Hacked - What to do if you're a target

Discussion in 'privacy general' started by Mover, Dec 13, 2008.

Thread Status:
Not open for further replies.
  1. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    It's not practical to expect the IT person/department to do their job? A company that allows that attitude from their IT people deserves what they get, compromised.
    Setting up and maintaining multiple security layers is preferable to dealing with the layer that is the problem, the users work stations? This is beginning to look like maintaining job security by refusing to fix the problem so they'll always have work to do.
     
  2. SystemJunkie

    SystemJunkie Resident Conspiracy Theorist

    Joined:
    Mar 3, 2006
    Posts:
    1,500
    Location:
    Germany
    Unplug ethernet?
     
    Last edited: Dec 30, 2008
  3. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    Here is a current attack:

    Executives at a Swedish Company Targeted via an Email Attachment
    http://isc.sans.org/diary.html?storyid=5662

    Note the double extension trick. If Windows is configured to hide known file types, the .exe extension would not show. Also, if I had Excel installed, the Excel icon would display:

    swedtarget-4.gif

    Actually, an attached executable file should never get through a mail server. They are deleted by mine automatically, unless zipped.

    swedtarget-5.gif

    Also, you wonder if the person would stop and think whether or not she/he had recently sent an XLS file by email to the recipient.

    If company personnel are tricked into opening this file, the only sure protection would be if the workstations were configured
    so that users could not run unauthorized executables.

    swedtarget-3.gif 205393 swedtarget-2.gif

    [credit: scribd.com white paper]


    ----
    rich
     
    Last edited: Jan 9, 2009
  4. TechOutsider

    TechOutsider Registered Member

    Joined:
    Sep 26, 2008
    Posts:
    549
    I use common sense, NAV, Windows Firewall, a reputable e-mail client, a hardware firewall and a dynamic IP to stealth myself from hackers.

    If I am hacked, I would just reformat and change my IP through my ISP.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.