Phishing: Are You One of the Victims?

19 December 2019

Have you ever received a message containing a link in the name of a well-known company? Be careful, you could be a victim of phishing.

Phishing is a hacking method that involves tricking the target by providing a fake page that “appears” to be from a well-known company. For those of you who have received an email inviting you to access a certain link with the promise of a prize, you need to be careful. When you access the provided link, you can fill in various personal data, such as full name, address, credit card number, telephone number, and so on. This data can be used by hackers to take over your account and can also be used to carry out fraudulent practices. Unfortunately, victims of fraud may think that you did it. How could you not? Hackers could pretend to be you after successfully taking over your social media accounts.

The impact of a phishing attack causes social and psychological problems for the victim that can last a long time. Phishing also targets target markets. Almost all levels of society are vulnerable to this attack. The digital world knows that phishing is nothing new. Phishing has evolved from email-based attacks, now expanding to attack mobile devices and social media. This ongoing evolution takes advantage of an increasingly connected world. Moreover, information technology has become embedded in society's social life. Thus, perpetrators have more options when targeting their victims than simply email-based ones.

Based on the latest report from AKAMAI, an internet security research institute based in Singapore, there are various methods of phishing attacks. The findings from this research stated that the domains used to carry out phishing attacks were disguised as the most well-known companies in the world. The company's reputation is used to make it easier to trick victims. Many victims are trapped by fake phishing domains. At first glance, the site has the same appearance and looks like the original. When the victim enters the User ID and PIN into the fake domain database instead of logging in to the real account. Finally, the perpetrator got the sensitive data. Furthermore, the perpetrator freely uses the victim's account armed with this account information. More than 60% of the kits monitored by Akamai were active for only 20 days or less. This shortened time duration is a new avoidance technique. The perpetrators try to protect their devices so they are not easily detected.

Berita Lainnya

01 Sep 2020

Annoyed with DS, Outsourcing Employee Umbar DS Info on Twitter

FPH is suspected of having illegally accessed the PT Telkomsel database, by abusing its authority to obtain someone's personal data. FPH then sent a photo of the display. . .

Link


26 Aug 2020

Hackers of 1309 sites belonging to State Institutions, Have Been Arrested by Cyber Police

ADC carries out illegal access to the targeted sites, then sends ransomeware with the intention of getting the victim to send a certain amount of money (Rp. 2 – 5 million) by promising to send a Decrypt Key to open the site. . .

Link


24 Jan 2020

Perpetrators of Malware Distributors on an "International" Scale Successfully Arrested

Do you still remember the article that discussed the level of cyber security in Indonesia? Recently, Dittipidsiber Bareskrim Polri succeeded in uncovering the perpetrators who spread malware which is a threat to users of e-Commerce sites in Indonesia, and even the world. The disclosure was carried out under the banner of Operation Night Fury, which consists of law enforcement agencies

Link