Hackers continue to successfully dupe people into clicking on stager, l. e. (1991). eroticism and infanticide at ashkelon. biblical archaeological review 17,shady (though carefully disguised) links, thereby gaining access to the text messages, Facebook accounts, and e-mails on both computers and phones.
A new in-depth cybersecurity report -- undertaken by the cybersecurity firm Lookout and digital rights group the Electronic Frontier Foundation -- shows that professionals of all persuasions are making poor clicking decisions: military personnel, medical professionals, journalists, lawyers, and universities.
SEE ALSO: Google investigators find hackers swipe nearly 250,000 passwords a weekThe perpetrators of this recently uncovered hacking scheme have been dubbed "Dark Caracal" by the report, and the cybersecurity researchers present compelling evidence that the group has been operating out of a building in Beirut, Lebanon (which happens to be owned by the Lebanese General Directorate of General Security) since 2011. Phones or computers were breached in at least 21 countries, including the United States, China, and Russia.
The hackers used common, though still sophisticated, phishing techniques to steal text messages, call records, audio recordings, photos, and other data from their targets. Broadly speaking, phishing involves hackers disguising themselves as trustworthy or known sources -- perhaps an e-mail from a bank or social media account -- and then tricking people into sharing confidential information.
“One of the interesting things about this ongoing attack is that it doesn’t require a sophisticated or expensive exploit. Instead, all Dark Caracal needed was application permissions that users themselves granted when they downloaded the apps, not realizing that they contained malware,” said Electronic Frontier Foundation technologist Cooper Quintin in a statement.
In the case of the once-secret Dark Caracal operation, these hackers used WhatsApp messages and Facebook group links to successfully dupe people into clicking, and thereby allow spying and password collecting malware to enter their Android phones and computers. In the cybersecurity realm, these are called "waterhole attacks," in which hackers identify the specific websites or apps used by a certain group of people -- like an activist group or military organization -- and infects these sites with malware in hopes that someone will click.
For instance, Dark Caracal sent WhatsApp messages to specific individuals, suggesting that they click on a link in a message. Dark Caracal also dropped links into Facebook groups and created mock login portals for Facebook, Google, and Twitter accounts -- where some folks invariably typed in their passwords.
Successful phishing campaigns are inherently deceptive, intended to feel trustworthy and encourage interaction. These sort of operations are surely not going away -- in fact, they appear to be expanding in use and popularity.
For this reason, one can employ two simple tactics in a malice-filled web: First using two-factor authentication to add a layer of security to your e-mail and social media accounts (although this is far from full proof -- Dark Caracal appears to have even stolen 2-FA pass codes). The second is to always carry a healthy sense of distrust on the web, which in short means, don't click.
Topics Cybersecurity Facebook WhatsApp
First look: Elon Musk unveils the Tesla Semi truckThe 8 best poop stories of 2017Leonardo da Vinci painting smashes record for most expensive artwork sold at auction'Jane the Virgin' recap: Who killed Anezka?Ivanka Trump's website has some very weird ideas for your ThanksgivingRyan Seacrest being investigated by E! over sexual harassment allegationSarah Silverman responds to Louis CK allegations with painful honestyFireballs shoot across sky as Leonid meteor shower peaksNES mod gives the console its own builtTesla has new megachargers for its Semi trucks'Justice League' had DC's worst box office yet. What does Warner Bros. do now?London theatre receives 20 claims of inappropriate behaviour by Kevin SpaceyWant to make music on Spotify? A new acquisition could make it possible.Why this woman wants to make 'upskirting' a sexual offence in the UKElon Musk says Tesla Semi trucks are BAMFsThat viral Chinese library has turned out to be a bit of a shamGerman regulator tells people to destroy smartwatches made for kidsIt’s not you... except when it is: A guide to getting promotedWhy does Facebook suddenly have a page for the 'Top 10 goat posts'?The reason why the OnePlus 5T is launching five months after the 5 A Graphic Novel before the Term Existed by James Sturm The Queer Crime That Launched the Beats by James Polchin Sigrid Nunez’s Portraits of Animal Intelligence by Peter Cameron The Birth of the Semicolon by Cecelia Watson Remembering Toni by The Paris Review Susannah Hunnewell, 1966–2019 by The Paris Review Maurice Sendak at the Opera by The Paris Review A Circus of Mallarméan Delights by Rachel Kushner Staff Picks: Fathers, Fleabag, and the French Toast of Agony by The Paris Review Staff Picks: From Aphorisms to Zorn by The Paris Review The Central Park Squirrel Census by Jamie Allen How Stanley Kubrick Staged the Moon Landing by Rich Cohen Redux: Helpless Failed Brake by The Paris Review Participating in the American Theater of Trauma by Patrick Nathan Three Sisters, Three Summers in the Greek Countryside by Karen Van Dyck Eat This Book: A Food Toni Morrison, 1931–2019 by The Paris Review The Aesthetic Beauty of Math by Karen Olsson A Cultural History of First Words by Michael Erard On the Eve of My Eternal Marking by Jenny Boully
0.9444s , 10194.5 kb
Copyright © 2025 Powered by 【stager, l. e. (1991). eroticism and infanticide at ashkelon. biblical archaeological review 17,】,Wisdom Convergence Information Network