User Tag List

+ Reply to Thread
Results 1 to 9 of 9

Thread: Can we talk about the hacks?

  1. #1
    Points: 36,417, Level: 46
    Level completed: 65%, Points required for next Level: 533
    Overall activity: 0.1%
    Achievements:
    SocialVeteran50000 Experience Points
    Archer0915's Avatar Senior Member
    Karma
    56214
    Join Date
    Jun 2012
    Posts
    7,009
    Points
    36,417
    Level
    46
    Thanks Given
    3,252
    Thanked 2,215x in 1,682 Posts
    Mentioned
    48 Post(s)
    Tagged
    0 Thread(s)

    Can we talk about the hacks?

    So we know of all the recent WikiLeaks stuff and other item and... well... I really have to ask, how are they finding where to hack?

    I mean you need some information on your target (IP, URL to get the IP, something) because these things do not happen at random. I am betting there is much more to this than just a random hack, perhaps a leak, mole or perhaps one lonely email Trojan that got forwarded?

    This kind of thing is of concern.

    What else is getting hacked that we are not made privy to?
    I would like to hear some discussion, not about who did it or who got hacked or what information was leaked.

    I would like to discuss the fact that there have been hacks, how they happen and what everyone can do to prevent these things from happening.

  2. The Following User Says Thank You to Archer0915 For This Useful Post:

    valley ranch (10-13-2016)

  3. #2
    Points: 23,952, Level: 37
    Level completed: 67%, Points required for next Level: 398
    Overall activity: 0%
    Achievements:
    SocialVeteran50000 Experience Points
    Newpublius's Avatar Senior Member
    Karma
    39140
    Join Date
    Mar 2013
    Location
    Boynton Beach, FL
    Posts
    7,313
    Points
    23,952
    Level
    37
    Thanks Given
    1,556
    Thanked 4,123x in 2,793 Posts
    Mentioned
    94 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by Archer0915 View Post
    So we know of all the recent WikiLeaks stuff and other item and... well... I really have to ask, how are they finding where to hack?

    I mean you need some information on your target (IP, URL to get the IP, something) because these things do not happen at random. I am betting there is much more to this than just a random hack, perhaps a leak, mole or perhaps one lonely email Trojan that got forwarded?

    This kind of thing is of concern.

    What else is getting hacked that we are not made privy to?
    I would like to hear some discussion, not about who did it or who got hacked or what information was leaked.

    I would like to discuss the fact that there have been hacks, how they happen and what everyone can do to prevent these things from happening.
    Russian hackers are pretty good apparently. I don't think in these terms but I know from experience Wordpress, vbulletin, oscommerce all had vulnerabilities Russian hackers were able to exploit. There's a certain randomality in finding targets I suppose.

  4. #3
    Points: 31,720, Level: 43
    Level completed: 48%, Points required for next Level: 730
    Overall activity: 0.1%
    Achievements:
    50000 Experience PointsVeteran
    valley ranch's Avatar Senior Member
    Karma
    30413
    Join Date
    Sep 2015
    Location
    Sierra Nevada Mountains and Nevada High Desert
    Posts
    3,099
    Points
    31,720
    Level
    43
    Thanks Given
    1,843
    Thanked 1,068x in 830 Posts
    Mentioned
    15 Post(s)
    Tagged
    0 Thread(s)
    Hi, Do you have an understanding of Hacking?


    The hacking re: WikiLeaks was most likely done very close up, possibly by an gov employee. Someone in another country would like you mentioned would have trouble finding the address of a rogue battery of machines. Once the address was known it wouldn't be hard and because there were several who had access and more than one target machine it wouldn't be noticed unless it they suspected it had been done.

    The address was known be members of people in other countries and employees of companies who had business with the foundation. someone who needed a government favor but couldn't pay the price, could have handed over the address.

    The chance of the hackers being Russian is not high. Russians were mentioned to point the finger at a phantom enemy.

  5. #4
    Points: 175,393, Level: 99
    Level completed: 44%, Points required for next Level: 2,257
    Overall activity: 24.0%
    Achievements:
    SocialVeteranTagger First Class50000 Experience Points
    Dr. Who's Avatar Advisor
    Karma
    870787
    Join Date
    Jan 2013
    Location
    Gallifrey
    Posts
    69,348
    Points
    175,393
    Level
    99
    Thanks Given
    12,938
    Thanked 13,050x in 8,898 Posts
    Mentioned
    207 Post(s)
    Tagged
    0 Thread(s)
    I think much of the hacking these days involves getting specific virus programs - data miners into the target system. The tendency for many users to use the same removable media at home, where the security is lower or non-existent and then at work, where it bypasses all of the corporate firewalls, is one frequent way that this occurs. All the hackers have to do is obtain a list of employee email addresses and then sneak in a spy program into some junk email that mines other email addresses. People email things to their home email addresses and Bob's your uncle. At least one of the home email addresses will belong to someone who uses removable media. Once their home computer is infected, the virus is carried to work on the flash drive or whatever and is literally injected into the corporate or government system, bypassing all security. By the time the anti-viral programs can isolate it, the system has been hacked and terra bytes of information have been sent to the nogoodniks.
    In quoting my post, you affirm and agree that you have not been goaded, provoked, emotionally manipulated or otherwise coerced into responding.



    "The difference between what we do and what we are capable of doing would suffice to solve most of the world’s problems.”
    Mahatma Gandhi

  6. #5
    Points: 139,053, Level: 89
    Level completed: 89%, Points required for next Level: 397
    Overall activity: 42.0%
    Achievements:
    Tagger First ClassSocial50000 Experience PointsVeteran
    stjames1_53's Avatar Senior Member
    Karma
    58450
    Join Date
    Apr 2016
    Posts
    50,862
    Points
    139,053
    Level
    89
    Thanks Given
    105,026
    Thanked 29,471x in 20,423 Posts
    Mentioned
    175 Post(s)
    Tagged
    0 Thread(s)
    I got hacked and had conficker placed on all three computers. I had that POS virus for two weeks before it reared its head. One new modem and three new hard drives (two desktops and one laptop) and a new wi fi modem was the only way to get them out of my sh*t.
    conficker: https://en.wikipedia.org/wiki/Conficker
    it burned a hole in the two desktop hard drives. It had all of our IP addresses and the modem's IP. Every password on exterior accounts had to be changed from a remote location. It was a mess...................but tis all cool now
    For waltky: http://quakes.globalincidentmap.com/
    "The Nation that makes a great distinction between its scholars and its warriors will have its thinking done by cowards and its fighting done by fools."
    - Thucydides

    "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote" B. Franklin
    Igitur qui desiderat pacem, praeparet bellum

  7. #6
    Points: 36,417, Level: 46
    Level completed: 65%, Points required for next Level: 533
    Overall activity: 0.1%
    Achievements:
    SocialVeteran50000 Experience Points
    Archer0915's Avatar Senior Member
    Karma
    56214
    Join Date
    Jun 2012
    Posts
    7,009
    Points
    36,417
    Level
    46
    Thanks Given
    3,252
    Thanked 2,215x in 1,682 Posts
    Mentioned
    48 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by valley ranch View Post
    Hi, Do you have an understanding of Hacking?
    Yes

  8. #7
    Points: 500,453, Level: 100
    Level completed: 0%, Points required for next Level: 0
    Overall activity: 0.1%
    Achievements:
    SocialOverdrive50000 Experience PointsVeteran
    Cigar's Avatar Banned
    Karma
    325517
    Join Date
    May 2012
    Location
    Wow, what next?
    Posts
    78,900
    Points
    500,453
    Level
    100
    Thanks Given
    4,088
    Thanked 12,276x in 9,780 Posts
    Mentioned
    1541 Post(s)
    Tagged
    1 Thread(s)
    Quote Originally Posted by Archer0915 View Post
    So we know of all the recent WikiLeaks stuff and other item and... well... I really have to ask, how are they finding where to hack?

    I mean you need some information on your target (IP, URL to get the IP, something) because these things do not happen at random. I am betting there is much more to this than just a random hack, perhaps a leak, mole or perhaps one lonely email Trojan that got forwarded?

    This kind of thing is of concern.

    What else is getting hacked that we are not made privy to?
    I would like to hear some discussion, not about who did it or who got hacked or what information was leaked.

    I would like to discuss the fact that there have been hacks, how they happen and what everyone can do to prevent these things from happening.

    I've had to have my Debit Card and funds replaced at least 5 times.

    That's why I never have more the $250 in that account.

  9. The Following 3 Users Say Thank You to Cigar For This Useful Post:

    Archer0915 (10-14-2016),Peter1469 (10-14-2016),stjames1_53 (10-14-2016)

  10. #8
    Points: 36,417, Level: 46
    Level completed: 65%, Points required for next Level: 533
    Overall activity: 0.1%
    Achievements:
    SocialVeteran50000 Experience Points
    Archer0915's Avatar Senior Member
    Karma
    56214
    Join Date
    Jun 2012
    Posts
    7,009
    Points
    36,417
    Level
    46
    Thanks Given
    3,252
    Thanked 2,215x in 1,682 Posts
    Mentioned
    48 Post(s)
    Tagged
    0 Thread(s)
    Quote Originally Posted by Cigar View Post
    I've had to have my Debit Card and funds replaced at least 5 times.

    That's why I never have more the $250 in that account.
    I have never had that issue but I also live in a less populated area and there are fewer threats. I have had credit cards replaced a number of time because of hacks but have, thus far, never lost any money.

  11. #9
    Points: 39,654, Level: 48
    Level completed: 69%, Points required for next Level: 496
    Overall activity: 0.1%
    Achievements:
    VeteranTagger First Class25000 Experience PointsSocial
    waltky's Avatar Senior Member
    Karma
    5662
    Join Date
    Oct 2012
    Posts
    8,859
    Points
    39,654
    Level
    48
    Thanks Given
    2,515
    Thanked 2,140x in 1,616 Posts
    Mentioned
    46 Post(s)
    Tagged
    0 Thread(s)
    Granny says dey's both hacks...

    ... Hillary an' Trump.

  12. The Following User Says Thank You to waltky For This Useful Post:

    stjames1_53 (10-14-2016)

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts