Page 100 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 100

Keystroke Logging and Malware

            Keylogging software is one of the most nefarious tools used by cybercriminals. Keyloggers are highly
            effective at keeping track of your activities. These activity-monitoring programs allow hackers to access
            a wealth of personal information. This can include usernames and passwords, payment information, as
            well as your general browsing history. Unless you're actively looking for such software, its presence will
            go undetected. By the time you realize there's an issue, sensitive data will be in the hands of the individual
            who installed the keylogging software.

            Malware is even more difficult. As with keystroke software, malware can monitor activities like internet
            browsing. It may also install additional software cookies onto your device without you knowing. In the
            worst-case  scenario,  malware  can  mine  your  hard  drive  for  specific  pieces  of  information.  Some
            malwares can even access microphones and webcams, presenting a significant security risk.



            Cryptojacking Attacks

            Mining for cryptocurrency requires considerable processing power, making it an infeasible venture for
            many. It probably comes as no surprise that the crypto boom has brought with it unique cyber risks. If
            you've recently purchased refurbished hardware, cryptojacking is something you should be looking out
            for.


            In short, criminals piggyback onto the processing power of your hardware and its electrical consumption
            by installing malware on a device that mines for cryptocurrency. You might think this an unlikely scenario,
            but in the first half of 2021, more than 51 million such attacks were detected. This is a marked increase
            in attacks detected in 2020.

            As with other types of malwares, crypto mining software can be hard to detect and largely goes unnoticed.
            However, if your device is running at a considerably slow speed, it could be a sign that your hardware
            has been compromised with crypto mining software.



            How to Combat Cyber Risks with Refurbished Hardware

            All of this might make for scary reading, but there are many steps you can take to mitigate risks when
            using refurbished hardware. Many of these are easy to implement yourself.



            Clearing Hard Drives

            For starters, make sure the hard drive of a newly acquired piece of hardware has been wiped clean. Even
            if a reseller has given you assurances that a hard drive has been wiped, there's no guarantee. The peace
            of mind involved in carrying out a second hard drive wipe is priceless. Many data removals are readily
            available precisely for this purpose. A full wipe will remove all files from a hard drive, as well as annihilate
            any lingering data.






                                                                                                            100
   95   96   97   98   99   100   101   102   103   104   105