Operational security professionals work to figure out where their information can be breached. Looking at operations from a malicious third-party’s perspective allows us to spot vulnerabilities we may have otherwise missed so that we can implement proper countermeasures. The most important thing to understand here is the path of the cyber attack – its vector. Let's take a closer look.
Сheck out my recent article:
Let’s take an hypothetical situation in which your computer gets infected with a Remote Access Trojan (RAT) virus. One of two things may happen. If the attack was carried out by a rookie hacker (i.e a lamer) then he likely orchestrated a wide massive attack without a target in mind. He can steal some information on you like your browser cookies and then sell it.
The second option is that this was a direct attack. The hackers made a phishing page on your router, through which you could enter your password (poisoning of the DNS server). To prevent this type of attack, you ideally need to separate your machines and networks. You should also check certificates.
Here is an example of a very dangerous cyber attack on your crypto wallet:
Consider checking the entire address of your addressee’s wallet before you click Send.
Sophisticated crypto criminals will throw at you a mix of attack vectors. It could be a Social Engineering vector, plus phishing and a classic malware. They might even attempt a physical attack!
Let us take Jane who is a diligent employee at her company. Information about Jane is publicly available on her social networks. Some sensitive information about her might have even been revealed in some leak, such as the 2014 Yahoo Mail user account information breach. Generally, she is no different from you or us. So far, so good.
But then, a troll shows up and starts stalking her around the social networks, writing hurtful comments, for example. He expands his cyberbullying to others in Jane’s company, bringing distress to his victims.
Even at this stage, the attack has done enough damage to cripple the culture of openness inside the company. Employees may stop sharing personal information or speaking candidly about problems for fear of ridicule or retaliation.
Jane continues to suffer the troll's attacks in silence. If Jane blocks the troll’s account, he will make another. If he knows her address, multiple pizza deliveries may suddenly arrive at her door. It is no life.
At this point in our story, in comes John. He is a stranger but, he too, has a public account and has suffered from the actions of this same troll as evident from attacks on his page. He makes Jane a proposition for cooperation on how to stop the attacks. He says he knows a way to silence the troll.
Sure he knows the way. The Knight to the Rescue and the Evil Troll are one and the same person. The troll’s trick was to establish an emotionally supportive bond with someone who was experiencing pain. John created a condition where Jane is now more likely to follow John’s seemingly innocent suggestion. She may click on a URL link or open a file sent to her. She might even come out and meet John.
This story may end badly for Jane. A potential scam by John should have been stopped at the beginning – at the stage when the target got recruited.
Are there any good guidelines to follow so that we do not end up in Jane’ position?
Exploitation of love or anger happens less often because the scammer would need to maintain a psychological connection with the victim, requiring skill, time and familiarity with the target. In our situation the scammer exploited the victims' fear. What is more, in order for this attack to succeed the victim had to be rushed.
A skillful social engineer will not give the victim much time to think, and will always press for urgency. This is the first thing to pay attention to – If you are rushed to give out sensitive information (or any information at all, for that matter), it is a good time to pause.
The second point to note is that when you find yourself in a similar situation, do not try to solve the problem by yourself. Ask a friend, a frequent contributor to your favorite Discord server or a moderator of any well-known DAO. Good people want to help. Get a second opinion.
Sometimes scammers just want to get dirt on the victim or de-anonymize the target. Often, however, sophisticated cyber exploits can come coupled with either a malware injection or a phishing attack, or some other surprise.
Yes, it seems like it is a veritable minefield over there. Keep the faith. Learn the latest attack techniques, whitehat cheat sheets and defenses. Only knowledge can defeat criminal’s knowledge. In this intellectual boxing match the most prepared wins, and we want that to be you!
Support is very important to me, with it I can spend less time at work and do what I love - educating DeFi & Crypto users!
If you want to support my work, you can send me a donation to the address: