Category Archives: Wi-Fi

  • 0

“The Travelers Guide To Wi-Fi Hacking”

Dear Blast Reader,

Do you stay at hotels when you travel? Do you ever use the hotel internet? Did you know that there may be someone spying on you while you are in your hotel? Did you know that hackers target hotel Wi-fi? Did you know that the hackers that target hotel wi-fi also target traveling business professionals?

 

Hotel wi-fi is targeted and compromised to assist in the delivering of the malicious payload to the selected victims. A ­payload is the part of the malware that performs the malicious action. Those behind the attack continually evolve the malware’s tactics and payload. It is believed that the attackers are exploiting the vulnerabilities in the server software, either by:

  • Gaining remote access.
  • Physically gaining access to the hotel and the hotel’s servers.

 

Now, attackers are using a new form of malware known as the “Inexsmar Attack”. This attack starts with a phishing email.  To make the email look real, the message is tailored to you. This email address you by name, and has real looking documents attached.

 

But, looks can be deceiving. Within this email there is a self-extracting archive package. This is a package that begins the trojan downloader process. A trojan downloader process is a malicious program, usually installed through an exploit or some other deceptive means. Using email attachments the malware is installed onto your computer. Once you are convinced to open the attachment, hackers will then initiate their malware attack.

 

How does the malware go un-detected?

To prevent being detected, the malware is downloaded in stages. These stages include:

  1. Hiding malicious codes and strings by linking malicious code to otherwise unrelated code.
  2. The malware then runs an operation to download the second part of the payload, the trojan malware.

 

So, as your defences improve, it is believed that the multi-stage download for the trojan malware is an evolutionary way to keep the trojan viable.

So, how do you protect yourself?

To protect yourself against this new form of advanced and evolutionary trojan malware, here are a few tips:

  1. Use public wi-fi as little as possible. Hackers exploit public wi-fi in places like coffee shops, restaurants, and hotels.
  2. Use a Virtual Private Network, also known as a VPN. VPNs are encrypted web browsers that hide your IP addresses & your location.

 

If you have any questions about Hacking, Malware, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit out website at www.FDS.Global.


  • 0

“In A Day Where Everything Is Getting Smarter, It Might Be Smarter To Play Dumb”

Dear Blast Readers,

 

Did you know that 6.6 million people in the US are stalked every year*? Only 1 in 5 victims are stalked by strangers*. 85% of stalking victims know who their stalkers are*. Did you know that there are 78% of stalkers use more than 1 approach when it comes to stalking their victims*?

 

We live in a day and age where technology is continuing to get smarter. With technology getting smarter so are the cyber criminals. Today Cyber criminals are always looking for vulnerabilities and back doors to provide access to his or her next victim.

 

Recently, vulnerabilities in cyber security have been found hiding and lurking in the shadows of smart appliances. Some examples of smart appliances include:

  • Smart Refrigerators
  • Smart Slow Cookers
  • Smart Dish Plates

 

Smart Refrigerators can have 3 built in cameras, that allow you to see inside of the Refrigerators from where ever you are. They also can have the capability of streaming music, streaming videos, as well as sharing calendars, notes, memos and pictures. The Smart Refrigerators can also have voice activated features. If these refrigerators fell victim to a hack attack, then hackers would have total control over all the features.

 

By hacking the Smart Refrigerators, hackers can then peer into your life. Watching you, your spouse, and even your children with the help of the video feed that comes from the Smart Refrigerators cameras.

 

Also, they can listen to every conversation going on inside your home because of the voice activation speakers (the speakers that help to refrigerator listen and respond to your commands).

 

The Smart Refrigerators can also share calendars, notes, memos and pictures. If a hacker was to gain access to this information, it could be sold on the dark net to someone with malicious intent. But, you could also be stalked. With this information, a stalker would know your schedule, know what your family and friends look like, where your favorite places are, among other things.

 

A Smart Slow Cooker is another smart device that cyber criminals and/or hackers could use to their malicious advantages. Being a Bluetooth connected device allows the Smart Slow Cooker to connect to smartphones (both Android and iOS devices), and tablets that have the Smart Slow Cookers application. From this application, you can control all the features, including:

  • Adjusting the temperature
  • Turning the Smart Slow Cooker on/off

 

With access to the Smart Slow Cookers, hackers would be able to get into the application and mess with the settings. They would be able to turn it on and off as they pleased, they would also be able to control the heat settings, possibly being able to blow the power source creating a fire. Hackers would be able to do all of this without the consent or knowledge of the device’s owners.

 

Do you wear a fitness tracker on your wrist consistently? Do you monitor your caloric intake with said device? Did you know there is a Smart Dish Plate that can help you track your eating habits and calorie intake? The Smart Dish Plate is Bluetooth and Wi-Fi connected. It connects to your smartphone, via application, and your fitness tracker. It also has 3-mini built in cameras.

 

If hackers and/or cyber criminals were to gain control over this device, then it is likely that your phone and its data will be targeted as well. This leads to the possibly that this data could be sold on the dark net.

 

With the 3-mini built in cameras, hackers would also be able to spy on you through the camera feed.

 

By gaining access to the smart kitchen appliances, hackers can do many things without your knowledge or consent. They can control the device and all its features and they can also gain access to any other internet connected device connected the same network, including:

  • Smartphones
  • Tablets
  • Computers
  • Alarm systems

 

If you have any questions about hacking or cyber security contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please Feel free to visit our website at www.FDS.Global.

 

 

 

*(The statistics represented in this blast were identified from: Stalking Information. N.p., n.d. Web. 17 Apr. 2017.)*


  • 0

“Beware of the Facebook Notification Virus”

Dear Blast Readers,

 

You are on your Facebook account, answering messages, liking posts, watching videos, and commenting on your friend’s photos. Suddenly, you receive a message from your friend Sam. The message contains a link to a funny cat video in which a cat in a hat is dancing with a maraca in its mouth. The message below the video says “Hilarious video. You NEED to check it out!”. Without giving it a second thought you click on the link to view the video. But, instead of viewing the video you get redirected to a site that you don’t recognize or trust. Naturally, you exit out of the browser thinking that maybe Sam has attached the wrong URL. But, it is too late. Your device has already been infected.

 

Security experts have identified a form of adware that targets social media users tricking them into infecting their own devices. It is known as the “Facebook Notification Virus”. This virus displays messages saying that they are from Facebook. The “Facebook Notification Virus” creates many different forms of messages, including:

  • Friend Requests
  • Chat Messages

 

Some of the notifications that the user received are real copies of notifications that users would see on the real social media site (making the fake notifications seem legit). While other notifications are presenting new features. The purpose of this adware is to redirect users to specific websites, most likely malicious websites, so that the user’s device becomes infected with malicious software. This virus does not just lead users to malicious websites, it also:

  • Monitors User Activity
  • Collects User Information
  • Records Browsing History
  • Tracks Cookies
  • Tracks Keystrokes
  • Tracks IP Addresses
  • Tracks Geographic Location
  • Tracks Zip Codes
  • Tracks Demographic Profiles
  • Tracks Emails
  • Tracks Telephone Numbers
  • Tracks Usernames
  • Tracks Passwords

 

After all this information is collected, the collector, hacker, will then attempt to sell your confidential information on Darknet Markets, then falling into the hands of much more malicious cyber criminals.

 

So, how does this virus spread?

 

The “Facebook Notification Virus” can be spread a few different ways, including:

  • Freeware
  • Shareware
  • Pirated copies of paid utilities.

 

Another way that it can spread is through spam emails. The sender of the spam emails wants you to open the so that his or her tool can get inside your system and infect it.

 

To protect your data and system from the “Facebook Notification Virus”, if you receive any suspicious messages from “Facebook”, you should:

  • Check your system, because you may have been infected.
  • Be careful of the software that you allow in your machine.
  • Verify the email addresses of the “companies” that have messaged you (visit the contact page on the official website of the “company” to verify the email address).

 

If you have any questions relating to the “Facebook Notification Virus”, cyber security, or computer forensics contact FDS Global. You can reach us at our office at (954)727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.


  • 0

“Is Your Phone Watching You While You Sleep?”

Dear Blast Readers,

 

Have you ever had the hair on the back of your neck stand up because you thought you were being watched? Have you ever wondered if you were being spied on? Imagine your every move being watched and listened to without your knowledge. Have you ever considered that maybe, your smartphone is watching and listening to everything that you say and/or do?

Usually, when someone thinks about a “Smartphone” you think about all the different things that you can do on the phone. The different applications that you can run. Applications like:

·        Gaming Apps

·        Messaging Apps

·        Shopping Apps

·        Social Media

·        Internet Browsers

 

Digital Forensic Analysts are worried about malware that can remotely take over features of a smartphone. With this ability, Hackers can take over, and use your phone’s camera and microphone. This lets them gain the ability to listen in to your conversations and watch you through your camera.

More times than not, these issues arise as the result of old software in need of an update. Therefore, older models of technology become out-of-date so quickly.

Security researchers have found another example on how hackers can spy on smartphone users. It might seem like a complicated process to accomplish the task of taking over a smartphone’s Camera and Microphone. This form of exploit works the same as any other form of malware. Firstly, you will be sent a message to download an app that seems real, or you could be re-directed to a secondary website. If you proceed with the download these programs attempt to gain control of the smartphone functions through security holes in the phone. Once the App is installed the hacker can collect surveillance information.

FDS’ Tips on preventing hackers from spying on your smartphone:

1.      Do not click on links sent from unknown numbers

2.      Do not click on pop-up windows with links

3.      Do not install Apps onto your phone if you are not sure who has manufactured them.

 

If you have any questions relating to our tips or computer forensics and cyber security contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.


  • 0

“Year of the Hack!”

 

Dear Blast Readers,

 

From everyone here at FDS Global we would like to wish you a Happy New Year. But as the New Year begins we are in the most tumultuous point in history when it comes to Cyber Security. Many new threats that have arose at the end of 2016 and many more will arise in 2017. With claims of the United States Government being HACKED by foreign entities such as Russia and China companies and the lay person has much to fear, but as an old saying goes prepare for but pray for peace. With this saying in mind, the best strategy to counter possible attacks is to prepare your company with the best defenses.

 

Here are some helpful tips that will keep you ahead of the Cyber Criminals and their attacks.

1. Change, if there is one thing that both IT professionals and Cyber criminals have in common is that fact that they both do not like change (but for different reasons). IT professionals do not like change because they want to keep the systems and processes static to:

  • Make their lives easier and
  • To keep their work organized.
    • Cyber Attackers on the other hand thrive off static networks. This is because if these networks do not change than they can study them, learn all the ins and outs (using that knowledge to compromise your data.
    • If you want to make the life of a cyber-criminal difficult, create & environment that prospers with change (meaning move your data and change the networking design & changing passwords regularly).

2. Use Antivirus and Antimalware software. Antivirus and Antimalware software are critical to any company in the defense of Cyber-attacks. The most important key to using Antivirus and Antimalware software is regularly updating them, this help prevents from zero-day attacks. Zero-day attacks use viruses and malware recently created.

3. Monitor for irrelevant information usage. It is important to watch for activity that does not make sense for your company/organization. Cyber criminals do their homework before they attack a company/organization, meaning they know how to slip through the cracks. Spotting suspicious activity, like an employee who no longer works with the company doing something inside the network is an example of suspicious activity. Being vigilant can be help stop data breaches.

4. Back Up your IT Environment. Did you know that one of the leading causes of Data Loss is human error? To help prevent data loss back up your IT environment, so that if something happens you have a recovery point to start from. Having a recovery point will help mitigate the amount of information lost and decrease the amount of time until your company is back up and running.

5. Train your Employees in Cyber Security. Cyber Security education and training is important for employees to learn. It teaches them why it is important to watch for suspicious activity, as well as the importance of changing passwords. Teaching employees this will help you have a more vigilant work force.

 

If you have any questions on Strong Passwords, Good Antivirus and Antimalware software, what constitutes “irrelevant network usage”, the proper way to back up your IT Environment, or are interested in FDS Global’s Cyber Security Training and the CLE credits that coincide please contact us by phone at 954-727-1957, or contact us by email at rmoody@forensic-data-svc.com. Also, Visit our website at www.FDS.global. `