被黑客入侵了怎么办
Evernote became the latest member of the “we’ve been hacked” club. And the thing is, what was once a pretty exclusive club now lets just about everyone in these days. I’m a member too. And as I discovered when I was hacked last year, my experience was distressingly commonplace. And yet while being hacked may be increasingly familiar, it isn’t getting any less stressful or confusing. It’s hard to know what to do, or where to begin, immediately afterward. More Additional info on Ethical Hacking Online Training
Evernote成为“我们被黑”俱乐部的最新成员。 事实是,过去曾经是一家非常独特的俱乐部,如今这些日子几乎可以容纳所有人。 我也是会员。 正如我去年被黑客入侵时发现的那样,我的经历非常痛苦。 然而,尽管被黑客入侵可能越来越熟悉,但压力或混乱并没有减轻。 之后很难立即知道要做什么或从哪里开始。 有关道德黑客在线培训的更多信息
Whether you were hacked, phished, had malware installed or just don’t know what the heck happened but there’s somebody all up in your e-mail, here are a few good first steps to take following an incident. This is by no means comprehensive, but it’s a good start.
无论您是被黑客入侵,钓鱼,是否安装了恶意软件,还是不知道到底发生了什么,但是您的电子邮件中总有人在,这是在发生事件后应采取的一些良好的第一步。 这绝不是全面的,但这是一个好的开始。
While you are fixing things, it’s a good time to take a step back, and ask yourself a more basic question: What was the reason for the breach? If it was your bank account, the answer may be obvious. In other cases, such as e-mail, it can be for a host of reasons — from using it to send spam, to requesting money from your contacts, to getting password resets on other services. An attacker may even be trying to gain access to your business. Knowing why you were targeted can also sometimes help you understand how you were breached.
在修复问题时,现在是退后一步,并问自己一个更基本的问题的好时机:违规的原因是什么? 如果是您的银行帐户,答案可能很明显。 在其他情况下,例如电子邮件,可能是由于多种原因-从使用它发送垃圾邮件到向您的联系人索要钱款,或者重置其他服务的密码。 攻击者甚至可能试图获得对您企业的访问权限。 知道为什么会成为目标,有时还可以帮助您了解如何受到伤害。
Immediately change the password on the affected service, and any others that use the same or similar password. And, really, don’t reuse passwords. You should be changing your passwords periodically anyway as a part of routine maintenance. But if you’ve just been hacked, it’s now more urgent. This is especially true if you reuse passwords, or use schemes that result in similar passwords (like 123Facebook, 123Linkedin, 123Google).
立即更改受影响的服务以及其他使用相同或相似密码的密码。 而且,实际上,请勿重复使用密码。 无论如何,您应该定期更改密码,这是日常维护的一部分。 但是,如果您刚刚遭到黑客入侵,那么现在更加紧急。 如果您重复使用密码或使用产生相似密码的方案(例如123Facebook,123Linkedin,123Google),则尤其如此。
“Password reuse is one of the great evils and its very hard to prevent,” says PayPal’s principal scientist for consumer security Markus Jakobsson. Sites can set up password requirements — for example a character length or that a password include symbols and numbers — but they cannot force people into not reusing the same or similar passwords. “It’s very common for people to use similar or the same password but it’s very rare for people to realize that it creates a liability for them to do it and that they need to change their password after they’ve been hacked.”
PayPal负责消费者安全的首席科学家Markus Jakobsson说:“密码重用是最大的弊端之一,很难防止。” 网站可以设置密码要求(例如,字符长度或密码包含符号和数字),但是它们不能强迫人们不要重复使用相同或相似的密码。 “人们使用相似或相同的密码是很普遍的,但是很少有人意识到这样做会给他们造成责任,并且在他们被黑之后需要更改密码。”
There’s a possibility that the attacker got in via your machine. Almost all malware is installed by victims themselves, if unknowingly. And if something nasty is on your computer, you need to get it off before you start a recovery process. Make sure you are running the most recent version of your operating system. Download a solid anti-virus product and run a scan for malware and viruses that may have been the source of the attack. This is the most basic thing you can do, so do it now. And moreover, use a brand-name commercial program that you pay for.
攻击者有可能通过您的计算机进入。 如果不知不觉中,几乎所有恶意软件都是由受害者自己安装的。 而且,如果计算机上有讨厌的东西,则需要先将其清除,然后再开始恢复过程。 确保您正在运行最新版本的操作系统。 下载可靠的防病毒产品,然后扫描可能是攻击源的恶意软件和病毒。 这是您可以做的最基本的事情,所以现在就去做。 而且,使用您要付费的品牌商业程序。
“Malware antivirus software isn’t perfect — they have a hit ratio of 50 to 75 percent and can miss almost as much as they find, but it’s better than nothing,” explains Jakobsson. And why should you pay for it? “Most people who search for ‘free antivirus’ end up installing malware.”
Jakobsson解释说:“恶意软件防病毒软件并不完美,它们的命中率在50%到75%之间,几乎可以错失几率,但是总比没有好。 为什么要为此付费呢? “大多数搜索“免费防病毒”的人最终都安装了恶意软件。”
Most of the major online services have tools in place to help you get your account back after it has been taken over by someone else. Here’s how to do that on Apple, Facebook, Google, Microsoft, Twitter and Yahoo. Typically, you’re going to need to be able to answer some questions about your account. Facebook has a novel method that relies on friend verification. Are you using a service not listed here? Typically you can find your way back in by searching for its name plus “account recovery.”
大多数主要的在线服务都提供了一些工具,可帮助您在其他人接管帐户后取回您的帐户。 这是在Apple,Facebook,Google,Microsoft,Twitter和Yahoo上执行此操作的方法。 通常,您将需要能够回答有关您帐户的一些问题。 Facebook有一种依靠朋友验证的新颖方法。 您是否在使用此处未列出的服务? 通常,您可以通过搜索其名称以及“帐户恢复”来找到自己的方式。
To get in-depth knowledge on Cyber Security Online Training
深入了解网络安全在线培训
Smart hackers won’t just get into your account, they’ll also set up tools to make sure they can get back in once you’ve gotten them out. Once you have your accounts back, you should immediately make sure there isn’t a back door somewhere designed to let an attacker back in. Check your e-mail rules and filters to make sure nothing is getting forwarded to another account without your knowledge. See if the answers to your security questions were changed, or if those questions themselves have changed.
聪明的黑客不仅会进入您的帐户,还会设置工具以确保一旦您将其入侵,便可以重新进入。 取回帐户后,应立即确保没有旨在让攻击者重新进入的后门。请检查您的电子邮件规则和过滤器,以确保在您不知情的情况下,什么也不会转发到另一个帐户。 查看对您的安全问题的答案是否已更改,或者这些问题本身是否已更改。
If there is an element of commerce involved in the affected account, thoroughly review any activity on that account. Verify that no new shipping addresses have been set up on your account, no new payment methods have been added, or new accounts linked. This is especially true of sites that let you make one-click purchases, or issue payment cards.
如果受影响的帐户涉及商业活动,请彻底检查该帐户上的任何活动。 验证您的帐户上未设置任何新的送货地址,未添加新的付款方式或已链接的新帐户。 对于允许您一键购买或发行支付卡的网站尤其如此。
“Attackers do things for a reason,” says Jakobsson. “If we are talking about attacking your Bank of America account or PayPal the reason is obvious: They want your money. What criminals will often want to do is hook up a debit card to your account. If they add an address and then request a financial instrument, that is a way for them to monetize.”
“攻击者做事是有原因的,”雅各布森说。 “如果我们正在谈论攻击您的美国银行帐户或PayPal,则原因很明显:他们想要您的钱。 罪犯通常会想做的就是将借记卡连接到您的帐户。 如果他们添加地址然后请求金融工具,那是他们货币化的一种方式。”
Often, one account is simply used as a gateway to another. Your Dropbox account may only be a means to get at something stored there. Your e-mail might only be a path to your online banking. Not only do you need to secure the account you know was hacked, but you need to check all the others it touches as well. Reset your passwords on those services, and treat them as if they have been compromised.
通常,一个帐户只是用作另一个帐户的网关。 您的Dropbox帐户可能仅是一种获取存储在其中的东西的方法。 您的电子邮件可能只是通往网上银行的途径。 您不仅需要保护您知道被黑客入侵的帐户的安全,而且还需要检查它涉及的所有其他帐户。 在这些服务上重置您的密码,并将其视为已被泄露。
This is one of those non-obvious but important steps. One of the first things you should probably do if you’ve had an account compromise is de-authorize all the associated apps that use that account for login or for its social graph. For example, Google, Twitter, Facebook, Dropbox and many others support OAuth, which enables third party apps to use account APIs without having to give them the account login information. But if a hacker has used it to authorize another device or service, and remains logged in there, simply changing your password won’t get them out. There could be a rogue client out there that you remain unaware of even after regaining access to your account. The best bet is to pull the plug on everything you’ve given access to. Here they are on Google, Facebook and Twitter. It may be a pain to go back through and re-authorize them, but it’s less so than leaving a malicious individual lurking in your account. And in any case, doing so periodically is just good hygene.
这是那些非显而易见但重要的步骤之一。 如果您遇到了帐户泄露的情况,可能应该做的第一件事就是取消对使用该帐户进行登录或对其社交图谱的所有关联应用程序的授权。 例如,Google,Twitter,Facebook,Dropbox和许多其他支持OAuth,这使第三方应用程序可以使用帐户API,而不必向他们提供帐户登录信息。 但是,如果黑客使用它授权了另一台设备或服务,并且仍然保持登录状态,那么只需更改密码就不会将其删除。 那里可能有一个流氓客户,即使您重新获得对帐户的访问权后,您仍然不知道。 最好的选择是拔掉所有您有权访问的东西。 它们在Google,Facebook和Twitter上。 返回并重新授权它们可能很痛苦,但是要比在帐户中潜伏一个恶意个人要容易得多。 在任何情况下,定期这样做都是不错的选择。
It’s bad enough you had your email hacked, but you really don’t want your identity stolen as a result. Services like LifeLock will do this for you for a fee, but you can also do it yourself by contacting the three major credit reporting agencies directly. Depending on the state you live in, locking down your credit might be free, provided you’ve filed a police report.
您的电子邮件被黑客入侵是非常糟糕的,但是您确实不希望自己的身份被盗。 诸如LifeLock之类的服务将为您收费,但您也可以自己直接与三大信用报告机构联系,以实现此目的。 根据您所居住的州,只要提交了警方报告,锁定信用额度可能是免费的。
“Say that your Facebook account gets hacked,” says Jakobsson, “there’s a good chance you won’t lose any money, but your friends might.” The mugged-in-London scam works by hijacking your identity to contact friends to request money. It’s also true, though less commonly so, on AIM and Google Talk and other services. There may also be data that you need to let others’ know has been accessed–from financial matters to sensitive personal information.
雅各布森说:“说您的Facebook帐户被黑了,很有可能您不会损失任何钱,但您的朋友却有可能。” 伦敦抢劫案的骗局是通过劫持您的身份与朋友联系以要求付款。 在AIM和Google Talk等服务上也是如此,尽管这种情况很少见。 从财务事项到敏感的个人信息,还可能需要一些数据来让他人知道。
Enroll for live free demo on Ethical Hacking Training
参加免费的道德黑客培训演示免费演示
But there’s another reason to do this too, and it’s the same reason for this very article, which is to raise awareness. The best tactic of all is to do everything in your power to not be hacked: to run up to date software, use good password hygiene, and make backups of everything in your system.
但是,这样做还有另一个原因,这与本文的目的相同,那就是提高知名度。 最好的策略是尽一切努力不被黑客入侵:运行最新软件,使用良好的密码卫生措施以及备份系统中的所有内容。
翻译自: https://medium.com/swlh/what-to-do-after-youve-been-hacked-f9278ce9f761
被黑客入侵了怎么办