Decrypting Tomorrow's Threats Today
Organised cybercrimes is the worst form that these operations can take to target vulnerable organizations and hospitals. Amongst the most private and confidential information, a nation's top secret, including the work of law enforcement agencies, is considered the most vital and secure. People in search of jobs are lured into going to other countries and are made to work in call centers that manipulate government entities, impersonate brands, and organize things in a way that makes it difficult for investigative authorities to get hold of these people.
These fraudsters sit behind encrypted connections, leveraging VPN( Virtual Private Networks). Many utilize free versions of VPN available on the internet. These people have no clue as to what is happening to them. Promised jobs, these people( mostly in their 20's) are made to carry out hideous operations to target sharks( influential people and wealthy organizations). It's like carrying out a DDOS attack that renders a server vulnerable to being inoperable.
When attacks like DDOS happen, e-commerce websites and applications are the most affected. Because these applications rely on real-time interactions with customers. I have myself encountered something similar. Whenever I am looking to buy a particular item from Amazon India, these geniuses would repeatedly show it on my feed until I finally placed the order. For orders where the guarantee of items reaching us is critical/severe and needs credible trust, these people would not accept COD. So, everything ( every technology you interact with in day-to-day life) is tricking you into believing something that ideally doesn't exist.
I have been a LinkedIn premium member for almost 5 months now. I have been using it to upskill and learn new things but guess what, even these people have restricted the ability of premium members by not allowing certain elements after a set limit has been achieved or crossed. Then, I head outside to clear my head and spend time with my cow Nandini. I stick with my roots and never expect to get fruits because Karma is my dharma.
Organized syndicates like these are extremely violent and disturbing. Jaish-E-Mohammed, ISIS, these organisations have eaten up the insides of the digital fortress of India. These manhunters are spread everywhere, taking up shapes and ideas of women and children, and NIA, CBI, and RAW are kept wondering and alerting but alas, boom, tick tick, blast happens. It's weird to see such things happening. Why do we fall into such tricks in the first place? In most cases, as we can see, the whole idea revolves around our benefit. We expect to get something. Many people are redirected to phishing sites( investing sites/apps) to invest real money and then, they see profits and get excited, when these gentlemen look forward to withdrawing that money, these duplicitous men ask for extra payment(as processing charges, late withdrawal fees and what not).
Every country is spying on different organizations. Hospitals like AIIMS had once come under attack. Information of millions of Indians was circulated on the dark web. Rail Yatri was once breached. ICC( Cricketing largest body) was hacked. Not anyone is secure. People in the hope of getting loans download naughty apps that extract way too much information from these sensitive individuals. By the time these people realize it was all but a scam, they feel cheated, duped and even commit suicide because they had trusted these applications by listening to their close friend or by looking it up in some advertisement. Many scams take place through dating apps. In fact, government officials are made to share secret information just because they fell prey to some unidentified woman who would later unravel the dirty secrets of the government officials.
These scams have no beginning and end. Unlike the Lord's teachings, these monsters are looking to eye everything. Even as we learn and become better, syndicates operating in a hideous way and approaching manipulative techniques are using ludicrous techniques and equipment to engage in malpractices. We could use password managers and enable MFA, so that, even after our master password is compromised, we can use MFA to authenticate the session to gain authorized access. Dumpsters should be thoroughly cleaned. Laptops ( and any other office equipment) should be turned off( or at least put in sleep mode so that when someone tries to turn it on, the password is required), no device having a USB feature should be left isolated and untreated because some malicious creature might use it to infiltrate the system and eventually spread their clutches throughout the entire ecosystem. Let's stay safe to protect the dignity of Indian individuals.
Disclaimer: Views expressed are personal. Reader's discretion is strongly advised. Under no circumstance, the provided information( by the original author Aditya Thakur) be liable to be tested under any grounds. Content made available on this site is for informational and as and when use purposes only.