example, friends, family, and companies you do business with, etc. like, the email or text you receive looks real, but includes a malicious link or attachment that will download malware when clicked on it or take you to a page to fill in your personal information.

Fortunately, as we explained here, there are many ways to detect warning signs of a phishing attack. Fraudsters use phone calls to log in directly from their victims and to receive other personal information, often acting as technical support engineers. This is defined as "phone phishing".

2. Malware
Another popular way to protect your passwords is malware. Phishing emails are a primary vector for such attacks, but you can be a victim by clicking on a malicious ad online (incorrect ad) or visiting a compromised website (individual download). As ESET researcher Lukas Stefanko has shown many times, malware can often be hidden even in a legitimate looking mobile app in third-party app stores.

There are several malware that steals information, but some of the most common ones are designed to record your keystrokes or take screenshots of your device and send them back to the attackers.

3. Brute Force
The average number of passwords that an average person should manage increased by 25% year-on-year in 2020. Most of us use passwords that are easy to remember (and to guess) as a result, and we reuse them on multiple sites. However, this can open the door to doors called brute force techniques.

One of the most common is credential filling. Here, attackers feed large volumes of previously violated user name/password combinations to automatic software. The tool then tries these tools on multiple sites and hopes to find a match. So hackers can open most of your accounts with a single password. According to a guesswork, it is estimated that last year there were 193 billion attempts worldwide. One of the most important victims recently was the Canadian government.

Another brute force technique is to inject a password. Where hackers use automated software to try a list of frequently used passwords against your account.

4. Guess
Even though hackers have automated tools to force your passwords, sometimes they don't need them: Despite the more systematic approach used in brute force attacks, even simple predictions can do the job. The 2020 most common passwords were “123456” and then “123456789”. There was only one and only “password” from number four.
If you like a lot of people and recycle the same password, or if you use a similar derivative on multiple accounts, you make things easier for the attackers and expose yourself to the risk of identity theft and fraud.

5. Shoulder surfing
We've discovered it so far, and all the ways to compromise the password have been virtual. However, it is important to note that although locking is easier and many employees return to the office, some tried and tested listening techniques pose a risk. This is not the only reason shoulder surfing is still a risk, and ESET's Jake Moore recently tried to find out how easy it was for someone to get their Snapchat using this simple technique.

The higher-tech version, known as the "middle man" attack with Wi-Fi Internet listening, can enable hackers sitting on public Wi-Fi connections to insert your password when they are connected to the same hub. Both techniques have been going on for years, but that still doesn't mean it's not a threat.
Protect your login credentials
There are many things you can do to block these techniques: Add a second authentication form to the mix, manage your passwords more effectively, or take the steps necessary to stop theft at the first stage. Consider the following:

In all your online accounts, especially banking, use only strong and unique passwords in your email and social media accounts
Avoid reusing your login information on multiple accounts and making any other common password errors
Turn on two-factor authentication (2FA) in all your accounts
Store and log in strong and unique passwords for each site and account use a password manager that makes operations simple and secure
If a provider tells you that your data has been violated, change your password immediately
Use only HTTPS sites to log in
Do not click or open links in spam emails
Download apps from official app stores only (App Store/Play Store)
Invest in security software from a reputable provider for all your devices
Make sure that all operating systems and applications are in the latest version
Pay attention to shoulder surfers in public areas
Never sign in to an account if you are in public Wi-Fi; Use VPN if you need to use such a network
Password expiration has been estimated for more than a decade. However, password alternatives are often forced to replace the password, which means users need to take the important things into their own hands. Be careful and keep your login data safe.


Original Source: Bilgisayar korsanlarının parolaları çalması (ve bunları nasıl durdurulacağı) için 5 yol

Have a nice day.

Good Lessons <3
nice optic
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.