How to catch a hacker trying to access your personal data

The personal data on your computer, in your cloud storage, in your mailbox, is a great value for every user. But there is a category of people (the so-called “hackers”), who are trying to gain access to the information of others, in order to use it further to carry out fraudulent schemes. How to detect an attempted hack in time – learn from this review.

Protection from hackers

Advertising

Creating a trap for hackers

Documents with logins, passwords – this is the tidbit that hackers are after. Knowing this data, hackers can go through someone else’s mail, hack into bank accounts, hack into servers, send spam, etc.

Even the coolest antivirus can’t protect you from tampering. You need to try to improve your security in every way possible. And now let’s look at one of them.

Let’s work with a free service CanaryTokens. Thanks to it, it is realistic to form “tokens”, place them in the right places and end up with something similar to a “stretch”. As soon as a hacker tries to look through user information, an alert system is activated.

  • We go to the site and see the form. In the list, we select the appropriate security mechanism. For example, Microsoft Word:
How to identify a hacker who is trying to access your personal data - using CanaryTokens
  • After you have filled in all the fields (specify a valid e-mail address, to which you will receive notifications) click on the big green button “Create My CanaryToken”;
  • The next step is to download the proposed file to your computer:
How to track down a hacker who's trying to access your personal data - using CanaryTokens
  • Now you can rename the document and give it an attractive name, for example, “Safe Deposit Box Password”. And inside enter unreliable information about bank accounts, logins, access codes, etc. Use more keywords not only in Russian, but also in English (password, login, Credit Card Number, CVV). Your task is to create a decoy that will attract the abuser and make him open the file;
  • That’s when the trap will work and an email will be sent to your email address with this text:
How to track down a hacker trying to access your personal data - using CanaryTokens
  • It contains a comment to the triggered token (Token Reminder), the IP address of the network equipment (the source of the attack). The best part is a link to a page with more info (More info on this token here). Go to it and on the left we see a Google map with the location, and on the right – a detailed description (IP, country, region, ISP, operating system, browser, etc.). – information may be different from the above, depending on the situation):
How to identify a hacker who is trying to access your personal data - using CanaryTokens

Now you can use your router, firewall settings to block this IP from accessing your computer, your NAS, your mail. We will not discuss such methods in this article, there are plenty of videos on the subject.

If you go back to the CanaryTokens home page, there are some more interesting options for creating traps in the list of tokens:

  • Acrobat Reader PDF Document. – Similar to a Word document, only the file format is different;
  • Web bug / URL token – A link is created, which can be included into e-mails, different files, or a website. Clicking on it activates a notice. Let’s say, you send yourself an e-mail, the subject of which is “Access to the password store”, and inside a text, and put the received link on one of the words;
  • Custom Image – is somewhat similar to the previous method. Only in the form at the bottom there is a field for selecting a custom image:
How to track down a hacker who's trying to access your personal data - using CanaryTokens

Specify any one by selecting it on your computer. This will generate a link to the image. It can be inserted into emails, Word documents. As soon as the villain opens the graphic item you will know about it at once.


If the text instruction seemed too short and incomprehensible to you – watch the video with a detailed explanation:

19.11.2019 12:52 305

Related Posts:
Share to friends
Mobile Pedia
Mobile Pedia