Gadgets

Real Spyware Threats


Spyware (Spyware) are viruses that are designed to steal confidential information and spy on the user.

Confidential information can be understood as any personal data, for example:
· Usernames and passwords
· Bank card details
· Electronic money, cryptocurrency
· Contacts, email
· Photos and videos, webcam
· Browser history, bookmarks, etc.

As you can see, none of the items carries anything pleasant in it, and a particularly strong shock happens after realizing HOW MUCH TIME the spyware program is already running on the computer!

Usernames and passwords

The most real and frequent threat from spyware isdata theft to enter online resources, as most ordinary users have nothing more to take. Hackers take advantage of network illiteracy of people who like to write logins and passwords into a plain text document or use outdated software without password encryption.

But don't flatter yourself if you have a reliable onepassword manager or you are a genius who remembers all passwords. A separate class of spyware is called "keyloggers", they are constantly running in RAM and monitor input from the keyboard and clipboard. Algorithms easily identify usernames and passwords among information noise.

What logins do hackers need? Ideally, those where there is money: banks, exchanges, services with personal funds balances. Today it is difficult to find a service that will allow you to withdraw money without additional confirmation of actions by e-mail or smartphone, but options remain.
One of my favorites is access toemail and social networks. Even if there is no confidential information to receive monetary gain, they will be used to send spam or sold. Do not disdain even logins from dating sites and other resources with unobvious benefits. Therefore, it is better to worry about security in advance, a list of decent programs that protect against spyware from the link.

Money

You do not need to save credit card information on your computer, especially the CVV2 / CVC2 code (last 3 digits) on the back of the card:
Having a card number, expiration date and CVC2 / CVV2 code,an attacker can spend money with her. Today, banks require confirmation of payment using SMS (3DSecure function), but again, there are still options.

What can not be said about cryptocurrency! Cryptocurrency is like paper money in your wallet, but only on a computer. Theft of cryptocurrency files is similar to pulling banknotes from a pocket, no confirmation is ever needed, the operation is irreversible. Since the cryptocurrency boom in 2017, this topic has become one of the most beloved among hackers, and this is a real threat to spyware if you have crypto.
Even if you do not store private keys ormnemonic phrases on the computer, the spyware can monitor the clipboard and find the addresses of the recipient wallets. That is, when you send the crypt to another wallet, then on the fly, in the process of copying the recipient address to the clipboard, the program replaces it with the address of the scammer. If you do not verify the copied and pasted address, then the funds will go in an unknown direction. The same applies, by the way, to traditional transfers of electronic money, such as Yandex.Money, WebMoney, Perfect Money, etc.

Contacts, mail

To access your contacts and mail,a hacker program must steal the login and password for online mail, as they usually do. But desktop mail clients such as The Bat! Are also popular. and Microsoft Outlook. If you do not follow the recommendations of the programs and do not encrypt the data using the built-in tools, then the attacker can simply extract all the necessary information from the database on the hard disk.

The spy will receive all letters over the years of work and,accordingly, all your contacts. You can use this to obtain logins and passwords stored in emails, to access sites with confirmation by e-mail, for blackmail.

Media data

Your photos and videos from a webcam is the firstwhat comes to mind when they say about the theft of personal information

Separately worth worrying if you storescans of passports and documents in unencrypted form. They can be recognized and used for verification on financial resources or sold (for the same purposes). Once, crossing the border of a country, you can be very surprised when you are presented with a certain claim ...

Network activity

We will not mention that spyware monitorsyour online activity in order to show suitable ads, but this does not pose a real threat. But spyware monitors your browsing history and saved bookmarks, which can be a threat if this data can be used against you, for example, during an investigation.

Another favorite practice of such viruses isModify the hosts file on Windows. In simple words, by editing the hosts file, you can redirect the visitor from any site to the fraudster’s site and steal sensitive data. For example, if you replace your personal account with a copy of your personal account, then the username and password you entered will be known to criminals.