How To Keep Your Online Accounts Safe From Hackers


Before we get into today's topic, it is important to be VERY careful what you search for, click, download, receive in your email's inbox, etc. Letting your guard down for even a few moments can put your online accounts, and PC/mobile device at massive risk. In most cases, it can turn your real life upside down!


What Are Info Stealers?


Info stealers have become THE most common form of cyber attack today, with ransomware following closely behind. Info stealers come in a few forms, namely, phishing emails containing links to malicious websites asking for your email address and passwords, downloaded executable files, and even ordinary-looking files, like .svg, .html, .pdf, and .docx files (with malicious macros). So what does an info stealer do? An info stealer's purpose is to steal the victims' crypto wallets, online accounts, banking information, and more. A downloaded malicious file can easily hide from your anitvirus using clever tactics, such as being large in file size, hiding malicious code by only linking and executing off from a malicious website, hiding in a password-protected zip file, etc. Once the stolen data is harvested, the hacker (likely just a script kiddie) will sell it on the dark web for a quick buck. If another hacker purchases your stolen data and accounts, they can then use it for their own nefarious purposes, such as spreading crypto scams, sending your contacts phishing emails, identity theft, etc.


A Tip To Spot Malicious Files (Local Attacks, NOT Online Attacks):


Whether you're on Windows, MacOS, or Linux, you should always keep you file manager's file view in some form of "detailed list mode". The name of this feature will be different depending on your file manager you use. Switching your view from "large tiles" to "list mode" allows you to not only see the fake icon, but also the file's true extension name, and the file's size. Never trust a file name and an icon on its own. The file extension and size are the most important. If a file is abnormally large, or the icon doesn't match the extension type, you should start to grow very suspicious of that file. Delete it immediately. Do not even try to scan the file to see if it's "safe" for opening. False negatives are far too common. Also know that hackers like to hide their malicious executable in large tile mode by givng it a fake extension, that will hide the true extension, such as "totallynotavirus.pdf.exe" for example. The last extension is always the true extension the computer uses to open the file. The first extension (.pdf) in this example will make it APPEAR as an acutal PDF file in large tile mode.


Let's Talk About The Biggest Security Threat Of The Modern Day - Web Browsers


You are likely aware that data such as your browsing history exists. You maybe even heard of "cookies". Many websites will ask you to accept third party cookies, which is questionable in terms of privacy, but it's not a security threat. However, there is another type of cookie which almost nobody ever talks about, or even knows about, and that is a "session cookie". Have you ever logged into a website for the first time, only to then be automatically logged in the next time you visit that website? You can thank your session cookie for granting you access to your account on that website. And THIS, ladies and gentlemen, is what hackers are after. There are "session tokens as well", which have a similar purpose, but let's stick with the name "session cookie" for now for simplicity sake. Cookies are stored locally in your browser, and can be seen by pressing F12, and navigating through the developer settings within your browser, until you find your browser's local storage. It is recommended to clear your browser's history, cookies, etc. at least once per week. The reason why info stealers and hackers love to target victims' session cookies, is that these cookies accumulate over the months, or even years of the victim using their web browser. Many ordinary people never clear this data from their browsers, and thus, create a bigger potential "blast radius" for themselves if they DO ever get hacked by an info stealer. By regularly flushing out these locally stored cookies from your web browser, you dramatically decrease the blast radius of a potential attack, because the hacker will have little-to-no access to your online accounts. Be aware though, that if you're signed into Google, all your Google platforms (Drive, Gmail, YouTube, Photos, etc.) will be at risk of an attack. It is recommended to always sign out of Google (Gmail), or Microsoft (Outlook) when you don't need these accounts and their services. Any website you log into and use, should then be logged out of when you no longer need it. This will delete your session cookies/tokens, but just to be on the safe side (If you forget to log out of a website), clear your cookies as well, just for in case there are any residual cookies/tokens. Remember, that any convenience you are given in a web browser, comes at a security cost. Convenience IS a security threat, and there's unfortunately nothing we can do about it. You win some, you lose some. Being more secure means sacrificing convenience. This also means NOT using any ol' browser extension/plugin! These small programs are another popular thing for hackers to take advantage of. They'll fake the number of downloads, the reviews, etc. to appear "trustworthy". You can't even trust a "verified" badge, because Google, or Microsoft can always overlook threats, and accidentally verify them as "trustworthy" extensions/plugins. I bet you're probably thinking that this whole cybersecurity thing is a deep rabbithole. And it is. Let's move on with the next heading.


Types of Phishing Emails To Avoid:



Email Spoofing


Email spoofing is the art of faking an email address to look like it comes from the real source. Just because the email address is spelled the same as the legit email address, be very careful. Hackers just have to swap out a Latin "e" for a Cyrillic "ะต" to appear like the real deal. Can you tell the difference between the two characters? Not with a naked eye, no. That's all it takes for hackers to fool people into believing the email address is legit. There are websites out there that help you find out whether an email address is spoofed or not.


Other Ways To Keep Yourself Safe:



Just before You Leave This Blog...


It is always a good idea to educate oneself on cybersecurity and privacy. Remember, security comes first, THEN you may worry about privacy. As with anonymity, unless you're some whistleblower, or a wanted criminal the government is after, you don't have to worry about anonymity. Always clear your cookies and other site data on all your browsers (PC and mobile), and be very suspicious of any unusual emails you receive, or files you want to download. NO VPN service will protect you from threats, contrary to popular belief. If a company says their VPN service will protect you from hackers, run FAR away, and don't give them your money and data (Yes, VPNs are just a way to transfer your real IP address from your ISP to some random company that logs your connections anyways). Free VPNs are to be ESPECIALLY avoided. Remember, if you don't pay for something, YOU ARE the product. Hackers in anyway don't even need your IP address to cause harm. It's actually one of the least reliable data points for a hacker. Okay, bye now. Nobody will ever be 100% safe, but reducing attack surface is always SOMETHING.