Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    The Big Personal Hack That Almost Happened

    Written by

    Wayne Rash
    Published April 11, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The story really starts the day before somebody attempted to gain access to my social media accounts. I got pinged in an email from a credit-card issuer with the dreaded “Fraud Alert” subject line. I was already at my desk, so it took only seconds to look at the email and confirm that it appeared to be genuine. Then, instead of calling the phone number in the email, I called the customer service number on the back of the card itself.

      I’d already looked up the name that appeared on the merchant account of whoever was doing the charging, and the site looked as if it was an attempt to obfuscate the actual company. One sure indication was a statement that the merchant name might not be the same one as from whomever I bought whatever it was. It was made easier because I hadn’t actually charged anything to that card in months, so I knew that any charge was fraudulent.

      But what was interesting about the initial charge that triggered the fraud alert is that it was for $1.00. Then, while I was on the phone with the credit card company, another charge for much more money showed up on my account. I told the customer service agent that both charges were phony. Both charges were listed as fraudulent and removed from my account.

      Charges of $0.00 Are Red Flags

      Then, as I was about to end the call, the agent said that I should wait while she checked my account further. A few minutes later, she said that she’d found a series of 231 charges in January for $0.00. They hadn’t triggered alerts because they weren’t for any money, but they were apparently attempts to confirm whether my account was alive, which it was. The agent then flagged those charges as fraud and told me she was sending me a new card.

      Then the next day I got a verification code from LinkedIn to confirm my password change. Thing is, I hadn’t changed my password, so the password change was an apparent attempt to get into my LinkedIn account. Apparently the person, who LinkedIn said was in Lagos, Nigeria, had recovered an old password from that site’s earlier breach and was trying to get in. But I had changed my password when I found out about the breach. Now, I changed it again and turned on multifactor authentication.

      While I was at it, I went in and forcibly logged out all open sessions on LinkedIn, which would require that anyone trying to regain entry would have to log in with the new password. While I was at it, I removed all of the alternate email addresses maintained by LinkedIn.

      Stronger Passwords, Changes in All Accounts

      Forewarned, I then went to Facebook and Twitter and made sure I changed to new, stronger passwords, made sure two-factor authentication was turned on and made sure that all sessions were forcibly logged out. Then with Facebook, I disabled access to all of the various apps and services that were listed, including dormant apps from Windows Phone and BlackBerry. Shortly after I finished, I started getting verification alerts showing that someone was trying to break into my Facebook account, but that one was already secured by a unique, long and impossible-to-remember password.

      After that, I placed a fraud alert with the three major credit bureaus and placed fraud alerts on all of my credit cards. Then I changed passwords on my shopping sites. I also changed the password on my password manager, just in case.

      What I’ve done appears to be working. I haven’t seen any indication of successful penetration to any of the accounts I’ve changed, but I’ve turned on notifications so that any changes will alert me, and where possible, I’ve turned on two-factor authentication. My guess is that the Nigerian prince of legend will go find someone else who is an easier target.

      I also took a few minutes to see which of my email addresses and which of my passwords might have been compromised by going to the Have I Been Pwned? website. The only passwords exposed were old ones that I no longer use but which had been used, in one case, on LinkedIn.

      What Was Learned From the Experience

      Here’s what I’ve learned from the attempted hack of my various online accounts:

      • If you get a fraud alert, pay attention, but that doesn’t mean you should click on the links in the email. Phishing emails are frequently disguised as fraud alerts.
      • Set up notification of any time your information is leaked in a breach. You can do this on Have I Been Pwned? or on other websites.
      • While you’re there, see which of your email addresses have been compromised and which of your passwords have been revealed.
      • If you get a notification of something like a password change (or even an attempt), then use that as a reason to change your passwords to something unique and different.
      • While you’re at it, take a look at your bank and credit card accounts. Seemingly minor things like charges or deposits for $0.00 are likely significant because they confirm your account information.
      • Look for other indications that something is amiss, such as bounced emails that you didn’t send. Any of these can mean that someone is trying to take over one or more of your accounts.
      • Use a password manager and multifactor authentication.

      Make no mistake, I didn’t get hacked because I was lucky, but rather because I was prepared. I knew what to do, I had the phone numbers I needed handy, and I took action immediately, beating the bad guys to the punch. But it could easily have been the other way, especially if I’d been out of touch because of travel or vacation. The best thing anyone can do is to make sure that they’re prepared well before anything happens.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.