Documents in Portable Document Format (.PDF) require Adobe Acrobat Reader 5.0 or higher to view. Download it now.
FDIC-Insured - Backed by the full faith and credit of the U.S. Government
Enterprise Bank
Online Banking

A Guide to Increased Internet Usage

 

Increased Internet usage? The dangers posed by malicious hackers and how they work.

Hackers with malicious intent – also called ‘black hat’ hackers - know more people are online working, gaming, streaming, shopping, even seeing the doctor, and they are using this rise in Internet use to their advantage. Now that so many people are connecting to the Internet we are seeing a new wave of cybercrime.

A black hat hacker is any skilled computer expert who uses their technical knowledge and skills to search the Internet for unprotected computers and systems to gain unauthorized access with the end goal of stealing your information or maliciously disrupting your system. The term ‘hacker’ can refer to any skilled computer expert - some working for good. Therefore, we’ll use terms like black hat hacker, attacker, or malicious actor in this article to refer to the online criminals who use ransomware, viruses, and other malware to break into computer systems.

Why do malicious hackers exist?

Black hat hackers take advantage of your internet access to break into your computer, mobile device, or other connected devices in order to steal, change, or destroy information, often by installing viruses and malware without your knowledge or consent. They use clever tactics and detailed technical knowledge to help them access information that they can turn around and sell to other criminals.

Perhaps you have wondered why hackers with malicious intent break into computers, mobile devices, and your home internet system (also known as a network). Many are motivated by money, though not all.

Three reasons malicious hackers hack:

  • Money. There is financial gain to be had when hacking home or business networks. Credit card numbers and banking information are stolen from hacked systems and posted for sale on the dark web, which is a network of internet sites that criminals can access anonymously. Their activity isn’t tracked, which is especially attractive to those conducting criminal business.
  • Identity Theft. Some seek out social security numbers, identity card information like drivers licenses, and private health information. They either use or sell the information to steal a person’s identity to take out a credit card, buy homes, and generally pose as the victim for personal financial gain.
  • Status. Many black hat hackers want to build their reputation within their criminal subculture. Some leave their handle – a nickname - on websites they damage. Others like to leave behind proof that they were involved in a specific exploit or criminal act.

How can malicious hackers find me?

Anyone who uses a computer or mobile device connected to the Internet is susceptible to the threats that criminal hackers and predators pose. They typically gain access to your device through phishing scams, where they trick the victim into clicking on a link in an email that releases a virus or other malware onto the device. They also send infected links through text messages, instant messages, fake websites, and apps you load onto your mobile or computer.

What kind of damage can a malicious hacker do?

While your computer is connected to the Internet, the malware an attacker has installed on your computer or mobile device quietly steals personal and financial information without your knowledge or consent.

Here is a list of ways black hat hackers can cause damage:

  • Hijacking your usernames and passwords to important or sensitive accounts.
  • Steal your money and open credit card and bank accounts in your name.
  • Ruin your credit.
  • Request new account Personal Identification Numbers (PINs) or additional credit cards.
  • Make purchases.
  • Add themselves as an authorized user to your accounts so it’s easier to use your credit.
  • Get cash advances.
  • Use and abuse your Social Security number.
  • Listen in on conversations while your kids are gaming or you are conducting a virtual health session with a doctor.

What are some indications that I may have been hacked?

  1. Your device (computer, mobile) suddenly slows down. The side-effects of malware can be a slowing of your device, it constantly freezes, or crashes (suddenly shuts down).
  2. You are using way more data than usual. Look at your data usage in your internet account. Compare the amount of data used from prior months, and if you notice sudden spikes in your data activity even though you haven't changed your patterns, then chances are you are infected.
  3. Videos and web pages take forever to load. Malware slows down your internet activity, gaming, video, and music streaming by redirecting your Internet traffic to unsafe locations. This slows down your browsing experience, which could be a sign of a security risk.
  4. Programs and apps start crashing. This is also pretty good sign that your system has been infected. If your antivirus software and internet are crashing or disabled, a virus may have taken hold of your system files. You may not be able to click on and open once-reliable apps.
  5. You start seeing pop-up ads. Malware can also add bookmarks that you don't want, website shortcuts to your home screen that you didn't create, and spam messages that entice you to click through. Apart from slowing down your computer and eating away at your data, these intrusive notifications can also install more malware on your system.
  6. Your computer suddenly restarts. Some forms of malware cause computers to shut down, restart, or crash. Computer shut-downs combined with other common malware symptoms are a red flag that you shouldn't ignore.
  7. Unexplained online activity. Black hat hackers are looking for your usernames and passwords. Once they have them, they will access accounts, spend your money, change your password, and lock you out of your accounts. Fortunately, many online businesses have built-in protections to confirm any account changes with you, but not always.

How do I protect my devices from attack?

When you arm yourself with information and resources, you are wiser about online security threats and less vulnerable to threat tactics.

  • Use a firwall - A firewall is a barrier built in to operating systems like Mac and Windows that filter and block outsiders from gaining accesses to your computer, and includes added protection when enabled. Firewall software can also be purchased separately from your local electronics store, a reputable online vendor, or your internet provider.
  • Update your operating system and software apps regularly - Whenever you are notified of new updates to software and apps on your devices, be sure to install them. They often contain security patches to known weaknesses in the software that black hat hackers can use to their advantage.
  • Increase your browser security settings - Most internet browsers (Google Chrome, Firefox, Microsoft, etc.) have security settings to prevent the download of malicious files. You can set and adjust them for safe browsing.
  • Avoid questionable websites - If you receive a warning that a site isn’t secure, pay attention. Unless you are comfortable with the website owner or business, don’t enter the site.
  • Only download software from sites you trust - Carefully evaluate free software before downloading. A good rule of thumb is to download directly from the vendor’s website, not a third-party website.
  • Don't use the same password for every site or app - Black hat hackers are known to post stolen passwords for sale or just to be malicious. If you use a single password for all your logins, that password could be posted somewhere and bad actors can use it to access your financial and personal information.

Practice safe email and virus/malware measures.

  • Don't open messages from unknown senders - Never provide your user name and password that is requested by an email sender. If you feel that you must, go directly to the website by typing in the web address to double check that the website really needs your credentials.
  • Immediately delete messages you suspect to be spam - Don’t click on any links in an email if you don’t know the sender.
  • Install antivirus or anti-malware - You can purchase them or use the free versions available from reputable vendors online.

Guard Against Online Threats.

An unprotected computer is like an open door for malicious hackers. There are criminals looking for an easy way to make money, steal your identity, and gain notoriety. These recommendations may seem like a lot of work but are worth the peace of mind when browsing the Internet or joining a virtual classroom or health appointment. If you build them into your routine and tell your friends and family about safe browsing and email habits, you will go a long way to prevent the losses that come from malicious activity.