With a user base of 1.8 billion, Facebook is the largest Social Networking site and the second most visited site after Google. This huge Database of Facebook makes it target for Hackers. Hackers continuously make efforts to exploit Facebook data.
In this Post we are going to explain you the ways Hackers use to exploit your Social media accounts. This is to make you aware of the Online threats that make you vulnerable.
Phishing is one of the most common type of attack used to exploit Facebook accounts. Phishing is done in several ways to get your data
The basic phishing attack involves the following strategy:
- A hacker creates a fake login page which resembles the original Facebook page.
- Then he shares a shortened link of the page and asks user to casually login.
- Once you enter your login credentials they are recorded in a log file and redirects you to actual Facebook home page.
- Mean while the hacker downloads your data from the log file and gain access to your account.
Key logging is the easiest way to hack a Facebook password. Even a computer geek can easily fall for key logging. A key logger is basically a small program, which will record every key stroke of the victim, once installed in his device or PC.
These are recorded into a log file and are sent back to attacker. Often key loggers are installed silently when you download malicious files. Key logging involves two methods Hardware and Software key logging.
Stealer’s are special Software programs that access the stored password in the browser.This is extremely dangerous as most of us store our Facebook password in browser to skip logging in every time. So next time don’t store your password in your browsers.
This technique involves stealing user’s Facebook cookie from the browser and is used to authenticate a user on a website and later on use it to access te victims account. This is widely used in LAN’s.
Mobile phone Hijacking:
Most of the Facebook users access Facebook through their mobile phones. If the hacker can gain access to the victim’s mobile phone then he can probably gain access to his/her Facebook account. There are lots of mobile spying software used to monitor a cell phone.
If an attacker has physical access to your computer, he or she could insert a USB stick that it’s programmed with special code to automatically extract the saved passwords in the browser.
Man in the Middle attack:
If the victim and attacker are on the same network them the attacker hides himself between the client and server and capture all the traffic in between and access your personal data.
DNS spoofing is done if both the victim and hacker are on same Network. Using DNS spoofing an attacker can redirect you from original Facebook page to his fake page and gain access to your credentials.
In this way hackers continuously devise new mussels to gain access to your social data. So beware of these online threats. If you were aware of these threats you can protect your account from hackers.
Tell us your opinions in the comments below. Also like us on our Facebook page to get these security updates directly to your NewsFeed.