<<

Index

Numbers Android devices, security compared to iPhones, 209–212 2016 presidential election, 15, 107–108 Angelova, Barb, 49 2017 Verizon Data Breach Investigations AnnualCreditReport.com, 139 Report, 92 Anthem, breach in 2015, 26 419 scams, 55 Anti-Phishing Working Group, incident 4Chan, whaling, 37 response, 98 antimalware software, 88 A antivirus software, 87–88 access security, local fi le storage, 163 cryptomining , 43 actions (attack chains), 69 detecting phishing attack, 96 active duty alerts, military identity importance of updating, 78 theft, 119 local fi le storage, 162 activity notices, 177, 189 myth vs. fact, 88, 194 ad blocking extensions, 189–190 protecting computers, 199 ad injectors, 78 protecting information when , security issues, 190 traveling, 243 adversaries spyware, 47 caught, 17–21 Apple ID, value of login credentials, compared to source of breaches, 92 25 motives, 13 Apple, Koobface gift card scam, 51 nation-state attackers, 14–16 AppleCare, phishing, 209 profi le of, 12–13 applications, protecting computers, advertisements, malware 199 infections from,COPYRIGHTED 77 APT1 MATERIAL(nation-state hacking adware, 43, 47–48 group), 14–15 Google Play store, 208 Ashley Madison, blackmail, 8 airplanes, security ATIS (Alliance for Telecommunications vulnerabilities, 238–239 Industry Solutions), 60 Alliance for Telecommunications ATMs, credit card skimmers, 142 Industry Solutions (ATIS), 60 attack chains, 66–68 alternative fi nancial services (AFS), 145 attack methods. See also attack vectors Amazon Alexa, privacy concerns, 231 adware, 47–48 Amazon Echo, privacy concerns, 231 banking information, 24 Amero, Julie, 47–48 charity scams, 58

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 251251 111/22/20181/22/2018 44:48:00:48:00 PPMM 252 Index

clone phishing, 39–40 attacks computing resources, 27 cryptojacking, 194–196 distributed denial-of-service (DDoS), 19 timing, 4 email compromise, 38–39 authentication email phishing, 34–35 IoT devices, 232 email scams, 3 phone numbers, 60 fear tactics, 33 two-factor, 5, 25 government agency authentication apps impersonation, 52–53 two-factor authentication, 85 grandparent scam, 53 compared to text-based identity theft, 108–110 authentication, 207 Internet of Things (IoT), 27–28 authorization, breaches, 8 job scams, 56–58 auto-connecting, protecting information online dating scams, 54–56 when traveling, 243 personally identifi able automated hacking software, 4 information (PII), 26 spear phishing, 35 phishing vectors, 33 automated tools, searching databases, pretexting, 42–43 83 ransomware, 44–46 automatic updates, 85, 88 robocalling scams, 58–61 avionics systems, scamming, 50 vulnerabilities, 238–239 scareware, 47 SMS phishing, 41–42 B social engineering, 32–33 Babayan, Vachik, 23 spear phishing, 35–37 back doors, credentials, 25 spyware, 46–47 BackBlaze, 164 technical support scams, 51–52 backing up data, 89–90 Trojans, 48 cloud storage, 160–161, 163–164 utility bill scams, 54 fi le protection, 165 virtual kidnapping, 53–54 incident response, 97, 99 voice phishing, 40–41 local fi le storage, 163 whaling, 37–38 mobile devices, 213 attack targets, 23 myth vs. fact, 89 path of least resistance, 24 protecting computers, 200 social media, 171–172 when traveling, 247 , 172–173 Baker, Stephen, 55 attack vectors. See also attack methods bank account credentials, 25, 73–74 cryptomining, 195 bank account verifi cation, 112 email, 72–73 BankBot, 48 freeware, 78 banking apps, 147 phone calls, 75–76 banking Trojans, 48 software, 78 Google Play store, 208 text messages, 41–42, 73–75 Baratov, Karim, 18–19 URLs, 76 Barclays, 18 USB drives, 71–72, 78–79 Berkeley Open Infrastructure for website links, 76 Network Computing (BOINC), 198 websites, 76–78 Better Business Bureau (BBB), voice Wi-Fi, 79–80 phishing, 40–41

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225252 111/22/20181/22/2018 44:48:00:48:00 PPMM Index 253

Betz-Hamilton, Axton, identity theft, C 126 cable modems, updating, 84–85 biometrics, risks, 212 caller ID, spoofi ng, 76 Bitcoin, cryptomining, 196 Cambridge Analytica, 173–174 Bitdefender Mobile Security, 214 cameras, remote operation, 46 black market, medical Campaign for a Commercial Free information value, 26 Childhood (CCFC), 132 black-hat , 14, 24 candy drops, USB keys, 78–79 blackmail, breaches and, 8 Carder’ s Paradise, 25 blockchains, 43 personally identifi able information, 26 BOINC (Berkeley Open Infrastructure for Carleton University, 185 Network Computing), 198 Carnegie Melon CyLab study, 127 botmasters, 28 catphishing, 50, 54–56 , 72 DDoS attacks, 28 CCFC (Campaign for a Commercial Free Childhood), 132 Google Play store, 208 IoT devices, 228 Center for Digital Democracy (CDD), 132 IoTroop, 28 password attacks, 31 charity scams, 58 resources, 13 chat features (online gaming), 130–131 terrorist organizations, 17 ChexSystems, 112, 113 bots, Twitter and, 172–173 child predators, 130 breaches, 17–21 children alerts, 188 identity theft, 125–129, 133 CloudPets, 133 online activity, 129–131 compared to cyberattacks and private information, 128–129 hacks, 8 smart toys, 131–135 Deep Root Analytics, 176 Social Security numbers, 128 Dropbox, 180 Children’ s Online Privacy Protection Act Equifax, 66 (COPPA), 132 Experian, 109 chip-based security, 148 identity theft, 108–109 Christiano, James "Jamie," 59–60 LifeLock, 111 Chrysler vehicles, Uconnect LinkedIn, 180–181 vulnerabilities, 227 mixing personal and work Clapper, James, 17 passwords, 93 click fraud apps, Google Play store, 208 password changing, 188 Clinton, Hillary, 107 password reuse, 179–180 clone phishing, 39–40 reused credentials, 83 cloud storage, 159–165 source of compared to adversaries, 92 CloudPets, data breach, 133 Spiral Toys, 133 Cobalt Gypsy, 169–170 Twitter, 173 Coinhive, 197 Yahoo, 152–153 Collins, Arran, 53–54 Brennen, John, 17 command and control apps British Airways, 18 attack chains, 69 browser-setting hijackers, 78 Google Play store, 208 browsers, ad-blocking extensions, 47 computer accounts, individual for burner phones, 248 children, 135

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225353 111/22/20181/22/2018 44:48:00:48:00 PPMM 254 Index

computers credit reports cryptocurrency mining, children, 127–128 symptoms, 193–195 credit freezes, 112 donating CPU capacity, 198 fraud alerts, 97, 111 protecting, 198–201 security freeze, 109 computing resources, 27–28 criminal organizations, 16 consumer databases, personally Crypto Sheriff tool, ransomware, identifi able information, 26 101 Consumer Watchdog, 154 cryptocurrencies, 18–19 Consumers Union, 132 mining, 28 COPPA (Children ’s Online Privacy Monero, 197 Protection Act), 132 ransomware payments, 45 Corbin, Jane, 38 cryptocurrency mining CPU usage Bitcoin, 196 cryptocurrency mining, 193–195 Coinhive, 197 donating capacity, 198 computer hijacking, symptoms, monitoring, 200 193–195 Crackas with Attitude, 17 critical industrial processes, 197 Craigslist, 19 websites, opt-in, 196–197 job scams, 56–58 cryptographic algorithms credentials. See also cracking, 28 passwords; usernames hashing passwords, 180–181 compromising accounts, 25 cryptojacking, 194–196 duplicate, 86 Google Play store, 208 email compromise incident malware, 43–44 response, 102 protecting computers, 200 incident response, 97, 100 cryptomining malware, 43–44. See also Internet of Things (IoT), 27 cryptocurrency mining Kronos Trojan, 48 Cyber Security Intelligence Department PayPal, 25 (United Airlines), 239 phishing attacks, 25 cyber weapons, NSA, 16 reselling, 25 cyber-enabled fi nancial fraud, 20–21 Reset Password links, 39 cyberattackers reused, 83 profi le, 12–13 spyware, 46–47 reasons for success, 7 stuffi ng, 181–182 targets, 13 texts as security attack vector, 73 terrorist organizations, 17 updating, importance of, 74–75 cyberattacks, compared to breaches credit and hacks, 8 freezing, 97 cybercrime organizations, 16 protecting, 112–113 Cybercriminal Code of Ethics, 7 credit card skimmers, 23, 142, 144–145 cybercriminal organizations, avoiding, 148 characteristics, 13 credit cards cyberhygenic practices, 7 fraud, 141–143 attack chains, 68–70 identity theft insurance, 112 importance of, 84 when traveling, 246 passwords, 182–184 Credit Karma, 111 risk assessment, 92

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225454 111/22/20181/22/2018 44:48:00:48:00 PPMM Index 255

cybersecurity protecting money, 146–149 risk assessment, 92 robocalling, 61 smart toys, 133 social media protection, 176–178 two-factor authentication, 85–86 D using voicemail, 76 Dark Web, 14 whitelisting phone numbers, 58–59 Carder’ s Paradise, 25 delivery (attack chains), 69 identity theft, 109 Dell, Alexa, 173 password databases, 25 Democratic National Convention (DNC), personally identifi able information, 26 attacks on, 15 ransomware payments, 45 Department of Defense, phishing data. See fi les tweets, 172–173 data breaches Department of Homeland Security, 20 automated hacking software, 4 Department of Justice, 21 credentials, 25 Department of the Treasury, 20 identity theft, 108–109 reporting IRS impersonation scams, 141 LifeLock, 111 devices statistics, 6 disconnecting after an attack, 96, 98 Yahoo, 152–153 email privacy, 157 data brokers, 175 IoT, 232–238 data mining, social media, 173–176 protecting when traveling, 243 data protection, social media, 176–178 ransomware incident response, 100 databases, exposed, 25 scanning for malware, 99 Davis, Debbie, 23 secure for banking, 147 Davis, Todd, 111 updating, 84–85 DDoS. See distributed denial-of-service wiping, 201 attacks (DDoS) Direct Express, 153 decryption solutions, ransomware, 101 disk cleanup, incident response, 99 Deep Root Analytics, 176 distributed denial-of-service attacks defenses (DDoS), 19 antivirus software, 87–88 Internet of Things (IoT), 27–28 attack chains, 68–70 DNC (Democratic National Convention), backing up data, 89–90 15 credit card skimmers, 144–145 documents cryptomining, 44 credit card fraud, 143 email privacy, 155–158 secure disposal, 167 fake family emergencies, 54 shredding sensitive, 113 fi le protection, 165–167 Domain Name Service (DNS), DDoS Find My Phone features, 211 attacks, 28 gift card fraud, 143 Draper, Adam, 135–136 government agency impersonation, 52–53 Drew, Eric, medical identity home Wi-Fi networks, 221–224 theft, 114–115 path of least resistance, 24 drive-by downloads, ransomware, 45 protecting computers, 198–201 Dropbox, breach, 180 protecting credit, 112–113 Dugas, Paul, 153 protecting information when dumpster diving, identity theft, 110 traveling, 243–249 Durachinsky, Phillip, 46 protecting mobile devices, 211–215 Dyn, DDoS attack, 28

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225555 111/22/20181/22/2018 44:48:00:48:00 PPMM 256 Index

E email phishing, 34–35, 72. See also phishing EAC (email account compromise), 20-21 email compromise, 38–39 elections, 2016 presidential, nation-state Email Privacy Act, 155 hacking groups and, 15 Emergency Calls Only notifi cations, electricity bills, cryptomining and, 194–195 protecting mobile devices, 207 Electronic Communications Privacy Act emergency contacts, when traveling, 246 (ECPA), 155 emotions, attack timing, 4 Electronic Crimes Task Force, 11–12 employees, credit card fraud, 142 Electronic Privacy Information Center encryption (EPIC), 132 cloud fi le storage, 163 email fi le protection, 166 account activity, 157 home Wi-Fi networks, 219–220 attack vector, 72–73 IoT devices, 232 fraud prevention, 5 local fi le storage, 162 headers, 72–73 mobile devices, 213 local fi le storage security, 163 network hacking, 49 privacy, 154–155 protecting computers, 198–199 protecting privacy, 155–158 protecting home Wi-Fi networks, 223 provider privacy options, 157 ransomware, 45 recalling sent, 93 smart toy network connections, 134 settings, 157 engine indicator crew alert system two-factor authentication, 5, 86 (EICAS), vulnerabilities, 239 email account compromise (EAC), 20–21 Enterprise Rent-A-Car, 19 email accounts EPIC (Electronic Privacy Information advantages of multiple, 156 Center), 132 banking-only, 146 Equifax, breach, 66, 109 value of hacked, 153–154 evidence, ransomware incident vulnerable information, 39 response, 100 when traveling, 247 Experian, 112 email addresses, 4 breach, 109 automated hacking software, 4 Explanation of Benefi ts statements, cloned email, 40 medical identity theft, 117 impact of typos, 91 exploit kits, 77 LifeLock breaches, 111 exploitation (attack chains), 69 protecting mobile devices, 207–208 external hard drives, as fi le backup, 164 Russian agents, 15 extortion, 24 usernames, 93 email attachments cryptomining malware, 195 F ransomware, 45 , 19 Trojans, 48 data collection, 174–175 email compromise, 38–39 fake accounts, 171 detecting, 102 scamming friend requests, 50 response steps, 102 FAFSA (Federal Student Aid), 129 email links Fair and Accurate Credit Transactions ransomware, 45 Act (FACTA), 111 Reset Password, 39 fake persona (social media), 170 Trojans, 48 fake take-out menus, 242

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225656 111/22/20181/22/2018 44:48:00:48:00 PPMM Index 257

fake Wi-Fi networks, 240 liability, 147 false information, Democratic prepaid card fraud, 145 National Committee, Fancy Bear real estate, prevention steps, 5 attacks on, 15 wire transfer, 138–139 false news, 32 free medical services, healthcare Fancy Bear (nation-state hacking fraud, 117 group), 15 Free Palestine Movement, 17 Federal Bureau of Investigation (FBI), 20 free VOIP, traveling and, 244 Cyber Crime Squad, 19 freeware, attack vector, 78 Internet Fraud Complaint friend requests Center, 97, 101 scamming, 50 ransomware investigations, 46 social media data protection, 177 Federal Communications Commission From fi eld (email), spoofi ng, 72 (FCC), robocalling rulings, 60 front desk call scams, 243 Federal Student Aid (FAFSA), FruitFly, 46 securing, 129 FSB (Russian Federal Security Federal Trade Commission (FTC), 55–56 Service), 19 incident response, 97–98 FTC. See Federal Trade IRS impersonation scams, 141 Commission (FTC) robocalling, 59 FICO credit scores, PII value, 26 G fi ght-or-fl ight response, 92 Gammell, John Kelsey, 19 fi le management, 164–165 Gartland, Claire T., 132 fi le transfer, paid services, 5 gas stations, credit card skimmers, 142 fi les General Data Protection Regulation cloud storage, 160–162 (GDPR), 175 infected fi le attachments, 169–170 Genesis Toys, 131 malicious threats, 161 Gibson, Richard, identity theft, 114–115 non-malicious threats, 161 gift card fraud, 143 protecting, 165–167 Giuliano, Mark, 17 fi nancial scams, avoiding, 148 Gledhill, Michael, 18 fi rmware updates Golin, Josh, 132 cars, 228 Gonzalez, Albert, 11–12, 24 IoT devices, 234–235 good Samaritan pickpockets, 242 protecting home Wi-Fi Google networks, 222–223 email privacy, 154–155 fi tness trackers, privacy phishing, 185 concerns, 229–230 Google Authenticator, two-factor forwarding settings (email), incident authentication, 85 response, 102 Google Pixel devices, 211–212 fraud. See also scams Google Play, mobile malware, 208–209 alerts Google Voice numbers, protecting mobile incident response, 97 devices, 207 LifeLock, 111 GOP (Guardians of Peace), 93 breaches and, 8 government agency impersonation, 52–53 credit card, 141–143 IRS impersonation fraud, 140–141 gift card, 143 GrandCrab, 77 IRS impersonation, 140–141 grandparent scam, 53

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225757 111/22/20181/22/2018 44:48:00:48:00 PPMM 258 Index

Green Dot MoneyPak cards, 145 I Guardians of Peace (GOP), 93 I-Que Intelligent Robot, 132 Guccifer 2.0, 15 IC3. See Internet Crime Complaint guest networks, protecting home Wi-Fi Center (IC3) networks, 223–224 iCloud, whaling, 37 ICS (Industrial Controls Systems), 197 H identifi cation when traveling, 246 HackerOne, Who Are Hackers, 12 identity monitoring services, 111–112 hackers, 14 identity theft hacking activists, 17 2016 presidential election hacking software, automated, 4 infl uence, 107–108 hacks compared to cyberattacks and children, 125–129, 133 breaches, 8 effects, 125 hard drives, protecting, 198–199 fraud alerts, 111 hashing passwords, 180–181 identity monitoring services, 111–112 Have I Been Pwned, 181 incident response, 98 PII exposure, 110–111 insurance, 112 headers (email), 72–73 medical, 114–116 health insurance cards, identity theft, methods, 108–110 117 military personnel, 114, 118–119 Health Insurance Portability and senior citizens, 114, 119–121 Accountability Act (HIPAA), 115 identity theft affi davit (IRS Form health records, monitoring, 117 14039), 141 healthcare fraud. See also medical imposter web pages, 77 identity theft in-fl ight entertainment (IFE) systems, organized crime, 115 vulnerabilities, 238–239 penalties for, 116 incentives to cyberattackers, 13–14 healthcare industry, PII and, 26–27 incident response Heines, Kimberly, 153 options, 95 Hieu Minh Ngo, 109 phishing, 96–98 Hill, Kashmir, 230–231 ransomware, 100–102 HIPPA (Health Insurance Portability and technical support scams, 52 Accountability Act), 115 wire transfer fraud, 6 HMI (Human Machine Interface), 197 Industrial Controls Systems (ICS), Holdren, John P., 17 cryptomining, 197 home equity lines of credit (HELOCs), Innovis, 112 wire transfer fraud, 139–140 Instagram, fake accounts, 171 home Wi-Fi networks, 219–224, 235 installation (attack chains), 69 Hong Kong Exchanges and Clearing, 19 insurance Hulu, visibility of data, 231 healthcare card, protecting, 117 human error, data breaches, 92 healthcare fraud, 115 Human Machine Interface (HMI), wire transfer fraud, 5 cryptomining, 197 intellectual property, 14 Hunt, Troy, 110, 133, 181–182 Internal Revenue Service (IRS) Hurley, Mark, 238–239 government agency impersonation, 52 Hutchins, Marcus, 48 impersonation fraud, 140–141

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225858 111/22/20181/22/2018 44:48:00:48:00 PPMM Index 259

Internet Crime Complaint L Center (IC3), 20 Laopi Trojan, 209 smart toys, 134 laptops, protecting when Internet Fraud Complaint Center, 97 traveling, 247–248 ransomware, 101 law enforcement Internet of Toys, 131 email privacy, 155 Internet Research Agency (IRA), 107–108 reporting phishing, 98 iOS devices, attacks against, 209 liability, wire transfer fraud insurance, 5 IoT (Internet of Things) LifeLock, 111 accessing computing resources, 27 LinkedIn dangers, 228 breach, 180–181 cars, 228 fake accounts, 171 device types, 27 myth vs fact, 170 fi tness trackers, myth vs fact, 230 phishing attacks, 31 malware, symptoms, 225–226 scamming friend requests, 50 privacy concerns, 229–230 links protecting devices, 234–236 as attack vector in websites, 76 smart home vulnerabilities, 230–233 protecting mobile devices, 214–215 threats, 227–229 social media data protection, 177 IoT Cybersecurity Improvement Act, local storage, 161–163 233 lock screen codes, 212 IoT Inspector, privacy study, 232–233 lock symbol (websites), 77–78, 80 IoTroop, 28 login credentials. See credentials IP addresses, spoofi ng in email, 73 lost credit cards, 143 iPhone App store, malware, 209 iPhones, security compared to Android, 209–210, 211–212 M IRS. See Internal Revenue Service (IRS) Mac-specifi c spyware, 46 mail, senior citizen fraud, 121 J Malone, Matt, dumpster diving, 110 Malone, Mike, wire transfer jailbroken devices, 212 fraud, 138–139 JavaScript blocking extensions, 189–190 malvertising, 76 job scams, 56–58, 93–94 malware, 27 Jones, Aaron Michael, 60 adware, 47–48 JP Morgan Chase, 19 Coinhive, 197 juice jacking, 241–242 compared to freeware, 78 Just Eat, 18 credit card fraud, 142 cryptocurrency mining, 28, 193–195 K cryptojacking, 43 Kaltheuner, Frederike, 176 cryptomining, 43 Kaspersky Mobile Threat report, Laopi DDoS attacks, 28 Trojan, 209 detecting, 98 Kogan, Aleksandr, 174 email as attack vector, 72–73, 151 Koobface scam, 51, 75 fake technical support, 51–52 Krack vulnerability, 49 GrandCrab, 77 Krebs, Brian, 141, 144 home Wi-Fi networks, 219 Kronos Trojan, 48 incident response, 97

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 225959 111/22/20181/22/2018 44:48:00:48:00 PPMM 260 Index

IoT, symptoms, 225–226 mobile devices iPhone App store, 209 antivirus for Android devices, 213 Koobface scam, 75 biometrics, risks, 212 Laopi Trojan, 209 encryption, 213 malicious browser extensions, 47 jailbroken, 212 malvertising, 76 juice jacking, 241–242 mobile devices, 208–209 lock screen codes, 212 myths vs fact, 194 malware, 208–209 ransomware, 44–46 protecting, 206–208, 211–215 remote access control, 173 protecting when traveling, 247, 248 response steps, 98–99 safeguarding from theft, 214 scanning devices for, 99 secure design, 211 scareware, 47 system updates, 213 spyware, 46–47 theft and loss, 210–211 Trojans, 48 verifi ed apps, 213 types, 43 mobile phones, SIM swapping typosquatting, 76 attacks, 205 USB drives, 71–72 mobile port-out scams, 203–208 Wi-Fi as attack vector, 79 Monero (cryptocurrency), 28, 197 man-in-the-middle attacks (MITM), mobile devices, 209 79 money, protecting, 146–149 public Wi-Fi, 240 money laundering, home equity wire marketing, illegal tactics, 59 transfer fraud, 139 Match.com, pretexting attack, 42 money mules, 21 Mattu, Surya, 231 home equity wire transfer fraud, 139 McEachern, Jim, 60 job scams, 57 medical ID cards, identity theft, 117 Moran, Dorothy Bell, identity theft, 116 medical identity theft, 114–117. See also motives healthcare fraud cyberattackers, 13–14 medical information profi t, 24 correcting, 116 Muller, Robert S., III, 107 uses of, 26–27 Russian agents, indictments, 15 value on black market, 26, 114 My Friend Cayla doll, 131 merchants, credit card fraud, 142 Mia Ash, 169–170 N microphones, remote operation, 46 Nail, Michael, 138–139 Microsoft Offi ce, macros, 96 nation-state attackers, 14–16 military personnel, identity theft, Karim Bartov, 18–19 114, 118–119 Sony Pictures breach, 93 military power of attorney, military traveling and, 245–246 identity theft, 118–119 National Consumer Telecommunications Miller, Charlie, 227 and Utilities Exchange mining cryptocurrencies, 28, 43 (NCTUE), 112 (malware), DDoS attacks, 28 credit freezes, 113 MITM. See man-in-the-middle National Health Care Anti-Fraud attacks (MITM) Association (NHCAA), 115 Mitnick, Kevin, 24 National Health Service (NHS), data mobile banking apps, 147 breach, 92

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226060 111/22/20181/22/2018 44:48:00:48:00 PPMM Index 261

National Institute of Standards and P Technology (NIST), 185 packet sniffi ng, 240 neighbor spoofi ng, 60 paid accounts, cloud storage benefi ts, 162 neighbors, bad actors, 220 parental control software, 135 NetDotSolutions, Inc., 60 passcodes Netfl ix, visibility of data, 231 mobile port-out scams, 206 network names, protecting home Wi-Fi text messages as attack vector, 74 networks, 222 two-factor authentication, 85 networking password managers, 86–87, 146, 183–185 cryptomining malware, 43 email privacy, 156 home Wi-Fi, threats, 219–221 fi le protection, 166 smart toy connections, 134 myth vs fact, 87 Wi-Fi hacking, 49–50 password protection, 187 NHCAA (National Health Care Anti- social media data protection, 177 Fraud Association), 115 two-factor authentication, 87 Nigerian scams, 55 NIST (National Institute of Standards website access protection, 187 and Technology),185 passwords. See also not-for-profi t organizations, credentials; usernames charity scams, 58 attack methods, 25 NSA, cyber weapons, 16 changing, effectiveness of, 185 Nuance, 132 cloud storage, 162 NYU Tandon School of Engineering, 78 creation formula, 185–186 creation mistakes, 186 cyberhygenic practices, 182–184 O databases, 25, 83 Obama 2012 Facebook app, 174 hashing, 180–181 Offi ce of Personnel IoT devices, 234 Management (OPM), 15 mixing work and personal, 93 one-time passcodes (OTP), mobile port-out scams, 205 smishing and, 41 network hacking, 49 online activity, children, 129–131 protecting, 187–191 online console, protecting home Wi-Fi protecting computers, 201 networks, 221–222 protecting home Wi-Fi networks, 222 online dating scams, 54–56 Reset Password links, 39 online gaming, 130–131 resetting, 102 online stores, credit card fraud, 142 reusing, 179–180, 182–183 Onwuhara, Tobechi, 139 credential stuffi ng, 181–182 operating systems, reinstalling (incident smart toys, 134 response), 99–100, 101 spyware, 46–47 Operation Firewall, 12 Twitter breach, 173 Operation WireWire, 20–21 verbal, 146 OPM (Offi ce of Personnel patches, 16 Management), 15 importance of, 84–85 organized crime, healthcare fraud, 115 servers, 65–66 OTP (one-time passcodes), 15 path of least resistance, 24 out-of-offi ce email replies, payment, ransomware incident safeguards, 67 response, 100, 102

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226161 111/22/20181/22/2018 44:48:00:48:00 PPMM 262 Index

payment cards, when traveling, 246 phone calls payment processors, credit card fraud, 142 attack vector, 75–76 PayPal unsolicited, 214–215 credentials value, 25 voice phishing, 40–41 personal information sharing, 175–176 phone numbers stolen personas and, 107–108 authentication, 60 PC computers, cryptomining spoofi ng, 42 malware, 43 spoofi ng in text messages, 73–74 Pearson, Claire, smishing attack, 41 whitelisting, 58–59 personal cybersecurity, 68 phone scams, senior citizens, 120 personal information photography scams, 242–243 mixing with work information, 93 photos when traveling, 247 posting when traveling, 245 personally identifi able information (PII) ransomware incident response, 100 attack methods, 26 PII. See personally identifi able children’ s privacy and, 128–129 information (PII) exposure, 110–111 PIN codes methods of obtaining, 108–110 fi tness trackers privacy concerns, 230 uses of, 26–27 mobile port-out scams, 206 phishing. See also email phishing pirating, router vulnerabilities, 49 clone, 39–40 PLA Unit 61398 (nation-state hacking credit and, 113 group), 14–15 damage, 152 plug-ins, security issues, 190 detecting, 96 Podesta, John, 15 email, 34–35 point-of-sale service companies, credit email privacy, 156–157 card fraud, 142 myth vs. fact, 37–39 political campaigns, social media data Google, 185 mining, 174 incident response steps, 96–98 pop-up windows, blocking, 47 infected fi le attachments, 169–170 port freezes, protecting mobile iOS devices, 209 devices, 207 pretexting, 42–43 port-out scams, 204–205 ransomware, 45 protecting against, 206–208 reporting attacks, 97 symptoms, 203–204 reporting IRS impersonation posts, social media data protection, 177 scams, 141 pre-approved credit offers, 113, 129 SMS, 41–42 prepaid card fraud, 145 Trojans, 48 presidential election (2016) tweets, 172–173 nation-state hacking groups and, 15 utility bill scams, 54 Russian interference, 107–108 vectors, 33 pretexting, 42–43 voice, 40–41 prevention. See defenses phishing emails, 4 Princeton University, IoT privacy credentials, 25 study, 232–233 LinkedIn, 31 privacy personally identifi able information, 26 cloud storage settings, 162 Phobos Group, 151 email, 154–155 phone account verifi cation, 112 protecting, 155–158

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226262 111/22/20181/22/2018 44:48:00:48:00 PPMM Index 263

IoT devices, 229–230 Roberts, Chris, 238 policies, 234 Roblox game, 130–131 Privacy International, 176 robocalling scams, 58–61 privacy settings Roose, Kevin, 151 reviewing, 191 routers, 84–85, 220–223 social media data protection, 177 Ruser, Nathan, 229 profi t motive, 24 Russian Federal Security programs, protecting computers, 199 Service (FSB), 19 propaganda, terrorist organizations, 17 Russian nationals, 2016 presidential protocols, WPA2, 49 election, 107–108 public Wi-Fi, 32, 239–241 publicly available information, risk assessment, 94 S Sachs, Anndorie, identity theft, 116 R safe mode ransomware, 24, 43, 44–46, 72 incident response, 96, 98 average cost, 46 ransomware, 101 detecting, 100 Salisbury, Andrew "Andy," 60 fi le protection tools, 166–167 Santander Bank, smishing attack, 41 GrandCrab, 77 SCADA (Supervisory Control and IoT devices, 228 Data Acquisition (SCADA) server local fi le storage protection, 162 network, 197 myth vs. fact, 45–46 scams, 50 response steps, 100–102 charity, 58 Shadow Brokers, 16 credit card fraud, 141–143 WannaCry, 16 email, 3–4 RAT (remote access control), 173 gift card fraud, 143 RBS Wordplay, 19 government agency real estate, wire transfer fraud, 4–6, 39 impersonation, 52–53 Received fi eld (email), spoofi ng IP grandparent, 53 addresses, 73 home equity wire transfer reconnaissance (attack chains), 68–69 fraud, 139–140 Reddit, DDoS attack, 28 IRS impersonation fraud, 140–141 redirection, websites, 77 job, 56–58 remote access control (RAT), 173 mobile port-out, 203–208 Republican National Committee (RNC), online dating, 54–56 data sharing, 176 prepaid card fraud, 145 Reset Password emails, robocalling, 58–61 vulnerabilities, 39 SIM swapping, 205 restarting computer suspicious elements, 4 incident response, 99 technical support, 51–52 ransomware incident response, 101 tourist, 242–243 restaurants, credit card fraud, 142 types, 50 Rid, Thomas, 15 unbanked victims, 145–146 ringless voicemail, robocalls, 59 utility bill, 54 risk assessment, 66–67, 91–92 virtual kidnapping, 53–54 RNC (Republican National wire transfer fraud, 138–139 Committee), 176 wire transfer scams, 3–4

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226363 111/22/20181/22/2018 44:48:00:48:00 PPMM 264 Index

scareware, 43, 47, 78 Sessions, Jeff, 21 typosquatting, 76 Shadow Brokers, 16 Schneier, Bruce, 175 Shadowcrew.com, 11–12 science, donated processing power, 198 sharing services, protection while Scorecard Research, 231 traveling, 244 Scotland Yard, cyber fraud loss Shurter, Shon, identity theft, 127 statistics, 7 sidejacking, 241 screenshots, ransomware incident Signature-based Handling of Asserted response, 100 information using toKENs search engines, URL security and, 77–78 (SHAKEN), 60 seat electronic box (SEB), SIM locks, protecting mobile devices, vulnerabilities, 238–239 207 Seattle Cancer Care Alliance, 114–115 SIM swapping, 205 Secret Service Simon, Steve, 15 credit card skimmers, 23 Simpson, John, 154 Electronic Crimes Task Force, 11–12 skimmers, 144–145, 148. See also credit secure devices, email privacy, 157 card skimmers secure fi le storage, email privacy, 156 Skog, William and Nancy, 3 Secure Telephony Identity Revisited smart homes, vulnerabilities, 230–233 (STIR), 60 smart toys, 131–134 secure websites, smart TVs, privacy concerns, 231–232 trustworthiness of, 77–78 Smartphone Honey Stick Project security alerts, 147 (Symantec), 210–211 security cameras, malware, smishing, 32, 41–42 symptoms, 225–226 Smominru cryptocurrency mining security confi guration settings, malware, 28, 43 protecting home Wi-Fi SMS phishing, 32, 41–42 networks, 223 sniffi ng tools, 79–80 security freezes, 147 social engineering, 32–33 children and credit protection, 128 email phishing, 34–35 credit fi les, 112–113 identity theft, 110 senior citizens, 121 Koobface scam, 75 security notices, 189 scamming, 50 social media data protection, 177 social media accounts, 171–172 spoofi ng, 74 traveling and, 244 security questions, 83, 86, 189 USB drives, 71–72 security trade-offs. See risk assessment social media security updates, 16 2016 presidential election Seleznev, Roman, 19–20 interference, 107–108 senior citizens, identity theft, advantages as attack target, 171–172 114, 119–121 data mining, 173–176 sent email data protection, 176–178 incident response, 102 fake persona, 170 recalling, 93 infected fi le attachments, 170 servers, patching, 65–66 requests, phishing attacks, 34 session hijacking, 241 vacations and, 67 Session Initiation Protocol Social Security Administration (SSA), (SIP) Forum, 60 locking and registering, 121

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226464 111/22/20181/22/2018 44:48:01:48:01 PPMM Index 265

Social Security numbers protecting computers, 199 children’ s, 127 smart toys, 134 identity theft, 117 when traveling, 247 software attack vector, 78 automated hacking software, 4 T updates, risk assessment, 66–67 Target, Koobface gift card scam, 51 Sony Pictures, data breach, 93 tax return refunds, IRS impersonation spear phishing, 32, 35–37 fraud, 140–141 Democratic National Committee, 15 taxi drivers, tourist scams, 242 examples, 36 technical support, scams, 51–52 job scams, 93–94 preventing, 52 Spiral Toys, data breach, 133 Telemarketing Sales Rule (TSR), 59–60 spoofi ng TelWeb, 60 caller ID, 76 temporary fi les, deleting, 99 From fi eld (email), 72 Tentler, Dan, 151 IP addresses, email, 73 TeraMESH Networks, Inc., 60 phone calls, 75–76 terrorist organizations, 17 phone numbers, 42 text messages, 41–42, 214–215 technical support, 75–76 text-based authentication, compared to Spotify, DDoS attack, 28 authenticator apps, 207 spyware, 43, 46–47 texting, as attack vector, 73–75 Google Play store, 208 The Fappening, 37 IoT devices, 229 thisisyourdigitallife Facebook app, 174 Squarespace, 151 thumb drives, malware, 71–72 SSA (Social Security Administration), 121 Tor, social engineering, 32 SSID, protecting home Wi-Fi networks, 222 tourist scams, 242–243 state-sponsored cybercrime, traveling TransUnion, 112 and, 245–246 travel advisories, 246 Stevens Institute of Technology, 230 traveling, protecting information, 243–249 STIR (Secure Telephony Identity Trojans, 43, 48 Revisited), 60 Google Play store, 208 stolen credentials, value, 25 Laopi, 209 stolen credit cards, 143 Trump, Donald J., 107 Strava (social networking app), privacy TSR (Telemarketing Sales Rule), 59–60 concerns, 229–230 Twitter, 28, 171–173 strong passwords, creating, 187–188 two-factor authentication, 5, 25, 146 Supervisory Control and Data attack chains, 69 Acquisition (SCADA) server cloned email, 40 network, cryptomining, 197 cloud storage, 162, 165–166 surveillance capitalism, 175 email compromise incident response, 102 Symantec, found smartphones email privacy, 156 study, 210–211 enabling, 85–86 system updates Google Voice numbers, 207 importance of, 84–85 mobile port-out scams, 205 incident response, 99 password attacks, 31 local fi le storage, 163 password managers, 87 mobile devices, 213 password protection, 187

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226565 111/22/20181/22/2018 44:48:01:48:01 PPMM 266 Index

social media data protection, 176–177 Verizon Communications, 19 updating credentials, 74–75 Verizon Data Breach Investigations website access protection, 187 Report, 6, 92 typosquatting, 76 virtual kidnapping, 53–54 virtual private network (VPN) U protecting home Wi-Fi networks, 223 U. S. Postal Inspection Security, 20 protecting online accounts, 188 U.S. Citizenship and Immigration, social engineering, 32 Services, government agency traveling, 244 impersonation, 52–53 Wi-Fi, 80 U.S. Computer Emergency Readiness viruses, 43 Team (US-CERT), incident fake technical support, 51–52 response, 97 scareware, 47 Uconnect, vulnerabilities, 227 vishing, 32, 40–41 unbanked victims, 145–146 voice phishing, 32, 40–41 United Confl ict Analysts, 229 voicemail, as defense, 76 universal second factor (U2F), 184–185 vulnerabilities unsolicited texts and phone airplanes, 238–239 calls, 214–215 credentials, 83 URLs home Wi-Fi network safety considerations, 188 encryption, 219–220 search engines vs typing, 77–78 Krack, 49 typosquatting, 76 PC computers, cryptomining US-CERT (U.S. Computer Emergency malware, 43 Readiness Team), 97 Reset Password email links, 39 USB charging stations, juice smart homes, 230–233 jacking, 241–242 Uconnect, 227 USB drives updating software, 84–85 malware, 71–72 Windows, CIA and, 16 protecting computers, 200–201 USB keys, 78–79 W USB keys, 184 WannaCry, 16 user accounts, smart toys, 134 software updates and, 85 user agreements WannaMine malware, 43 data privacy, 176 Warner, Mark, 233 importance of, 78 Washburn Computer Group, 19 usernames. See also We-Vibe, privacy invasion, 232 credentials; passwords weak passwords, 182 attack methods, 25 weaponization (attack chains), 69 email addresses, 93, 153 web browsing utility bill scams, 54 ad blocking extensions, 189–190 blocking pop-up windows, 47 V Dark Web, 14 Valasek, Chris, 227 drive-by downloads, 45 Van Fleet, Katie, 109 incident response, 99 vehicles, fi rmware updates, 228 JavaScript blocking verbal passwords, 146 extensions, 189–190

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226666 111/22/20181/22/2018 44:48:01:48:01 PPMM Index 267

web mining, 194 IoT security, 235 web plug-ins, security issues, 190 myth vs fact, 79–80 web servers, patching, 65–66 network hacking, 49–50 website account credentials, sellers, 25 public, dangers, 239–241 website administrators, cryptocurrency social engineering, 32 mining, 44 updating routers, 84–85 websites Williams, Brayton, 135 attack vector, 76–78 Windows avoiding typos, 147 cryptomining malware, 43 Coinhive cryptomining malware, 197 secret vulnerability, CIA and, 16 cryptocurrency mining, wire transfer scams, 3–6, 39, 138–140 opt-in, 196–197 wire transfers, testing, 5 myths vs facts, 77–78 World Connection, 60 security questions, 86 worms, 43 verifying encryption, 189 WPA encryption protocol, 49 web mining, 194 WPA2 encryption protocol, 49 Wells Fargo, 19 home Wi-Fi networks, 220 credit card skimmers, 23 protecting home Wi-Fi networks, 223 WEP encryption protocol, 49 WPS Wi-Fi protocol, disabling, 217–218 West, Grant, 18 Wray, Christopher A., 21 Western Union, credentials value, 25 whaling, 32, 37–38 Y-Z white-hat hackers, 14, 24 Yahoo, 18–19 whitelisting phone numbers, 58–59 data breaches, 152–153 Who Are Hackers (HackerOne study), 12 email privacy, 155 Wi-Fi Yan Wang, 230 attack vector, 79–80 Yingying Chen, 230 auto-connecting when traveling, 243 Yoder, Kevin, 155 brute-force attacks, symptoms, 217–218 cryptomining malware, 195 email fi nancial transactions, 5 zero liability rules, credit cards, 112 home network threats, 219–221 Zuboff, Shoshana, 175

MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226767 111/22/20181/22/2018 44:48:01:48:01 PPMM MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226868 111/22/20181/22/2018 44:48:01:48:01 PPMM MMcDonough559610_bindex.inddcDonough559610_bindex.indd 226969 111/22/20181/22/2018 44:48:01:48:01 PPMM MMcDonough559610_bindex.inddcDonough559610_bindex.indd 227070 111/22/20181/22/2018 44:48:01:48:01 PPMM