Ethical Hacking & Cyber Security Course in Bangalore

Overview

Chapter-1

What is Ethical Hacking &
Cyber Security

Chapter-2

How to get Started in the Field of
Ethical Hacking

Chapter-3

Ethical Hacking Certification
Course

Chapter-4

Increasing need of
Cyber Experts

Chapter-5

Career in Cyber Security and
Digital Forensics

Chapter-6

Increase in Cyber Crimes

Chapter-1

Ethical Hacking and Cyber Security

What is Ethical Hacking?

In simple words, ethical hacking is the process of breaching a computer system in a supervised and legal manner to highlight exploitable vulnerabilities

The History of Ethical Hacking

1. Attacking your own defense to locate weakness has  been around for over 1500 years. Ethical Hacking brings that practice into the digital world

2. The term “Ethical Hacking ” was first used by IBM’s John Patrick in 1995

3. Google Paid White Hat Hackers more than $1.5 million in 2014 to find bug

Types of Hackers

  • Black Hat
  • White Hat
  • Grey Hat
  • Script Kiddie
  • Hacktivist
  • Black Hat Hacker : are hackers with malicious intentions
    Motives: 
  • White Hat Hacker: are Ethical Hacker
    Motives:
  • Grey Hat Hacker: are both black and White
    Motives:
  • Script Kiddie: are Unskilled hackers who use real hackers’ tools and programs.
    Motives:
  • Hacktivist: are hackers promoting a political agenda or a social change.
    Motives

Chapter-2

How to get Started in the field of Ethical Hacking and Cyber Security

The Secrets of the Dark Web

top ethical hackers of india

THE DEEP WEB

The internet in the present days is been compared to many things: A fighter jet; A Nuclear Weapon; and most famously a series of tubes. As it is compared to an iceberg which takes down the whole yacht in minutes. The 10% of the network we call the internet is available in a normal search to the general public. Hidden below the virtual waterlines a surprising and secretive network Known as Deep web.

The Dark web can be only accessed with a special browser such as The Onion Router (TOR). the deep web is built on the basis of peer-to-peer connections, which allows to safely share files directly.

The Deep web has strong support to appeal to privacy advocates, who have taken huge advantage of the lack of tracing or identifying to the shield their anonymity from advertisers and officials alike. A former CIA agent Whistleblower Edward Snowden used the Deep web to collect much of the information that carried him into a worldwide discussion, and columnists around the world are coming to rely on it as a secure alternative to the public web searching for sensitive, confidential and dangerous information.

But the tight-lipped nature of the network has also made its own criminals of various stripes, Human organ trade, trafficking from illegal drugs to a stolen credit card to the child pornography. An online marketplace named as “THE SILK ROAD” driven by the internet currency Bitcoin. The subjected headlines in 2013 when the expertise succeeded in shutting it down. The site had its own prominence as the internet’s go-to destination for illegal sales of drugs, and its death spawned both a crowd-sourced documentary.

An organization such as AT&T, eager to examine, control activity and track within the misty borders, are working restlessly to bring light to the far end of the Deep Web. Government and law enforcement agencies, illegal trafficking, leaks, and concerned about privacy, are the unfamiliar positions striving to police the same wild and wooly neither world rely on for their own hidden operations. But secrets, scandals, and skulls will always find their path to the darkest parts of the web, and while destiny of the Deep Web may be as dark as its twisted triangles, it’s certain to remain a portion of internet wisdom for years to come.

Originate Of Deep Web

The term, “Deep web,” was stamped in 2001 by BrightPlanet, an Internet search Technology corporation that practices in searching deep web content.

Military sources of Deep Web – Like other sectors of the internet, the Deep Web began to build with the help of the U.S. military, which inquired a way to communicate with intelligence assets and Americans commissions abroad without being exposed. David Goldschlag, Michael Reed, and Paul Syverson mathematician at the Naval Research Laboratory started working on the idea of “ONION ROUTING” in 1995. Their research shortly developed into the Onion Router project, famously known as TOR, in 1997.

The U.S. Navy published the TOR code for the use of the public in 2004 and 2006 a group of developers built the TOR project and published the service currently in use.

Download TOR From Here https://www.torproject.org/download/download

Why Google Won’t Find Everything?

Present’s biggest search engines are much more capable than they were 20 years ago. They can foretell your search, perform multi-word queries, and serve billions and trillions of webpages.

Nevertheless, despite Google’s web intrepidity, it and other search engines have a very cramped view of what’s out there.

Search engines operate by “crawling” links on a website. If a site owner doesn’t want their page to be disclosed or to be found, it won’t introduce a direct link to that page. If there is no link on a web page, it can’t be crawled or indexed in Google’s extensive search library. As the search engine won’t display the result.

 

The Good, Bad, And Downright Ugly Of The Dark Web

Because the TOR network permits allow users to window-shop

anonymously, it’s used by secret services, activists, law enforcement, whistleblowers, researchers, and users who are forbidden from Internet access.

WikiLeaks is an ill-famed Dark Web site that permits whistleblowers to anonymously upload detailed information is an Assange.

Even the most famous site Facebook has a Dark Web site. Last October, the social media monster began TOR private services so users could avoid bypass monitoring or censorship.

Anonymity, however, tends to have a dark side. The TOR network can also be used to shield the sensitive information of users involved in criminal activity.

 

Types Of Illegal Operations You Could Find On The TOR Network

  • Unlicensed Weapons
  • Illegal Hacking Guides and Pirated Software
  • Pornography
  • Drugs
  • Sales of stolen Credit cards and their information
  • The illegal practice of trading on the stock exchange
  • Hiring trained Killers
  • Gambling
  • Money laundering
  • Sale of fake currency

 

The Silk Road

One of the Popular-known origins of treacherous activity on the Dark Web is “THE SILK ROAD”, also known as the “Amazon of Drugs”. The site marketed high-grade, illegal drugs. Until it was completely shut down by the FBI. Growth, Agora Marketplace, and Nucleus Marketplace are three added examples of famous black market sites.

October 2013, FBI arrested Ross Ulbricht under the commands of being the sites pseudonymous originator “Dread Pirate Roberts”. On 6 November 2013, Silk Road 2.0 has been introduced, managed by the former administrator of Silk Road. This too was shut down and the operator was arrested on 6 November 2014 as a portion of the so-called “Operation Onymous”. Ross Ulbricht was adjudged of eight charges related to Silk Road in the U.S. Federal court in Manhattan and was convicted to life prison without the possibility of parole

A Site Similar To The Silk Road

The Farmer’s Market was a Tor Similar to Silk Road, but they never used their mood of payments using bitcoins, rather they used PayPal and The Western Union allowed permitted the law enforcement to track the route of their payments and it was consequently shut down by FBI in 2012. Many other sites already existed when silk road was locked down and it was predicted that these would take down the market that Silk Road earlier overlooked. Sites like “Atlantis”, shut down in September 2013, and Project Black Flag, concluding in October 2013, each robbed their user’s bitcoins. October 2013, site named Black Market Reloaded and was shut down temporarily due to the site’s source code was being leaked. The market of many Silk Road followers was reported by the Economist in May 2015.

Kinds Of Web

The Surface Web: Web pages that are shown up on any normal search engines outcomes. And the given search result can be found in Google search, then its 100% sure that it belongs to Surface Web The Deep Web: Any search or content which cannot be displayed in a normal search engine can’t access. Deep Web pages include all sensitive information protected by a login, a page that doesn’t have a link or a website database.

The Dark Web: A small, unknown corner of the Deep Web that is hidden willfully from normal search. And it can be accessed by a special Web browser for users to access it.

 

Do’s And Dont’s In A Dark Web.

Do’s

  • Make sure Tor is kept up to date
  • Create a new identity when necessary
  • Use a VPN alongside Tor
  • Consider running a Tor relay
  • Use Tor for anonymous email

Dont’s

  • Go overboard with browser add-ons
  • Share your real email address
  • Search the web using Google
  • Maximize the Tor window
  • Use Tor for torrenting

 

Few Links To Access Dark Web

Name              Link                     Description
1. Dream Market            http://6khhxwj7viwe5xjm.onion/                   Drugs, Digital  Goods 
2.Silk Road                http://silkroad7rn2puhj.onion/                   Drugs, Weapons 
3.Valhalla                 http://valhallaxmn3fydu.onion/register/DpXB      Drugs 
4.WallStreet Market        http://wallstyizjhkrvmj.onion/signup             Drugs 

 

Finally, As The Wording Says

The Deeper You’ll go, The Darker it’ll get

Into one’s secret

Into the Space

Into the Web (Internet): One Universe One Rule ……

Phishing Attack | Every Thing you need to know about Phishing

What Is Phishing?

phishing is a social engineering attack to trick you into revealing your personal and confidential information. It is also a common type of cyber attack. The term phishing is commonly used to describe this artifice. There is also a good reason for the use of ph instead of f. The earliest hackers were known as phreaks. Phreaking refers to the exploration or experimenting and study of telecommunication. Phreaks and hackers have always been closely related. The ph spelling was used to link phishing frauds with these underground communities.

 

History Of Phishing And Case Studies.

A phishing technique was first ever described in detail in a paper presentation delivered to 1987
international HP user group. the first ever known phishing direct attack was attempted against a
payment system affected E-gold in June 2001 which was followed up by a “post-9/11 id check” shortly after the attack on the World Trade Center on September 11 which made a huge noise. And followed by several attacks.
The term phishing can be traced in the early 1990s via American online or AOL. where a group of hackers banded together called themselves as “The Warez Community” are considered as the first hackers. In early fraudulence, they developed an algorithm which allowed them to generate fake credit card numbers. which they would later use to attempt to make phony AOL accounts.

Case Study 1

wanna cry shuts downs business in 180 countries. it is remembered as one of the worst cyber attacks in history. This ransomware attack is suspected of having impacted more than 2,30,000 around 150

countries. The debate is still on the top whether the attack was from a suspected e-mail id or the
other phishing method used.

Case Study 2

Google docs hacked over 3 million people stopped working worldwide on May 2017 where phisher was
caught sending fraudulent emails inviting to edit Google Docs. on opening the invitations they were
brought to a tricky third-party app, where the phishers were able to access peoples Gmail accounts.

Case Study3

Facebook and Google took for $100 million after the month of this incident U.S. Department of Justice (DOJ) arrested Lithuanian man for allegedly stealing of $100 million from the two top know companies of U.S. the phishers targeted attack successfully by using phishing email by inducing employees into wiring the money to overseas bank accounts under his control.

 

Types Of Phishing   

  • Deceptive Phishing
  • Spear phishing
  • Whaling
  • Pharming

Deceptive Phishing:

Deceptive phishing is one of the most used phishing methods. In this method, the attackers attempt to gather all the confidential information from the victims. These attackers use the gathered information to steal or to launch other attacks. A fake email is been generated from a bank asking you to click a link and verify your account details.

Spear Phishing:

Spear phishing basically targets individuals instead of a large group. Attackers usually

a victim on social media and other websites so that they can customize their communication and appear more realistic Spear phishing is one of the most commonly used or the first step used to penetrate a company’s defenses and carry out an attack research their

Whaling:

whaling is a method used to attack directly senior or important individuals at an organization or a company. These attackers often spend a huge amount of time on target by gathering information. once an opportune moment is gained they launch an attack or steal login credentials. whaling attack is
only targeted on high-level executives who are able to access the confidential part of the company’s
information. This method is also known as CEO fraud.

Pharming:

pharming is as similar as a phishing attack. here the victims are directed to bogus sites through fictitious emails and to reveal their sensitive information. But in pharming, the victim does not even have to click on the link in the email. the attacker can easily infect the user’s computer or the web server and redirect it to a fake site even if the correct URL is entered.                                       

Prevention Of Phishing

  • Keep informed of phishing technique
  • Think before you click
  • Install an anti-phishing toolbar
  • Verify sites security
  • Check online account regularly
  • Keep your browser up to date

Keep Informed Of Phishing Technique:

modern phishing technique is being developed in the upcoming days. without the knowledge, you can easily fall for a phishers trap. to avoid it get regularly updated on the phishing scams as early as possible. By all these awareness u will be at a much lower risk of becoming a prey to an animal. for IT users ongoing security awareness training and simulated phishing is highly recommended for the safety of a top organization.

Think Before You Click:

It’s fine to click on a link that is on trusted sites. but clicking in a link that appears in a random email with a grammatical error and with different links is not a smart move. A phishing email may claim to be from atop institutions, company, organization etc. it may look same as the original website. but the email may ask u to fill the information through which they can access all your personal details. So think before you click.

Install An Anti-Phishing Toolbar:

Most of the internet browser can be customized with anti-phishing toolbars. This helps with a quick check of the phishing threats that you are visiting and compare them with the list of the phishing websites. if the enter or click on a phishing site or link it alerts us about it. this is one the protective layer of anti-phishing scams.

Verify Sites Security:

It’s natural to share a little sensitive financial information online. as long as we make sure that the website is secured. however to be on a safer side check the site’s URL begins with “https” and a closed lock icon near the address bar. If you are alerted by an anti-phishing tool that the site contains any malicious files, do not enter the site and never download any files from malicious websites or emails. By using a cracked software it may lead u to a phishing website which offers low-cost products. by purchasing at these websites the user financial details like debit card details etc can be accessed by cybercriminals

Check Online Account Regularly:

if you don’t visit your online account frequently or for a while, there are chances of a phishers field day with it. so it is advisable to check your online account every now and then and to have a strong password. to prevent bank phishing and credit card phishing scams, you need to personally ensure that there is no fraudulent transaction happening without your knowledge.

Keep Your Browser Up To Date:

security updates are released frequently for all popular browsers. they are released to fix the security loopholes and to face the upcoming threats. regular updates can keep you safe from phishing and other kinds of cyber attacks.

These are the few important steps to be followed to prevent yourself from phishing attacks

Social Engineering Attacks: A Complete Step by Step Guide

SOCIAL ENGINEERING ATTACKS

What Is Social Engineering?

Social Engineering is techniques used by cybercriminals to gain your confidence to trick you giving them your personal details such as your account credentials so they can gain complete access to your accounts, device or network. these attacks can be performed anywhere where human interaction is involved. In addition, many individuals don’t easily realize the value of personal details and maybe not sure of how to protect that information from such attacks.

How Social Engineering Works?

Social Engineering Attacks are considered as the first approach in most of the attacks as its easier to exploit by your trust in someone help in discovering different ways to hack into your account, system or network.
For Example, its always considered to trick someone into giving you their password than actually  hacking  into servers and retrieve the password

Almost Every Cyber Attacks usually consist of social engineering attacks such as Phishing Email which is used to convince someone they are from a legitimate source like [email protected] or from someone trusted contacts which are usually containing an attachment with a virus which can infect your system and gain complete access to your system or network.

What Are Different Types Of Social Engineering Attacks?

Different types of Social engineering attacks that can be performed anywhere where human interaction is involved. The following below are the most popular social engineering attacks.

Phishing Attack

Phishing Attack is one of the most popular social engineering attacks types used by attackers, an attacker usually send phishing scams such as a text message or email which makes a person curious to click on malicious links or mail attachments that contain malware which give an attacker complete access to system or network of the victim.
Most Phishing attack has these characteristics such as

  • Hacker usually embedded links or Shorten links that redirect the users to the malicious link which appear legitimate.
  • Makes the user curious, fear or sense of urgency to click on the link.
  • Most Attacks Seek information Such as name, date of birth, address, phone number, bank details, OTP (One Time Password).
  • Makes the URL of website look similar to legitimate

Pretexting

Pretexting is a form of social engineering attacks where hacker mainly focuses on questions that appear to be required to confirm identity and steal personal information of the victim. Most of the scam is often pretend to be the person that they need certain bits of information from their target in order to confirm their identity.

The Hacker usually starts by establishing trust with their victim by impersonating like a Police officer, Bank authorized person or someone who have the right to know. They ask questions that are generally required to confirm the victim identity, through which they gather information about the victim for the attack.

More advanced attacks of pre-texting will target to exploit the structural weaknesses of an organization

All sorts of Information is gathered using this technique such as name, date of birth, address, phone number, bank details, OTP (One Time Password).

Unlike phishing attacks which makes the user curious, fear and sense of urgency. Here pretexting attacks depends on establishing a completely false sense of trust with the victim. This requires the hacker to build a great story that leaves no doubt to the victim about the hacker.

Baiting

Baiting is considered as much similar to phishing attacks in many ways, we can define Baiting attacks that are used for a fake promise to irritated curious victims. they tempt the user to fall for the trap so they can steal their personal information which is not just restricted to online but also Attackers can also focus on exploiting human curiosity with use of physical media.

Baiters most of the time offer an individual with free software or document files to downloads so can infect their system or network to gain complete access and steal the information required by them.

Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of baiting consist of ads to a malicious website or download a file which is infected by malware.

Unusual Social Engineering Attacks

Unusual Social Engineering Attacks method is more complex methods used by an attacker to hack into system or network of the victim and gain the complete access.

  • Many different users receive a fake email that claimed to be from the Apple – asking the user to confirm their identity so they can refund amount – the email received seems from legitimate and many users got infected from this.
  • The attacker used CD to attack the victim which was trojan spyware infected. The CD disk is infected and given to victim which help to get access into different individuals and companies system or network.

 

How To Prevent Social Engineering Attacks?

To overcome the familiarity exploit, the user must be trained to not compromise familiarity with security measures. Even the people in and around familiar should prove that they have the authorization to access certain areas and information

  • To defend from intimidating circumstances attack, users must be highly trained to identify social engineering techniques that fish for the sensitive information and reject by saying no.
  • To counter any phishing techniques, many sites such as Yahoo use secured connections and encrypt data prove that what they are trained for. checking the URL may help you find fake sites. avoid responding to emails that request you for personal information
  • To tackle tailgating attacks, users must not allow others to use their security clearance to gain access to restricted areas. each user must use their own access clearance
  • To counter human curiosities, it’s better to pick up flash disks to a system admin who needs to scan for viruses or other malware on an isolated machine.
  • To tackle techniques that exploit human greed, employees must be trained not to fall to that trap.
  • Never open any emails from an untrusted source.
  • Never offers from strangers the benefit of the doubt. if they seem to be very good, they probably are phishers.
  • Lock your laptops whenever you are not at the workstation.
  • Purchase anti-virus and update it on a regular basis. No ant-virus solution can defend you 100%. It will just help you in protecting against the cyber threat.
  • Read the company’s policies terms and conditions to understand what circumstances you can let any stranger into the building.

How Can I Educate My Employees To Prevent Social Engineering?

Protection against social engineering starts with educating yourself– users must be properly trained to never click on suspicious links and always take care of their log-in credentials, even at office or home. In the events where the social tactics are successful, they are likely to result in a malware injection. To combat trojans, rootkits, and many more, It’s difficult to employ high-quality Internet security that can both eliminate infectiously and help track their source

Get your team trained on Ethical Hacking and Cyber Security by our Cyber Security Professional, Contact us for more details regarding Course Curriculum.

 

Everything You want Know About Man in The Middle Attack

What Is Man In The Middle Attack?

Man in the middle attack most importantly requires three players. First comes the victim, second comes the entity with which the victim trying to communicate, and the man in the middle. And the worst part of Man in the middle attack is that the victim has no idea of the interception.

How Precisely Does A Man-In-The-Middle Attack Work?

Let us assume you have received an email that appeared to be from your bank, asking you to log in to your account to verify your account information. As soon as you click on the link in the email and you are taken to a fraudster website where its just the replica of your original bank website, where you log in and perform the requested task by the middle man.
Man-in-middle-attack is a type of eavesdropping attack when a phisher inserts himself as a proxy into a communication session between people or system. A MITM attack exploits the conversation, transfer of other data or real-time processing. MITM attack allows a phisher to intercept, send or receive data without even the notice of the owner.

MITM Attacks: Close To You Or With Malware

Man-in-the-middle attacks come in two forms, one that involves physical proximity to the intended target, and another that involves malicious software, or malware. This second form, like our fake bank example above, is also called a man-in-the-browser attack. Attackers execute a man-in-the-middle attack in two phases — interception and decryption.

With a traditional MITM attack, attackers need access to an unsecured or poorly secured Wi-Fi router. These types of connections are generally found in public areas with free Wi-Fi hotspots, and even in some people’s homes, if they haven’t protected their network. Attackers will scan the router looking for specific vulnerabilities such as a weak password. Once attackers find a vulnerability, they’ll use tools to intercept and read the victim’s transmitted data. They then insert their tools between the victim’s computer and the websites the user visits. A successful man-in-the-middle attack does not stop at the interception. The victim’s encrypted data has to be decrypted so that the attacker can read and act upon it.

The Man-In-The-Middle Attack Is Of  Two Forms

  1. Physical proximity to the intended target
  2. Malicious software or malware (main in browser attack)

phishers execute man-in-the-middle attack in two phases interception and decryption. With a traditional MITIM attack, phishers need access to a wi-fi network, so they firstly hack into a wi-fi network. these types of network or connections are available in public areas, or even in some people’s home. If the wi-fi is not protected with strong security. Phishers will scan the router looking for a specific vulnerability such as a weak password. Once the vulnerabilities are found, phishers will use tools to intercept and read the victim’s personal data, transferred data and much more. Then a tool is inserted between the victim’s computer and the website the user visits. Any successful man-in-middle attack does not stop an interception. The victim’s encrypted data is later decrypted so that the reader can read and act accordingly to it.

Types of Man-in-the-Middle Attacks

  • Rogue Access Point
  • ARP Spoofing
  • mDNS Spoofing
  • DNS Spoofing

Rogue Access Point

Devices that are equipped with wireless cards will often try to auto connect to the network emitting the strongest signal. Attackers can set up their own wireless network and trick nearby devices to join its domain. All of the victim’s network traffic can be manipulated by the attacker. This method is so dangerous because the attacker does not even have to be on a trusted

ARP Spoofing

ARP is the Adress Resolution Protocol. It is used to project IP address to physical MAC addresses in a local network. When a host needs to communicate to a host with a given IP address, it references the ARP cache to project the IP address to a MAC address. If the address is not found, a request is made asking for the Mac address of the device with the IP address. An attacker wishing to pose as another host can respond to the request it should not be responding to its own MAC address. With some precisely placed packets, a hacker can identify the private traffic between two hosts. And extract all the confidential information, such as yielding full access to application accounts that are not accessible by everyone or exchange of session tokens.

MDNS Spoofing

Multicast DNS is similar to DNS, it’s done on a local area network (LAN) using broadcast like ARP. The local name resolution system makes the configuration of network devices extremely simple. Users don’t have to know exactly which addresses their devices is communicating. Devices such as printers, Tv’s, and other entertainment systems make use of this kind of protocol since they are connected to a trusted network. When an app needs to know the address of a device or any entertainment system. An attacker can easily slide into these kinds of the system by a fake data request instructing the system to resolve the address and here by taking control over the system. So to avoid these kinds of attacks devices keep a local cache of addresses. Which protects the devices from the attack.

DNS Spoofing

DNS Spoofing is similar ARO resolves IP address MAC addresses on a Local Area Network, DNS projects the domain name to IP address. When using a DNS spoofing attack, the attacker tries to introduce corrupt DNS cache information to a host in an attempt to access another host using their domain names, such as www.onlineshopping.com. This will lead to the victim sending sensitive information to a fraudulent host, with the trust and confidence they are sending the information to a trusted source. Attackers who have already spoofed the IP address could have will have an easier time spoofing DNS easily by resolving the address of a DNS server to the attacker address

Case Studies

A huge bust on a multinational company nabbing 49 suspects throughout Europe.
They were arrested on suspicion of using Man-in-the-Middle attack. The main motive of the attack was to intercept payment request from emails.

As Europol detailed in a statement, the raid was coordinated by Europol’s European cybercrime center (EC3), led by the Spanish National Police, Italian Polizia di Stato, the Spanish National Police and the Polish Police central Bureau of Investigation supported by Uk law enforcement bodies.
The suspects were arrested at multiple places in Italy, Poland, Spain, The UK, Georgia, and Belgium.
Police seized external hard disks, laptops, telephones, tablets, credit cards, SIM Cards, cash, memory sticks etc.

Further investigation uncovered international fraud totaling $ 68,57,730 that was recovered in a short period of time.

The team’s main targets were medium and large European company via Man-in-The-Middle attacks.
The suspects used social engineering and management and were able to insert malware or spyware onto the network of the target. Once the communication is established with the target’s device they access to the required data like emails, banking info, and many more.
The fraudsters then set up a similar transaction with the targets real site.$6.8 million

Prevention Of Man-In-The-Middle Attack.

With the arena of tools readily available to carry out attacks like Man-in-The-Middle attacks, it takes many steps to help protect yourself, your data, and your connections.

Make sure the “https” is always there on the website you visit to ensure your safety.
Be aware of tricky phishing emails from attackers asking you to update your bank info or any other login credentials.
Instead of clicking on the link provided in the emails, manually type the web addresses in the browser.
Never connect to public wi-fi without activating a VPN ( Virtual Private Network ) like Turbo VPN, Norton Secure VPN, etc. A VPN encrypts your private IP addresses provided from the local internet provider which helps in protecting your private data.
Be sure that the wi-fi you connect is completely secure.

In our rapidly growing connected world, it’s important to know the type of threats and how to be protected from those kinds of threats. So protect your devices and network with proper protection to stay safe and secure

The Ultimate Guide to Ransome ware

WHAT IS RANSOMWARE? AND WHY SHOULD YOU CARE?

Ransomware is a kind of malicious software that, takes over your Computers and advances you with outrage, by creating a barricade from accessing your data. Later the attackers demand a ransom from the prey, ensuring to restore access to the data upon payment.
Users are given instructions on how to pay ransom to get the decryption key. The ransom can range from a few hundred dollars to millions, and the mode of payment is accepted only in Bitcoins.

Functioning Of Ransomware:

There are various vectors ransomware that can take control of your computer. One of the best and most commonly used attacks is phishing spam, where the attacker attachers the ransomware virus to the victim’s mail and is sent to him. Masking as an original and important trustworthy mail. Once the attachments are downloaded and opened, the attacker can take our the victim’s computer, particularly if they are built-in social engineering tools which give the administrative access to the attackers. There is still the worst impact of these attacks like NotPetya or by exploiting the loopholes to affect the virus without even the need for tracking the victim’s computers.

There are several things the attacker’s malware might do once it takes over the victim’s computer, the first and most important the malware does is that it encrypt all the data and files in the computer. The most important thing to be known at the end of the process is that the files cannot be decrypted without the mathematical key which is only known to the attacker. The attackers will also leave a message saying that the files in the system is accessible by the attacker and will only be decrypted if the victims agree to send an untraceable Bitcoin transaction payment to the attackers

In the certain form of malware, the attackers might even claim to be a law enforcement agency by shutting down the victim’s computer due to the carriage of pornography or pirated software in it and demanding the payment of FINE. In these cases, the victim cannot move a legal step against the attacker because of his loopholes. There is also a variation called Leakware or Doxware, in which the attacker threatens the victim to display his sensitive information to the public until and unless a ransom is paid. But finding this kind of extracts is not a toy play for the hackers. The most common type of ransomware attack is encryption attack.

Targets Of Ransomware Attack

Attackers choose any organization or Companies under many criteria. Sometimes it is just the matter of the opportunities, for example, attackers targets universities because they tend to have very weak defense systems and smaller security systems and lots of sharing of files happen on the server-based system so it is easy to penetrate the defense system.

On the other hand, many organization is attracting targets because they are most likely to pay the ransom. For examples, government agencies like Income Tax and medical departments need urgent access to their files which contains all the sensitive and important data and amenable to pay the ransom. And these organizations are most likely to be sensitive to leakware attacks.
But don’t feel like you’re safe if you don’t fit these categories: as we noted, some ransomware spreads automatically and indiscriminately across the internet.

Prevention Of Ransomware

There are various levels of defenses that can be taken to prevent yourself from ransomware attacks. These steps are good security practices in general, so following these steps will help you to prevent yourself from falling as prey to ransomware attacks:

  1.  Keep your system vulnerabilities free or with fewer vulnerabilities to exploit by updating your system up-to-date and by keeping your system patched.
  2. Never ever install software or give them administrative permissions unless and until you know what exactly the software does.
  3. Install antivirus software and keep it up-to-date, which helps in the detection of malicious programs or blocks malicious program download. It also prevents the unauthorized application from downloading from any unknown sources in first place.

Removal Of Ransomware

If your computers have been injected with a ransomware attack. And if u need to regain control of your computer then please do follow these steps:
The following step has all the details on how to remove Ransomware.

  1.  Boot Windows to safe mode.
  2. Install antivirus and antimalware software.
  3.  Perform a full system scan for malware and ransomware.
  4. Restore the computer to its earlier settings.

But Here Are A Certain Important Thing That Needs To Keep In Mind

While you are following the process, these steps can remove the malware from your computer and restore it back to your control, but these steps will not decrypt your files.Their conversion into the unread ability has occurred,

 if the malware is at all complicated it will be mathematically or technically impossible for anyone to decrypt them without the access of the key code. In fact, if you have removed the malware, then you have still had still prevented a chance from restoring your files by paying the attacker the ransom he has demanded.

Facts And Figures On Ransomware

Ransomware is a huge business across the globe. The market of ransomware is expanded rapidly from decades and there is a lot of money in ransomware, which resulted in $5 billion dollars approx in losses this includes both ransom paid and time is taken to recover the files and data. At the beginning of 2018 ransomware named SamSam collected around a $1 million in ransom money.

Many companies are prone to ransomware attacks and to pay the ransom. The biggest ransomware attacks are targeted at hospitals or other medical organizations, which are easy targets. Attackers know the fact that the organizations will never risk their names by not paying the ransom as not only there name even they are even risking patients life, so they are most likely to pay the ransom. It is estimated that 45% of ransomware attacks hospitals, medical institutes and on record that 85% of malware infectious at health organizations are ransomware. And another attracting industry for the attack is “The Financial Sector” it is approximated that 90% of financial organizations were targeted in 2017.

The anti-malware software won’t protect you cent percent. But the developers constantly tweaks the ransomware so, its signatures are not caught by the typical antivirus programs. On a serious note, most of the victims had running up-to-date antivirus which means an end to end protection on the infected machines.

The one and only “Good news on ransomware” is, that it is not widespread. The number of attacks, popping the mid-10s, has gone into a great decline, though the beginning numbers were high enough. But at the beginning of 2017 the attacks were up to 60% but in the present days, it is reduced to 5% which is a great fall of attacks.

 

A Sudden Decrease Of Attacks:

What was the reason in the huge decline of the attack? It was the strict rules and regulation made by the cybersecurity against cybercriminals. And it was the economic decision based on the cybercriminal’s currency of preference “Bitcoin” Extracting the ransom form a victim is anyways a success or waste of time. Sometimes even if the company wants to pay the ransom but they are not familiar to the bitcoins currency and how it actually works.

According to Kaspersky antivirus, the decline in ransomware has raised in so-called crypto mining malware, this malware infects the victim computer and uses its computing power to create bitcoin without the knowledge of the owner. This is the most know route to uses someone else’s resource to get bitcoin that bypasses most of the barricades by scoring a ransom, and it has got more scope in 2017 because of the hike in the price of bitcoins.

As they explained there are two kinds of ransomware attacks: “Commodity” attacks that try to inject computers indiscriminately by enormous volume and includes so-called ransomware as a service these are the platforms where the criminals rent cybercriminals for attacks. And they target the most vulnerable market and organization.

With the price of bitcoins decreasing gradually from 2018, the cost-benefit analysis for attackers may drop down. Ultimately using of any ransomware or crypto mining is a game decision for the attackers.

The Most Famous Ransomware Attacks:

1. WannaCry
2. NotPetya
3. Locky
4. CryptoLocker
5. TeslaCrypt
6. SimpleLocker
And the list gets going longer.

Should The Ransom Be Payed:

In certain situations, there is no way other than paying the ransom. But there are situations where you can even recover the files if the attacker is a script kid.

For Ransomware Removal Contact:texial

Top 5 Indian Ethical Hackers in 2020

1. Vivek Ramachandran :

Vivek Ramachandran is a security researcher and cybersecurity specialist. His field of expertise includes computer and network security, wireless security, exploit researcher. computer forensics, compliance, and e-Governance, compliance. He has written many books which are published worldwide in mid of 2011- Few of his books are ” Wireless Penetration Testing ” and ” The Metasploit Megaprimer”. Vivek is a B.tech graduate from IIT Guwahati and an advisor to the computer science department’s security lab.

top 5 cyber security expert blog

Vivek is an internationally acclaimed speaker and has spoken in hundreds of conferences worldwide. Some of his known and renowned talks include – “WEP Cloaking Exposed” at Defcon 15, USA, Las Vegas and “The Caffee Latte Attack” at Toorcon, San Diego, USA. Both of these conferences talks were covered extensively by international media BBC Online, The Register, Mac world, Network World, Computer Online etc. He also has conducted Corporate training around the world and workshops apart from his speaking engagements.

In 2006, Microsoft announced Vivek as one of the winners of the Microsoft Security Shootout Contest held in India among an estimated 65,000 participants. The competition was focused on finding leading Security Experts in India. Vivek was also rewarded a Team Achievement Award by Cisco Systems for his contribution to the Port security modules in the catalyst 6500 series of switches and 802.1x. These are the high-end security features used.

Vivek was recommended in the evening edition of CBS5 in the US where he coached the general public on the dangers of using WEP in wireless. He also worked as Cybersecurity consultant at Fortune 500 companies in the field of Information Security. The Caffe Latte Attack discovered by Vivek was covered by CBS5 news. Vivek is now a part of Wireless Security textbooks and various other wireless Penetration testing tools.

He is also one of the known hacking and cybersecurity community, as the founder of Security.net, a free video based on the computer security educational portal. SecurityTube gets an average of 80,000 visitors monthly and is considered as one of the most visited sites for security education.

 

2. Ankit Fadia :

Ankit Fadia was born on 24 May 1985, he is an author, speaker, television host, and an “ethical hacker”, his field of specialization is OS and Networking based tips and tricks, proxy website and lifestyle.

In 2008 Ankit started a television show on MTV India called “What The Hack”, Which he co-hosted with Jose Covaco. This show was mainly about how to make good use of the internet and answered people’s technology-related questions. In 2013, Ankit started with a YouTube channel “Geek On The Loose”, in collaboration with PING networks, where he started giving technology related tips and tricks.

A number of his achievements have been disputed by others within the cybersecurity industry, and he was awarded a “Security Charlatan” of the year at DEF CON20 in 2017. Attrition.org also surveyed his alleged credential and added him to their Security Charlatans list. He is also been accused of plagiarism in his work. His claims of hacking grow since he has been trashed by many magazines

After Ankit’s first book “The Unofficial Guide to Computer Hacking” came in the limelight, Ankit became popular among the corporate clients in India as well as on the Conference speaking panels. He published more books on Computer Security, started giving seminars across schools and colleges in India. Ankit started providing his own computer security training courses, including the “Ankit Fadia Certified Ethical Hacker” programme in coordination with Reliance World.

In 2008, the IMT Ghaziabad Center for Distance Learning signed an agreement with Ankit to host its own one-year Post-Graduate Diploma in Cyber Security.
In 2009, Ankit said that he was working for in New York as an Internet Security expert for many prestigious companies. Ankit also supports the Flying Machine jeans brand of Arvind Mills
Ankit was dismissed as a fancy by some security and cryptography enthusiast, who assigned his success to the tech-illiterate media.

3. Sunny Vaghela:

Sunny Vaghela founder of Tech defense labs, was graduated from Nirma University.
Sunny Vaghela exposed the loopholes in SMS and Calls in mobile network at the age of 18. He also launched websites where the complaint against cybercrime was registered and solved.


Sunny also finds loopholes like “Cross-site scripting” and “session Hijacking” in popular websites one among them is “www.orkut.com” at his age of 19.
Sunny Vaghela solved many challenging cases of cyber-crimes for Ahmedabad crime branch including credit card Fraud cases, Biggest Data theft cases, Phishing cases, Orkut fake profile cases, etc.

Sunny Vaghela has also been leading training and consulting team at Techdefence for last 7 years. More than 60000 people are trained under Sunny from 650+ Educational Institution under HackTrack & CCSE verticals of Techendence. He also assists Financial Institutions, E-Commerce, Logistic Industry, and Media.

4. Trishneet Arora :

Trishneet Arora was born on 2nd November 1993. Arora is an entrepreneur who found a Cyber Security company that provides protection to corporations against data theft and network vulnerabilities. Few of his clients are Central Bureau of Investigation, Reliance Industries, Gujrat Police and Punjab Police. Arora helps the Punjab and Gujarat Police in cyber crimes, for which he has also conducted training sessions with Police Officials.

Trishneet Arora’s company TAC Security provides penetration testing and vulnerabilities assessment services. According to Trishneet Arora, there has been an enormous increase in the number of attacks against many portals of many international companies. TAC Security raised funding in 2016 for Pre-series funding from Indian investors Vijay Kedia, Earlier to this TAC Security also had approached Subider Khurana former Vice president of Cognizant on its board. By the mid of 2017 TAC was also recognized by Vice President of IBM, William May, and Singapore based former regional sales director of Imperva. Arora has also written many books on Cyber Security, Web Defence and ethical hacking. Arora was named 30 under 30 2018 Asian list.

Trishneet Arora was awarded many awards. In 2018 he was awarded Leaders of Tomorrow by St. Gallen Symposium, Forbes 30 Under 30 by Forbes Asia, Entrepreneur 35 Under 35 by Entrepreneur (magazine), In 2017 he was awarded News Maker of 2017 by Man’s World (magazine), The 50 Most Influential Young Indians by GQ Magazine so on, Arora has won many more awards in a row.

5. Sai Satish :

Sai Satish is one of the young Entrepreneur, Founder, and CEO of Indian Servers. He is also the Administrator of Andhrahackers which is the elite hacking awareness forum in INDIA.

Being an author a renewed Ethical Hacker and Cyber Security Expert at International Cyber Security, Microsoft Security Researchers. Awareness is spread between thousand of college and Professionals are benefited by his awareness lectures over the world. Satish also worked as Net Trainer, Microsoft Student Partner etc. Satish was rewarded by IAS Officer for pentesting on government sites, which gave him huge exposure and helped them to improve security, Forensics Investigator and safe transaction.

Few of Sai Satish Achievements:-
> Enhancing quality in training & teaching in INDIA.
> Development of resources in Humans of INDIA.
> Desalination of seawater.
> Interlinking of Indian rivers.