In an online report released by one of the companies providing digital security services, a new hacking email model was revealed which was fairly new but very dangerous. Said to be dangerous because in fact with a simple technique, even a newbie hacker can run the burglary technique. They can engineer the email verification service and easily enter everyone’s email.
Now with the development of # technology, internet security devices and systems are indeed linearly developing. But whether with increased security we can already feel safe? Certainly not! We still need to be vigilant, because at any time we could be victims of cybercrime.
Back to the email hacking technique, which became the main weapon for email hackers is a simple technique and the fact that users are generally very obedient and afraid of the authorities.
As an illustration, when we are on the road and then someone in uniform looks like an officer and then forces us to stop, will we obey his orders? Of course, most of us will obey even when the officer suddenly asks for a letter or a vehicle key, many of us may choose to be passive and obey orders.
From the illustration above, apart from the fact that the person is really an authority or just a fake “officer”, we can catch that the model used is very simple and the second is that everyone tends to choose obedience if he sees what is labeled without authority ( authorities, security officers up to the name of a company).
Only armed with these two facts alone, a criminal can carry out attacks, as well as e-mail burglary.
Fake SMS Message As the Main Weapon
Entered in the details of email hacking techniques, the first step taken by the perpetrators is to look for the victim’s email address and cellphone number. After getting the “bait”, then the perpetrators perform the procedure for recovering email passwords or what we often see with the word “forgot password” when logging in to the email service.
After the procedure is done, the offender will choose the account recovery option via the short message verification code. That way, later the victim will get a short message containing a verification code from the email service provider.
This is where the data thief in action. By pretending to be the provider of the email, he then sends a message to the victim who essentially asks for a verification code that was just entered earlier.