Russian Hackers and How They Influenced the Election

Russian Hackers and How They Influenced the Election

Throughout history, the United States presidential elections have always involved mudslinging to shed light on various scandals. With the goal of demeaning the other candidates, elections seem to bring out the bad, the good, and the fabricated facts about everyone. The 2016 election between Donald Trump and Hillary Clinton was no different. Each side made the public aware of the other’s scandals and inadequacies. However, there was help from external forces. Later in the election, the government release information indicating that Russian hackers influenced the election. From the release of confidential emails to influencing social media’s coverage on political issues, it is clear that hackers promoted Trump’s campaign.

Hacked Emails

One of the main ways the Russian hackers degraded Clinton’s campaign was by releasing confidential emails about Democratic operations. They gained access to this information through a phishing email sent to the Democratic campaign chairman, John Podesta. The illegitimate email gave the hackers access to all of the information on his computer and his emails. From there, everyday emails involving the Democratic campaign were released online.

Social Media Hacks

Twitter served as the primary social media platform to promote the election. Due to the abundance of online services, Twitter can serve as a playground for hackers. The Russian hackers were able to form botnets to send automated messages promoting articles about leaked Democratic operative emails. There is also evidence that they promoted fake articles and articles promoting social issues.

Additionally, Facebook disclosed evidence of Russian interference in the elections through the use of political ads linked to approximately 470 fake accounts and pages. These accounts purchased more than $100,000 worth of ads that focused on hot social issues such as gun control, immigration, race, and LGBTQ rights. The fake accounts are thought to be related to the Internet Research Agency, which is notorious for using fake accounts to post on social media with the goal of degrading the population’s sense of nationality.

In total, 25% of the social media posts promoted anti-Americanism, 15% sought to degrade Clinton and her campaign, and 11% focused on Paul Manafort, President Trump’s previous campaign chairman who is being investigated for wiretapping.

Motivation

The culprits behind the hacks were 12 Russian nationals, and several of them worked for Russia’s intelligence agencies. The motivation behind these attacks is still under speculation, but many are suspect of Russia’s president, Vladimir Putin. Many believe that he wanted to damage Clinton’s campaign because she promoted pro-democracy protests in Russia. Another common belief is that the hacks were motivated to improve Trump’s campaign rather than undermine the political process. On the other hand, others believe that Russia’s involvement in the election was meant to destroy United States citizens’ faith in the Democratic process.

 

For more information about cybersecurity, visit our website https://dynagrace.com/.

Resources: https://www.npr.org/2018/07/19/630289153/why-did-russia-attack-the-2016-election-this-weeks-whirlwind-offers-new-clueshttp://www.wbur.org/hereandnow/2018/07/25/russia-election-interference-how-whyhttp://time.com/5340060/donald-trump-vladimir-putin-summit-russia-meddling/https://www.cnn.com/2016/12/02/politics/democrats-russian-hacking-intelligence/https://www.nytimes.com/2017/09/27/technology/twitter-russia-election.htmlhttps://www.nytimes.com/2017/09/06/technology/facebook-russian-political-ads.htmlhttps://www.cnn.com/2016/12/26/us/2016-presidential-campaign-hacking-fast-facts/index.html

Pictures: Featured Image: https://www.flickr.com/photos/mlephotos/3003457292/https://pixabay.com/en/twitter-facebook-together-292988/https://pixabay.com/en/trump-president-usa-america-flag-2546104/

Botnets and How to Avoid Them

Botnets and How to Avoid Them

Botnets are a string of private computers linked together by one server. While some types are legal and serve to run websites, others are malicious. These illegal botnets connect computers through infection by malware, namely Trojan malware. Other less common infections occur through drive-by downloads and spiders. While the owner often doesn’t know that they are infected, the cybercriminals controlling the botnet have full access to their computer and information. Additionally, these criminals can make your computer a zombie to perform tasks for them. Any device that can connect to the internet including PCs, Macs, smartphones, smartwatches, laptops, security cameras, and other smart appliances can be incorporated into a botnet.

How Botnets Work

After downloading infectious software, the botnet contacts its creator, and your computer is now is under his/her control. The creator’s ultimate goal is to incorporate millions of computers into their botnet web or zombie network. This occurs because the more computers there are in a web, the stronger the cyber attacks. Once in control of your computer, these cybercriminals can perform malicious tasks including:

  • Sending spam
  • Influencing elections
  • Using their web to create DDoS attacks where they overload the website with all of their botnets until there is a denial in service
  • Creating fake internet traffic for financial gain
  • Creating ads for financial gain
  • Mining cryptocurrencies

In other cases, cybercriminals create zombie networks to sell to other criminals. This allows more people to have access to your data. Furthermore, these infections are very skilled at hiding themselves. They use minimal power, so they do not disrupt normal computer function. Some botnets even adapt to avoid security software detection.

Different types of Botnets

Client-server model

This type of botnet uses a single master server to transmit information to each member of the web. They do this through command and control servers to effectively relay information.

However, while client-server models are great for conveying information to the zombie network, they are also easily detected and stopped by law enforcement because they use command and control servers. In order to destroy the botnet, one must simply destroy the server.

Peer-to-peer

This structure is similar to the client-server model. However, instead of having one main server to distribute information, each computer in the web acts as both a receptor and a server. Similar to how people communicate peer-to-peer, these computers talk to each other to relay information. This makes it harder for law enforcement to detect because there are many servers and destroying one will not destroy the botnet.

How to protect yourself

Protecting your personal information is pretty straight-forward. Some of the common recommendations to protect yourself from infection and to rid your devices from current botnets are:

  • Download and run malware software often
  • Update your computer system, applications, and security software often
  • Do not click on or download suspicious links and attachments. This includes all links sent from unknown email addresses, websites, and pop-ups.
  • Utilize a firewall to ensure security while you browse the internet.
  • Avoid suspicious websites

 

For more information about cybersecurity, visit our website https://dynagrace.com/.

Image Resource: Featured Image https://pixabay.com/en/network-computer-laptop-connection-698598/https://pixabay.com/en/businessman-internet-continents-2682712/https://pixabay.com/en/internet-cyber-network-finger-3563638/

Resources: https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html, https://usa.kaspersky.com/resource-center/threats/botnet-attacks, https://www.pandasecurity.com/mediacenter/security/what-is-a-botnet/

What is Trojan Horse Malware?

What is Trojan Horse Malware?

Trojan malware was named after the Trojan Horse that ancient Greeks used to infiltrate the city of Troy. The wooden horse was perceived as a gift to the Trojans, but it was a ploy to sneak Greek soldiers behind the Trojan walls and ultimately win the war. Trojan malware works similarly. This malicious type of malware is disguised as regular software. Once downloaded, Trojans survive by remaining unnoticed, which makes it a popular choice for many cyber-criminals.

What Happens When You’re Infected

Instead of spreading and multiplying like other types of malware, Trojans go unnoticed and collect your online information and gain access to your computer system. They also infiltrate your security systems so that hackers and cyber-criminals can gain access to your data. Upon activation, Trojans allow these hackers to have access to your system and data. They also enable them to spy on you and disrupt your computer and network’s performance.

Different types of Trojan Malware

Trojans can take many forms, and they have a diverse range of functions. Some of the more common types are:

  • Backdoor Trojan: creates holes in the computer’s security that allows hackers and cyber-criminals access and control over your data and software. These Trojans make it so invaders can send, receive, download malware, and alter files.
  • Downloader Trojan: download new malware, Trojans, adware, and other malicious programs onto your computer.
  • Spy Trojan: spy on you by tracking your data, passwords, and highly used applications and websites.
  • Distributed Denial of Service (DDoS) Attack Trojan: target web addresses from your computer to increase online traffic that eventually overwhelms the network and results in service denials.
  • Banker Trojan: Steals online banking data so cyber-criminals have access to your credit cards, debit cards, and electronic payment systems.

How to protect yourself

The best way to protect yourself is by installing anti-malware software and periodically running diagnostic scans. Additionally, be sure that your software is frequently updated because Trojans will take advantage of any security holes caused by outdated software. Trojans can infect all types of devices including PCs, Macs, smartphones, laptops, and tablets, so be sure to use the anti-malware software on all of these devices.

In addition to anti-malware software, you can further protect yourself by avoiding questionable websites, links, and downloads. Trojans are commonly found linked to pirated materials and links in unfamiliar emails. Also, use complex passwords and firewalls to guard your accounts and personal information.

For more information about cybersecurity, visit our website https://dynagrace.com/.

Image Resource: Featured Image https://www.flickr.com/photos/agungordu/8027072165/in/photolist-dejQTX-4mtSuS-h8Tza9-chUzEd-rg8RXc-7nU23o-278PAKf-6VM7yZ-akWWxt-fQRXgN-SPMS47-TDqs9w-jCyLU8-8Zjeqb-5gFgJa-QXhnYo-4kXqAY-cnDaco-zsCwH-22sUP4S-7dRpjn-UkfSpm-cJ4SR-7QMMGR-hQbSW9-6y1okX-85ZK2d-chUzSE-j1hUSJ-dxERdG-dmDPum-9szWNc-DMRPjs-USWRgW-akQCTe-anDES1-amHTC7-36C3ve-TN9xLL-8yh4i7-dQLG1v-fk3wTF-BpWq5-ahUKwV-p6NYnc-dEYL5a-chUzrU-aCkxpU-9szXoX-5xvJb3https://pixabay.com/en/computer-security-padlock-hacker-1591018/, http://www.flickr.com/photos/bestfeeler/3745313965/in/photolist-6GXHmH-d4FvJj-pkUinY-iRZihN-bFqELx-boQMhi-TpK8SH-p4Vsnp-9yT5S5-24C7iDm-JMMjN-5NoQVW-bMCTW4-hkUUG-C54G-rU5Gz-dV9Moj-o42Hvu-nqxkzs-9Awwzb-q776tA-48un2Y-RYdqgB-48uo8C-bx7247-4HTgd1-a1NMpt-S3vD6L-9nTrJR-5ovQo4-9H21B4-5o2KcX-8Pp9bL-92BbjT-aMdLyD-akHpAX-nhFXbQ-9PtgrN-e8LbEt-6RaLuA-S8N6UT-9KmSgc-7VpYUh-75B6BC-6bJt4d-5MeZjC-9QQWsK-5n6spx-8Syukw-9nuz7m

Resources: https://www.avg.com/en/signal/what-is-a-trojanhttps://us.norton.com/internetsecurity-malware-what-is-a-trojan.htmlhttps://www.intego.com/mac-security-blog/whats-the-difference-between-malware-trojan-virus-and-worm/, https://usa.kaspersky.com/resource-center/threats/trojans, https://www.guru99.com/learn-everything-about-trojans-viruses-and-worms.html

Pin It on Pinterest