Carding Forum
Professional
- Messages
- 2,788
- Reaction score
- 1,322
- Points
- 113
Complete privacy is virtually a thing of the past forever. Modern hackers, using all the most advanced developments in the field of IT-technologies, break thousands of accounts every day. By and large, any information about us can be accessed only at the click of a button: someone is in love, someone is sick, someone is having an affair, and someone, perhaps, is mired in debt and taxes. You can hack anything: a mailbox, an account in a social network, a medical base. Even the bank card number and credit history are not such a secret. In case you have become a victim of an information leak, but are not yet ready to reveal all your secrets to the world - a series of tips prepared by the SearchInform analytical center.
Electronic mailbox. One of the most popular objects for hacking by hackers is mailboxes. Unfortunately, hacking of e-mail is often underestimated by users. However, it is to the e-mail box that many services are usually tied: online banks, an account on a social network, an account in an online game, and so on. Even if you are not an employee of the special services, and WikiLeaks is not interested in your mail information, troubles cannot be avoided. It would seem, why hackers need your mailbox if there is no secret data, no interesting correspondence, no connection to banks? In fact, everything is simple. Today, many banner networks seek to hack even completely innocent random email addresses that are not registered by the antispam system. Having broken into your mailbox, they will quietly, with undisguised joy, send their spam on your behalf to the addresses of your friends. This is the most harmless of the reasons. More "profitable" ones - a little later.
If you become a victim of an information leak and your email is hacked, the first thing to do is scan your computer with an antivirus program: very often it is viruses or malware that get into your computer that breaks your mail. Then go to your account, try to change your password. If you can't do it yourself, try contacting support.
What to do if the email account of foreign postal services (Yandex, Google, Bing, Baidu, Rambler, Mail.Ru, etc.) has been hacked? If you are unable to enter the mail using the old password, click on the "forgot password" option. You will be taken to the authorization page, where you will have to enter all the data about your mailbox, enter the specified text in the field correctly and move on. Then you will need to indicate the backup mailbox or mobile number that you indicated during registration. You can try to contact support. Google service warns its users in advance about an attempt to hack the mailbox - do not neglect such messages. If your e-mail capabilities allow, select the "Show last login" option. If you see that you were logged in under a different IP address, it’s better to change the login password.
Apple / Google / Windows smartphone account. Smartphones, regardless of the manufacturer and working operating system, usually store the most necessary information: contacts, photos, passwords, open accounts on social networks, work and personal mail, linking to banks, etc. Hacking an account is fraught not only with the disclosure of all this information and the loss of money - you risk losing control over everything that happens to your smartphone, and becoming a remotely controlled toy in the wrong hacker's hands.
iOS. Apple technology, due to its popularity, has long been of interest to hackers and fraudsters. It can be easily controlled remotely, provided that the hacker knows your username and password, and, as described earlier, it is not so difficult to get them. If you suddenly realize that "strange things" are happening to your iPhone and anti-virus cleaning does not help, you will have to erase all data. Fortunately, such a function is present. It will completely delete all your data on the device so that they cannot get to intruders in any way. There is a minus: you will not use this data from now on. But believe me, this is much better than losing funds and control over a mobile device. If you are not sure that your account has been mercilessly hacked, and you really do not want to lose data, contact the service center.
Android. This smartphone's operating system has a built-in tool called Android Device Manager, usually tied to a Google account. You can remotely control the device from any computer with Internet access - it's not very good if you've been hacked. A hacker can even lock your smartphone's display or change your picture password. In this case, you can also remotely erase all data from the device - this function resets all settings to factory defaults. This will erase the phone's internal memory. However, the information on a separate SD card (in the latest versions of Android) will remain intact.
Windows Phone. To help your smartphone cope with unauthorized entry, you have to go to the Windows Phone service website, where you can use the "Clear" function. The settings will be reset to factory defaults, and you will have to start and build everything from scratch.
Such hacking of smartphone accounts is becoming popular not only due to targeted hacker attacks. Users are often inattentive, and of their own free will fall for the tricks of hackers due to the peculiarities of mobile devices. The same phishing sites (more on them below) on a smartphone seem “not so crooked”, and programs for smartphones downloaded on the network are quite harmless. Be careful when surfing the web using a mobile device. Do not download unverified programs, be especially careful about archive files and files with the .exe extension. At the slightest suspicion, delete the downloaded file without opening it, and run the antivirus.
Social networks.Two years ago, one of the most famous Russian social networks, VKontakte, was hacked. Then the hackers managed to get hold of the lists of users and passwords of more than 100 thousand people. The data was published and for a long time was in the public domain on one of the hacker sites. This means that absolutely anyone could log into other people's accounts and do whatever their heart desires with them: change passwords, send spam on behalf of the user, and many other nasty things. Such a serious information leak was the result of the creation by hackers of an application containing a rather primitive Trojan program. They spread it with the help of spam mailing among users and those who installed this application received along with it a virus that reads the password and login.
What if your social media account gets hacked? You need to clean up the hosts files. If they contain links to your social network, remove them. In addition, it is necessary to arrange a complete anti-virus scan of the computer. And, of course, change your password and be careful in the future. Do not respond to spam mailings, even if they come from friends. You cannot open suspicious applications (not only offering viewing of some erotic photos, but also, for example, posing as a free service). Take all steps as quickly as possible to keep your account secure. Where possible, enable SMS notification of changes to your profile. Phone binding is safer than a secret question. It will allow you to receive SMS messages about all global manipulations on your page, such as changing your password.
Bank card and passport data. This year, as an example, more than 10 thousand Belarusians received fake notifications about blocking credit cards. The scammers asked to send their card number, allegedly to unblock it. It is banal and simple, but, unfortunately, many "fell for" - and became victims of their own gullibility. We've heard a lot about cybercrimes, but we never expect it to happen to us. In vain. Moreover, if, having become a victim of an information leak, you risk losing your savings, and not just the photos of your class from the 90s against the background of the blackboard.
Phishing is now widespread in the vastness of the global network . How it works? The system is a little more complicated than the one described above: hackers create copies of sites on the Internet, for example, of a banking institution. Advertising messages with enticing text are sent (apply for a loan online, get an installment card), users go to trap sites and carelessly leave their details (pin code, account number), passport data, address there. Understandably, soon their bank accounts will be empty. The phenomenon, in fact, is not so new. The very first attempt at such a cyber fraud was a hacker attack on the e-gold payment system in June 2001. But then it was just an experiment. Phishing is now a big threat to both users and companies.
The main phishing method is a fake site or a link to a site that is disguised as a real one. To do this, most often, subdomains are used (you will see a typo in the address bar of the site). For example, twiter.com is very similar to the address of the social platform Twitter, but in reality, it is a phishing site. Outwardly, it looks just like the real one, but this is just a trap. Another popular trick is to use externally correct links, which in reality are not tied to the original, but to phishing sites. For example, the link http: //www.google.com@members.tripod.com/ will lead not to www.google.com, but to members.tripod.com on behalf of the user www.google.com.
It would seem that you should be careful and periodically look at the address bar? Of course, but in recent years, hackers have learned to bypass this little tip for users: using JavaScript, you can change the address bar. For example, place a picture with a fake URL over the address bar. There are many phishing methods, including cross-site (PayPal collapsed in 2006 for this reason), with better disguises, voice instructions, and even support for telephone operators. In order not to become a victim of information leakage and not to fall for the tricks of hackers, never tell anyone the full bank card number, passport information and pin code.
By the way, about the pin code. Even if you store your PIN exclusively in remote corners of your memory, do not say it out loud even in a dream and carefully cover the ATM keyboard with your hand when you withdraw money from your account once a month, this does not mean that you cannot become a victim of information leakage. Today, in order to pay by card via the Internet, you only need your full card number (16 digits on the front) and the security code CVV2 or CVC2. This code is located on the back of the card on the customer signature strip. It is this code that is used to authorize card transactions for online purchases.
So, if you still fell for the bait of scammers and your card details became known not only to you, immediately contact the card issuing bank (the bank that issued the card) and block it, or even better, reissue it. For online purchases, get a separate card (with a limited amount of money) intended for online purchases. Activate the SMS-informing service at the bank. For any transaction, an SMS message will be sent to your mobile phone from the bank, which will allow you to control online transactions. This service is provided by virtually all major banks. It's not that difficult, but it will keep your funds safe.
Fortunately or unfortunately, in the modern world it is impossible to abandon high technologies. Wanting to keep up with the times, we introduce the latest developments into our lives. It is in our power to make this integration secure, to protect ourselves from fraud and cybercrime.
Electronic mailbox. One of the most popular objects for hacking by hackers is mailboxes. Unfortunately, hacking of e-mail is often underestimated by users. However, it is to the e-mail box that many services are usually tied: online banks, an account on a social network, an account in an online game, and so on. Even if you are not an employee of the special services, and WikiLeaks is not interested in your mail information, troubles cannot be avoided. It would seem, why hackers need your mailbox if there is no secret data, no interesting correspondence, no connection to banks? In fact, everything is simple. Today, many banner networks seek to hack even completely innocent random email addresses that are not registered by the antispam system. Having broken into your mailbox, they will quietly, with undisguised joy, send their spam on your behalf to the addresses of your friends. This is the most harmless of the reasons. More "profitable" ones - a little later.
If you become a victim of an information leak and your email is hacked, the first thing to do is scan your computer with an antivirus program: very often it is viruses or malware that get into your computer that breaks your mail. Then go to your account, try to change your password. If you can't do it yourself, try contacting support.
What to do if the email account of foreign postal services (Yandex, Google, Bing, Baidu, Rambler, Mail.Ru, etc.) has been hacked? If you are unable to enter the mail using the old password, click on the "forgot password" option. You will be taken to the authorization page, where you will have to enter all the data about your mailbox, enter the specified text in the field correctly and move on. Then you will need to indicate the backup mailbox or mobile number that you indicated during registration. You can try to contact support. Google service warns its users in advance about an attempt to hack the mailbox - do not neglect such messages. If your e-mail capabilities allow, select the "Show last login" option. If you see that you were logged in under a different IP address, it’s better to change the login password.
Apple / Google / Windows smartphone account. Smartphones, regardless of the manufacturer and working operating system, usually store the most necessary information: contacts, photos, passwords, open accounts on social networks, work and personal mail, linking to banks, etc. Hacking an account is fraught not only with the disclosure of all this information and the loss of money - you risk losing control over everything that happens to your smartphone, and becoming a remotely controlled toy in the wrong hacker's hands.
iOS. Apple technology, due to its popularity, has long been of interest to hackers and fraudsters. It can be easily controlled remotely, provided that the hacker knows your username and password, and, as described earlier, it is not so difficult to get them. If you suddenly realize that "strange things" are happening to your iPhone and anti-virus cleaning does not help, you will have to erase all data. Fortunately, such a function is present. It will completely delete all your data on the device so that they cannot get to intruders in any way. There is a minus: you will not use this data from now on. But believe me, this is much better than losing funds and control over a mobile device. If you are not sure that your account has been mercilessly hacked, and you really do not want to lose data, contact the service center.
Android. This smartphone's operating system has a built-in tool called Android Device Manager, usually tied to a Google account. You can remotely control the device from any computer with Internet access - it's not very good if you've been hacked. A hacker can even lock your smartphone's display or change your picture password. In this case, you can also remotely erase all data from the device - this function resets all settings to factory defaults. This will erase the phone's internal memory. However, the information on a separate SD card (in the latest versions of Android) will remain intact.
Windows Phone. To help your smartphone cope with unauthorized entry, you have to go to the Windows Phone service website, where you can use the "Clear" function. The settings will be reset to factory defaults, and you will have to start and build everything from scratch.
Such hacking of smartphone accounts is becoming popular not only due to targeted hacker attacks. Users are often inattentive, and of their own free will fall for the tricks of hackers due to the peculiarities of mobile devices. The same phishing sites (more on them below) on a smartphone seem “not so crooked”, and programs for smartphones downloaded on the network are quite harmless. Be careful when surfing the web using a mobile device. Do not download unverified programs, be especially careful about archive files and files with the .exe extension. At the slightest suspicion, delete the downloaded file without opening it, and run the antivirus.
Social networks.Two years ago, one of the most famous Russian social networks, VKontakte, was hacked. Then the hackers managed to get hold of the lists of users and passwords of more than 100 thousand people. The data was published and for a long time was in the public domain on one of the hacker sites. This means that absolutely anyone could log into other people's accounts and do whatever their heart desires with them: change passwords, send spam on behalf of the user, and many other nasty things. Such a serious information leak was the result of the creation by hackers of an application containing a rather primitive Trojan program. They spread it with the help of spam mailing among users and those who installed this application received along with it a virus that reads the password and login.
What if your social media account gets hacked? You need to clean up the hosts files. If they contain links to your social network, remove them. In addition, it is necessary to arrange a complete anti-virus scan of the computer. And, of course, change your password and be careful in the future. Do not respond to spam mailings, even if they come from friends. You cannot open suspicious applications (not only offering viewing of some erotic photos, but also, for example, posing as a free service). Take all steps as quickly as possible to keep your account secure. Where possible, enable SMS notification of changes to your profile. Phone binding is safer than a secret question. It will allow you to receive SMS messages about all global manipulations on your page, such as changing your password.
Bank card and passport data. This year, as an example, more than 10 thousand Belarusians received fake notifications about blocking credit cards. The scammers asked to send their card number, allegedly to unblock it. It is banal and simple, but, unfortunately, many "fell for" - and became victims of their own gullibility. We've heard a lot about cybercrimes, but we never expect it to happen to us. In vain. Moreover, if, having become a victim of an information leak, you risk losing your savings, and not just the photos of your class from the 90s against the background of the blackboard.
Phishing is now widespread in the vastness of the global network . How it works? The system is a little more complicated than the one described above: hackers create copies of sites on the Internet, for example, of a banking institution. Advertising messages with enticing text are sent (apply for a loan online, get an installment card), users go to trap sites and carelessly leave their details (pin code, account number), passport data, address there. Understandably, soon their bank accounts will be empty. The phenomenon, in fact, is not so new. The very first attempt at such a cyber fraud was a hacker attack on the e-gold payment system in June 2001. But then it was just an experiment. Phishing is now a big threat to both users and companies.
The main phishing method is a fake site or a link to a site that is disguised as a real one. To do this, most often, subdomains are used (you will see a typo in the address bar of the site). For example, twiter.com is very similar to the address of the social platform Twitter, but in reality, it is a phishing site. Outwardly, it looks just like the real one, but this is just a trap. Another popular trick is to use externally correct links, which in reality are not tied to the original, but to phishing sites. For example, the link http: //www.google.com@members.tripod.com/ will lead not to www.google.com, but to members.tripod.com on behalf of the user www.google.com.
It would seem that you should be careful and periodically look at the address bar? Of course, but in recent years, hackers have learned to bypass this little tip for users: using JavaScript, you can change the address bar. For example, place a picture with a fake URL over the address bar. There are many phishing methods, including cross-site (PayPal collapsed in 2006 for this reason), with better disguises, voice instructions, and even support for telephone operators. In order not to become a victim of information leakage and not to fall for the tricks of hackers, never tell anyone the full bank card number, passport information and pin code.
By the way, about the pin code. Even if you store your PIN exclusively in remote corners of your memory, do not say it out loud even in a dream and carefully cover the ATM keyboard with your hand when you withdraw money from your account once a month, this does not mean that you cannot become a victim of information leakage. Today, in order to pay by card via the Internet, you only need your full card number (16 digits on the front) and the security code CVV2 or CVC2. This code is located on the back of the card on the customer signature strip. It is this code that is used to authorize card transactions for online purchases.
So, if you still fell for the bait of scammers and your card details became known not only to you, immediately contact the card issuing bank (the bank that issued the card) and block it, or even better, reissue it. For online purchases, get a separate card (with a limited amount of money) intended for online purchases. Activate the SMS-informing service at the bank. For any transaction, an SMS message will be sent to your mobile phone from the bank, which will allow you to control online transactions. This service is provided by virtually all major banks. It's not that difficult, but it will keep your funds safe.
Fortunately or unfortunately, in the modern world it is impossible to abandon high technologies. Wanting to keep up with the times, we introduce the latest developments into our lives. It is in our power to make this integration secure, to protect ourselves from fraud and cybercrime.
