ENGTINNGE CYBER ATTACKER TEN INFORMATION AN RUK?

ENGTINNGE CYBER ATTACKER TEN INFORMATION AN LAKKHAWM?
How Do Cyber Attackers Gather victim Information?)
Er. Chhungpuia Renthlei
Senior Technical Officer, NIELIT Aizawl

Cyber attaker te hian an tum ber chu awlsam taka website leh social network awlsam taka tlawh theih atanga data tam thei ang ber lakhawm leh Software fing tak tak hmanga heng data inkungkaihna zirchiana awmze nei taka remkhawm a, pawikhawih nana hman theih tura siam a ni. Tin, printed magazines  & newspapers, publications hrang hrang journals, conference proceedings, corporate documents te hi data lakhawm nan an hmang nasa hle bawk. A tlangpuiin internet a kan thil post te hi  searh engine (google, Bing) hmanga zawn hmuh theih vek a ni a, Attacker te hian awlsam takin data tam tham tak an zawng hmu zung zung thei bawk.

Engtinnge data pawimawh an rukchhuah theih?
Cyber attacker te hian kawng chi khat chauh hmang lovin chi hrang hrang hmangin an mi beih te information pawimawh an lakkhawm thin. A lar zual deuh deuh te han tarlang ila.

Phishing: Hei hi emails, text messages leh phone calls hmanga information pawimawh tak tak: login credentials, credit card numbers leh personal details ruk chhuahna a ni. An target group te hian information an pek chhuah ngei ngei theih nan emergency leh pawimawh hmel takin an dil thin.

Malware: Hei hi attacker ten an mi bum te Computer/Mobile, server, client, or network hnathawh tibuai tur leh information rukchhuahna tur liau liau computer program te tak te an siam hi a ni. Malware hi malicious software tihna a ni. software te reuh te viruses, worms, Trojans, ransomware, spyware, adware leh computer hnathawh tibuai thei ang chi te hi a huam

Data Breaches: Hei hi mi pakhat mai nilo mi thahnem tak information pawimawh tak tak:- customer records, financial data leh intellectual property a ruka lo khawih leh ruk chhuahna a ni. A tlangpuiin security that loh vang te, software structure fuh tawk loh vang te leh company a thawk rinawm loh vang te in a thleng thin.

Social Engineering: Mi rilru hneh thei tura thiam tak leh awihawm taka an information pawimawh pe chhuak tura thlemna a ni. Thil thleng dik tak ( Lucky ticket, Sale,Bank) hmangin bumna an siam a, hengah hian malware an thukru tel a.An thawndarh chiam thin. Kan click emaw, download apiangin kan sysmtemah Malware te hi an rawn lut nghal thin

Network Sniffing: Hei hi network bihthlakna a ni. Attacker te hian bihthlakna (network sniffing tools) hmanraw tha tak hmangin usernames, passwords, or financial transactions an lo thlithlai reng a. An duh duh an ruchhuak mai thin. Wify leh network security tha tawk loh vangin hei hi a thleng fo thin

Physical Access: Hei hi chu information rukchhuak tura an mi beih te computer/Mobile leh network an hmanruk sak hi a ni. Hetiang tih theihna sotware hi a awm nual mai. ID leh password an hre ru a, duh tawkin an hriat loh laiin an sysmtem an lo hmang sak thin.A thenah chuan an mi beih tur hmanrua ah a rukin an lo install sak a, an duh hun hunah an system atangin an control sak tawh mai thin.

Brute Force Attacks: Hetah vethung ah chuan password chhuichhuahna (Password generator) software an hmang thin. An mi beih te password ni thei tur ang chi an zawng a, an test nghal zel a. Week password an la hmang anih phei chuan reilo te chhungin an hmuchhuak thin.

Data an lawkhawm te chu engtinge an tih zel?
A hmasa berin attacker te hian mimal identity data, sorkar reports, documents leh employees tarlanna Online Social Networks (OSNs) leh web sites te an bihchiang hmasa thin. Hei hi Selection and discovery an vuah. An target hi an ruk duh a zirin a danglam thei viau. A tlangpuiin mimal, employee, Social network group leh pawl lian tak a ni thin 

Hemi hnuah hian an target data pawimawh kim chang zawkin an zawngkhawm a. Personal data, geographical location, historical data, employer data, relationships, contacts, achievements, community contributions related to research leh supportive operations, etc. te an zawng khawm a. Hei hi Resource extraction and mining an vuah.

Heng data an zawnchhuah te hi uluk takin an zir chiang a, an target group te tana pawi thei leh tihmualpho theihna tur data te an thliar hrang vek a. Data hrang hrang te inlaichinna chipchiar takin an zir a. Hei hi Resource correlation and information processing an vuah a, Attacker te hlawhtlinna leh hlawhchhamna hi an data lakhawmah a innghah tlat avangin an fimkhur hle thin. Entirnan, Data te hi hming, thlalak, User ID, password, phone no, Bank a/c No e.t.c te a ni a. Heng inthlunzawm dan an chhian hnuah User ID leh password, Bank a/c hming leh number te an hrechhuak thin a. 

Heng hmang hian information an rawn duangchhuak leh a. An hlawhtlin ngei theih nan attacking model uluk takin an duang chhuak leh ta a. Tichuan, an mi beih tur(Target group)  information pawimawh tak tak te chu sum thahnem taka an khulh chhuah theih nan tihchhiat emaw, hralh emaw, thehdarhah an vau ta thin a.  

Aw le, heng te hi chu alangsar zual tak tak chauh a ni a, tunlaiah chuan Artificial intelligent software hmangin information pawimawh tak tak awlsam takin an ruchhuak thei tawh. Kan invenna pawimawh ber chu passwrd chhui chhuah har (Strong password) hman hi a ni. Tin, hriatchian loh link clik loh leh download loh hram hram hi kan himna a ni.

Post a Comment

0 Comments