{"id":6704,"date":"2022-03-09T08:45:46","date_gmt":"2022-03-09T07:45:46","guid":{"rendered":"http:\/\/blog.bart.sk\/en\/?p=6704"},"modified":"2024-01-29T10:22:26","modified_gmt":"2024-01-29T09:22:26","slug":"online-safety-02-not-get-password-stolen","status":"publish","type":"post","link":"https:\/\/blog.bart.sk\/en\/online-safety-02-not-get-password-stolen\/","title":{"rendered":"Online Safety #2 How Not To Get Your Password Stolen?"},"content":{"rendered":"\n<p><strong>Alphabet Inc. (Google) recently uncovered Russian hackers who were involved in espionage, phishing campaigns and other attacks targeting, among others, Ukraine and its European allies. <\/strong><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing affects all of us. You can read in a few minutes about how not to become its victim in our next article from the Online Safety series.<\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/fly-d-9PivUW7l1m4-unsplash.jpg\"><img decoding=\"async\" src=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/fly-d-9PivUW7l1m4-unsplash.jpg\" alt=\"\" class=\"wp-image-8842\"\/><\/a><figcaption class=\"wp-element-caption\">Cyber Security, photo via <a href=\"https:\/\/unsplash.com\/photos\/9PivUW7l1m4\" target=\"_blank\" rel=\"noopener noreferrer\">Unsplash<\/a><\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">&nbsp;<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><b>What is phishing?<\/b><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s a type of attack where we want to obtain access details from the victim by planting a fake website. <a href=\"https:\/\/sk.wikipedia.org\/wiki\/Phishing\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing<\/a>can take many forms. <strong>For example, we may receive an email from a &#8220;bank&#8221; that provides us with some information and prompts us to log in.<\/strong> However, after opening the URL, we get to the attacker&#8217;s page and not the bank&#8217;s. The page&#8217;s design looks identical and so it isn\u2019t easy to distinguish it at first glance.<br><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Attack via Messenger and Text message<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Another way can be an attack via Facebook Messenger or via a text message. Recently, we have registered several similar attacks in Slovakia. Specifically, it was a purchase of goods via bazos.sk. <strong>An attacker sent a link to a buyer to enter payment card details and the money would be automatically transferred. <\/strong> Of course, the page was fake \u2013 it stored the card details, which gave the attacker control over withdrawing money from the card. &nbsp;<\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/ooxNDz5fEXwiUgCBbnF0WdzkEK6UnSiGZUX5stFMPn1KvTZSitrnpSUsHIGQpaiOVVy4IGFv3ZVBj22HBQfO8UJ2RbQ-YX8qEb9Fov8MD1FCGPRUDLyw5d-1g3f2HqHWN4YWHLe1.png\"><img decoding=\"async\" src=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/ooxNDz5fEXwiUgCBbnF0WdzkEK6UnSiGZUX5stFMPn1KvTZSitrnpSUsHIGQpaiOVVy4IGFv3ZVBj22HBQfO8UJ2RbQ-YX8qEb9Fov8MD1FCGPRUDLyw5d-1g3f2HqHWN4YWHLe1.png\" alt=\"\" class=\"wp-image-8835\"\/><\/a><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>How to protect yourself against phishing?<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Whenever we receive an e-mail (or other kind of message) with a URL, we need to be vigilant. <strong>Even if it\u2019s an email from a bank \/ trusted friend \/ family, we must assume that it was sent by an attacker in order to retrieve our data.<br><\/strong><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The safest way to verify it is not to click on the link, but to open the URL separately by typing it into your browser. For example, if you receive an e-mail from Slovensk\u00e1 sporite\u013e\u0148a with a login link, don\u2019t click on it under any circumstances. Instead, type <\/span><a href=\"http:\/\/www.slsp.sk\"><span style=\"font-weight: 400;\">www.slsp.sk<\/span><\/a><span style=\"font-weight: 400;\"> in a new browser window and you have a guarantee that you definitely get to the right bank&#8217;s page.<br><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\"><strong>What to do if the link leads to a specific subpage that is not easy to enter into the browser?<\/strong> For example, a &#8220;friend&#8221; sends us a link to an item from bazos.sk. In that case, after opening the link, we immediately check whether we are really on the page we are supposed to be on and not on a fake one. For example, if it\u2019s a link to bazos.sk, after opening the URL, we check whether we are actually on the website <\/span><a href=\"http:\/\/www.bazos.sk\"><span style=\"font-weight: 400;\">www.bazos.sk<\/span><\/a><span style=\"font-weight: 400;\"><br>and not on some shady address such as bazos.my-site.com. Attackers also like to use a variety of URL shorteners like <a href=\"https:\/\/bitly.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">bitly.com<\/a>. For such links, you need to pay attention immediately and be particularly cautious.<br><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\"><strong>We also check if the site uses encryption and has a valid certificate.<\/strong> To do this, click on the lock to the left of the URL bar. See what the information about the certificate looks like on the slsp.sk website:<\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/fGcC7ZEYudVMxGSMHz4I_dtMyFPgV_1aSiwSLtXVYyEkJdrAPn7U1cnpng57sW7SnCrGYPP7DFWo-bPD5rHGLl9Kmi7ImAqJQzY1rMTNcQ_UTuw34p0OEGJVwSud6K8LANowLaAk.png\"><img decoding=\"async\" src=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/fGcC7ZEYudVMxGSMHz4I_dtMyFPgV_1aSiwSLtXVYyEkJdrAPn7U1cnpng57sW7SnCrGYPP7DFWo-bPD5rHGLl9Kmi7ImAqJQzY1rMTNcQ_UTuw34p0OEGJVwSud6K8LANowLaAk.png\" alt=\"\" class=\"wp-image-8837\"\/><\/a><\/figure><\/div>\n\n\n<p>If the lock next to the panel is crossed out, it means that the page doesn\u2019t use encryption at all. Don\u2019t enter any data on this type of page. <strong>Today, encryption is standard and is used by all major trusted sites.<br><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/image.png\"><img decoding=\"async\" src=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/image.png\" alt=\"\" class=\"wp-image-8838\"\/><\/a><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>What if we\u2019ve been fooled by a fraudster and entered the login details on a fake site?<br><\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">In that case, action must be taken immediately. If we still have access to the account, we&#8217;ll need to change the password immediately. If the attacker has already changed our password, call support and try to explain the whole situation. <strong>If you have entered your credit card details on a fake website, you need to block your card via internet banking and report possible misuse.<\/strong> This prevents an uncomfortable situation when the attacker already abuses the card. Getting to the money afterwards is much more difficult.<br><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Do you use the same password for all accounts? Mistake! <\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">A major problem is when we use the same password for multiple services. <strong>If the phishing attack is successful and the attacker finds out our e-mail and password, the door will open not only to the given service, but also to all other services where we have the same password.<br><\/strong><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In this case, the attack may be a very serious problem. Remember the principle of using different passwords for different services. Ideally completely random or at least different password variants.<br><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How do I know if my password has been compromised?<\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">There is another problem related to using the same password on different websites. <strong><br>If an attacker hacks the service and gets our password, they get access to all the services where we use the same password.<br><\/strong><\/span><br><span style=\"font-weight: 400;\"><br>Fortunately, there is a website that monitors leaked passwords. There you can easily check if your e-mail address is on any of the lists. Open the URL<br><\/span><a href=\"https:\/\/haveibeenpwned.com\/\"><span style=\"font-weight: 400;\">https:\/\/haveibeenpwned.com\/<\/span><\/a><span style=\"font-weight: 400;\"><br>and type your e-mail address.<br><\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">If our address has been positively identified in any of the leaks and we use the same password on different websites, it\u2019s certainly advisable to change it immediately.<br><\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/r3ygYc6Ecs4nA9AEokqnc47sxFiJB2mxV-AzJKdpt7zoCbvP8WlHUf4IhPZQkLvOk7zr9uaYAeCI3U6lWIlhla6X_8fx7ZDq7_REpYKmjo3icIFPH_4fxMtb_qZimcHoO63mDMo1.png\"><img decoding=\"async\" src=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/r3ygYc6Ecs4nA9AEokqnc47sxFiJB2mxV-AzJKdpt7zoCbvP8WlHUf4IhPZQkLvOk7zr9uaYAeCI3U6lWIlhla6X_8fx7ZDq7_REpYKmjo3icIFPH_4fxMtb_qZimcHoO63mDMo1.png\" alt=\"\" class=\"wp-image-8836\"\/><\/a><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">&nbsp;<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Two-factor authentication<br><\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Nowadays, many Internet services offer <\/span><b>two-factor authentication<\/b><span style=\"font-weight: 400;\">. In addition to the password, we need one more extra entry to successfully log in \u2013 for example, to type in a code from a text message. We certainly recommend activating this type of login wherever possible. Even if an attacker somehow gets our password, they won&#8217;t get into the account.<br><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Brute force attack<br><\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">In addition to the above mentioned methods, one of the most common attacks on passwords is a brute force attack.<strong> In this type of attack, an attacker tries to log different combinations of passwords. <\/strong>It will start from 1, 2, 3, etc., through 11, 12, 13 until they get to more complicated passwords like 156113216. An attack doesn&#8217;t have to be just about numeric passwords. The same procedure can be applied to any character. Generally, the longer the password is and the more different character sets it contains, the better.<strong> A high-quality password should contain at least 12 characters, including at least one number, a lowercase letter, an uppercase letter and preferably a special character like a dot, an exclamation mark or something similar.<br><\/strong><\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/image-1.png\"><img decoding=\"async\" src=\"https:\/\/blog.bart.sk\/wp-content\/uploads\/2022\/03\/image-1.png\" alt=\"\" class=\"wp-image-8839\"\/><\/a><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">&nbsp;<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dictionary attack<br><\/strong><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">In addition to the brute force attack, the so-called dictionary attack is also often used. <strong>In this case, an attacker gradually tries the most commonly used words such as password, qwertz, peter, 123123, etc. <\/strong> The dictionary may contain nouns, most commonly used passwords, names from the calendar. In addition, this attack can be combined with brute force and each word from the dictionary is e.g. supplemented by a year, i.e. the attacker tests e.g. peter1978, peter1979, etc. Therefore, it\u2019s very important that the password doesn\u2019t contain commonly occurring phrases, names, years, etc.<br><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conclusion<br><\/strong><\/h3>\n\n\n\n<p><strong>In conclusion, we\u2019ll summarize how to avoid being caught in four simple points:<br><\/strong><\/p>\n\n\n\n<ol>\n<li><span style=\"font-weight: 400;\">Every time we receive an e-mail with a URL, we need to be vigilant. Even if it\u2019s an email from a bank \/ trusted friend \/ family, we must assume that it was sent by an attacker in order to retrieve our data.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Remember the principle of using different passwords for different services. \u00a0<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">We recommend activating two-factor authorization wherever possible.<br><\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">A high-quality password should contain at least 12 characters, including at least one number, a lowercase letter, an uppercase letter and preferably a special character like a dot, an exclamation mark or something similar.<br><\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"Alphabet Inc. (Google) recently uncovered Russian hackers who were involved in espionage, phishing campaigns and other attacks targeting,&hellip;","protected":false},"author":22,"featured_media":6715,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":""},"categories":[251],"tags":[258,260,176,259],"_links":{"self":[{"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/posts\/6704"}],"collection":[{"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/comments?post=6704"}],"version-history":[{"count":3,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/posts\/6704\/revisions"}],"predecessor-version":[{"id":7359,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/posts\/6704\/revisions\/7359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/media\/6715"}],"wp:attachment":[{"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/media?parent=6704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/categories?post=6704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bart.sk\/en\/wp-json\/wp\/v2\/tags?post=6704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}