Hacker attack: these tools and measures help

Hacker attack: these tools and measures help

Recently, the hacker attack of a 20-year-old student became known. The mass of data and prominence of the individuals has created a lot of media coverage. Hacker attacks in a wide variety of dimensions are now part of everyday life. So it’s high time for everyone to check whether their own data has been hacked and familiarize themselves with the measures to take in such a case.

Rising number of hacking attacks

An incident in 2017 gives a frightening foreshadowing of how much stolen data is circulating on the darknet. At the time, the BKA came across an aggregation of ca during open-source research in an underground economy platform. 500 million e-mail password combinations encountered. The data was collected from different sources over years and offered for free download in the underground economy.

The high number of hacker attacks is often the result of users being careless about the security precautions they need to take. As always, you can protect yourself from attacks by taking the right preventive measures. What measures to take, you can read here.

But what to do if preventive precautions fail or no or inadequate security precautions have been taken and you become the victim of data theft?

Have I Been Hacked?

Various tools are offered on the market to help individuals find out if their email address or passwords have been hacked and data is being used on the Internet. Three tools are presented below:

Identity Leak Checker

The Hasso Plattner Institute has developed the Identity Leak Checker, which can be used to check whether the password of an e-mail account has been spied out. For this purpose, the user only has to enter his e-mail address on the website. Then a data comparison is performed from almost 6 billion data records to check whether the e-mail address is used in connection with other personal data such as e-mail addresses.B. phone number, address or date of birth has been disclosed or misused on the Internet.

Have I Been Pwned?

Security expert Troy Hunt has developed the English-language website Have I Been Pwned, where the word "pwned" in the gaming and Internet scene comes from word "owned" in German something possess/dominate. As with Identity Leak, the e-mail address entered on the website is also compared with almost 6 billion data records. In addition, the tool offers the user the option of being informed via the "Notify Me" notification function in the event that the e-mail address appears in connection with a data breach in the future.

Hacker attack: these tools and measures help

The service "Have I Been Pwned?" also offers the possibility to have passwords checked. Now it doesn’t take much imagination that trusting a web service with your password to check their security poses a certain security risk. By sending the password, you should therefore consider it insecure and use the service only to confirm the suspicion that your password has been compromised.

Although the password goes to a renowned security expert, who has also built in a mechanism on his site that mitigates this security problem. Because the typed passwords are hashed locally and only the first five digits are transmitted to the server. However, the transmission can still be intercepted and give a potential attacker valuable clues about one’s password. To eliminate this residual risk heise security has explained in an article how to search the database locally: After the password leak: Check your own passwords locally.

Breach Alarm

Also the tool Breach Alarm offers the user the possibility to find out if passwords stolen by the hacker are traded on the Internet by searching the Internet for stolen password data. However, the Breach Alarm database is much smaller and contains 813 million records. Here, too, there is the option of being notified by e-mail in the future by setting up an e-mail watchdog account in the event that a data theft becomes known.

How reliable are these tools?

The tools provide good assistance to help individuals easily identify if they have become a target of hacker attacks. However, caution is advised when using them, because one hundred percent security can never be guaranteed. Finally, the data matching of the individual tools is limited only to the data records collected. To ensure a safe hit rate, these would therefore have to be complete and constantly updated. Also, there may be cases where unauthorized people already have your data but have not yet misused it, so it cannot be captured by the records.

Risk management in case of a hacker attack

If you have tested the tools yourself, with the unpleasant result that data was published on the Internet, you should immediately follow the steps below:

Like this post? Please share to your friends:
Leave a Reply

;-) :| :x :twisted: :smile: :shock: :sad: :roll: :razz: :oops: :o :mrgreen: :lol: :idea: :grin: :evil: :cry: :cool: :arrow: :???: :?: :!: