One of the questions I hear all of the time is “who are these hackers, and why are they targeting me? ” Most people erroneously assume that hackers are poorly behaved super-smart kids–geeks that get a kick out of manipulating the system and causing mischief. They envision poorly supervised teenagers sitting around a computer trying this and that until they crack into a system. Hire a Hacker of us remember the movie “War Games” where Matthew Broderick plays a lovable, super-smart high school student who hacks into the school’s computers to manipulate his grades, and who accidentally hacks into the Defense Department’s war games computer and nearly starts a nuclear war.
Today, hacking is no longer kid’s stuff, but a multi-billion dollar industry that spans the globe. Some experts believe that as many as 25% of all computers are infected by hacker’s software. Visualize a robot. Mindless, emotionless, silent unless it comes to life. A big part of what hackers do is to turn your computer into a robot. The tech name for this is a BOT-network, actually. Suppose you go on the internet and download something–perhaps a song, some freeware, a game–you will never know that download is infected. When you click download, you not only get your music, but the download will install hidden software deep inside your computer that will turn your computer into a robot. This software is called a virus, a worm, spy ware, malware, or a Trojan horse. The hackers gather thousands of bot computers into a bot network, and these computers are used to send infected files to thousands of other computers. If the attack is caught and traced, it is traced to you, not to the hacker. There are a few symptoms that your computer is a BOT–mainly that it slows down because the hacker is using your resources, but often you get pop-ups, and the computer starts performing unusually and locking up. Often the ISP (Internet Service Provider) will catch this, and shut down your internet connection. We have people come in our business all of the time who are incensed because their ISP has shut them down for sending spam. They are always understandably upset, and don’t understand until we explain to them that they have been hacked. Once we fix their computer, the ISP will hook them back up. Don’t worry, the internet Police are definitely not going to show up at your door and arrest you for sending spam, everyone knows what is going on here, but your computer Must be cleaned up before it is put back on the internet. Your computer is being used to steal identities, and rob people–by a person who may be on the other side of the world! There are actually businesses who sell time on their bot-nets, for bad guys to send their malicious software to thousands of unsuspecting computers! This leads me to the next type of hacker–the phisher.
The main goal of hackers is to gather information to steal money. Phishing is pronounced fishing–and it is the same thing–fishing for information. The phishers have a variety of ways to steal your information, all of which require YOUR action–clicking on something. A main way for phishers to gather your banking information is to send you an email (through a bot-network) that tells you that your banking information needs updating, and that your account has been frozen until you resolve this. You may have gotten such an email, it may be confusing because it is not from your bank. These guys know that among the thousands of phishing emails that are sent, some of the recipients will be customers of that bank. According to the FBI, as many as 3% of the recipients of these phishing emails actually input their bank passwords and pins. With one click, their identity is stolen, and their bank account drained.