{"id":18743,"date":"2018-06-28T18:00:47","date_gmt":"2018-06-28T22:00:47","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18743"},"modified":"2022-04-27T15:04:46","modified_gmt":"2022-04-27T19:04:46","slug":"a-cyber-drive-by-attack-could-be-lurking-in-your-hood","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/a-cyber-drive-by-attack-could-be-lurking-in-your-hood\/","title":{"rendered":"A Cyber Drive-By Attack Could Be Lurking in Your Hood"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Ever heard of a drive-by? A disturbing picture comes to mind, but now apply the same idea to a cyber attack. Huh, sounds confusing right? But this crime has been gaining traction and is called a <a href=\"https:\/\/www.foxbusiness.com\/features\/what-you-need-to-know-about-drive-by-cyber-attacks\">cyber drive-by attack<\/a>. What\u2019s disturbing is these hacking attacks target users without the usual method of having to open a malicious file or link. What hackers do at a cyber drive-by is station themselves close to a house or a place of business and attack. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Read More: <\/strong><a href=\"https:\/\/www.psafe.com\/en\/blog\/the-danger-of-spoofed-websites-learn-to-tell-the-difference\/\"><strong>The Danger of Spoofed Websites: Learn to Tell the Difference<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The best way to protect yourself from cyber threats is to ensure you download antivirus software on all your devices, your phone included. For Android users, we recommend <strong>dfndr security<\/strong>, which has a security scan feature that combs your entire device, even the SD card, and blocks viruses or malware. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=cyber_driveby_attack_lurking\"><img loading=\"lazy\" decoding=\"async\" width=\"352\" height=\"57\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/11\/Prancheta-1.png\" alt=\"Get dfndr security now\" class=\"wp-image-19520\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/11\/Prancheta-1.png 352w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2018\/11\/Prancheta-1-300x49.png 300w\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" \/><\/a><\/figure><\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>How It All Began<br><\/strong>A cyber drive-by attack wasn\u2019t much of a threat in the early days, mainly it was used to gain free access to Wi-Fi. Hackers would drive by the streets of a town, locate a Wi-Fi signal and If the signal was insecure, they would hack through to siphon Internet.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>How They Evolved<br><\/strong>Now cybercriminals use this same practice but in more sophisticated ways. They often target badly secured routers and first figure out the router manufacturer. Once they\u2019ve gotten that information, they\u2019ll next tap in and listen to the traffic and find ways to compromise the password, which eventually gives them access to a computer or phone. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With all systems weakened, the next stage of an attack is to introduce malware or a keylogger, and once this happens, tapping into someone\u2019s sensitive information is child\u2019s play. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A keylogger can bait a victim by having them visit a legitimate website that\u2019s infected through a popup or ad, or by slyly redirecting the person to an infected site. Information like bank accounts, logins, or social security numbers could be discovered and used in illegal ways.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Criminals are also targeting businesses with this type of attack, which requires no user interaction at all and depends on the vulnerability of a device or modem. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In other cases, cybercriminals use \u2018man in the middle\u2019 software, by having attackers spy on victims by setting up conversations between multiple parties.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Last Words and Tips<br><\/strong>In addition to downloading a security app, individuals and companies should update devices regularly with the latest security patches and script blocking plugins. Additionally, businesses should ensure employees don\u2019t have local administrative access to their devices. Set them up with a separate account instead.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Other measures to take include segmenting a company\u2019s network so that everyone isn\u2019t running on the same server, which ensures that malware doesn\u2019t spread throughout an entire office. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finally, all work and personal data should be backed up as frequently as possible on external hard drives or a cloud service, which should not be left connected to the main network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This type of cyber attack will hit home and hurt where you least expect it.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[252,195,259,358,545,249,67],"class_list":["post-18743","post","type-post","status-publish","format-standard","hentry","category-security","tag-app1","tag-app5","tag-hackers","tag-protection","tag-safety","tag-security","tag-smartphone"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18743"}],"version-history":[{"count":5,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18743\/revisions"}],"predecessor-version":[{"id":19703,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18743\/revisions\/19703"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}