Cracking Isn’t What You Think It Is

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

teenagers seated viewing their cellphones
Eric: Z-Daddy put up another script.
Sean: I know, I’m reading it… and stop calling him that. That’s weird bro.
Photo by Pixabay, please support by following @pexel.com

Here’s a question for you. Can you recall what you were doing back in your younger days? Like around the age of 15 or maybe even younger, 12. I would assume that for most people, you were either being grounded by your parents (or parent, I understand for some people a single-parent ran household may have been a reality) for something stupid you did or not being grounded and running around outside with your friends.

The point was, you were too busy either with your parents or with your friends to even have the thought of being seated in front of a computer. And in some cases, this shows signs that you grew up with a healthy childhood. But on the other hand, if you were, or tend to be anti-social, then forming together all the hallmark traits of becoming a hacker could have been something on the menu for you. You don’t know what a hacker is? Let me script it for you.

young man pulling up hoodie
It’s hacking time.
Photo by Mati Mango, please support by following @pexel.com

Hacking Many Hats

Before we start this, I want to be clear, hackers do not sit in front of a computer in the dark typing really fast with a hoodie on trying to crack code…the brightness from the screen tends to hurt our eyes after a while. There are a lot of meanings for the term “hacker”, but the actual definition doesn’t match the sexiness of Hollywood’s definition.

A hacker is someone who uses their skills to gain access to systems and networks without authorization. And before you ask, no, there isn’t an age limit to becoming a hacker. Hackers often fall into one or two of the three categories, you have “Black Hat” – the cybercriminal who is looking to illegally access a system with malicious intent, “White Hat” – the “good guy” who identifies weaknesses in an architecture of an organization which they then inform and advise, and last is “Gray Hat” – which is the combination of both white hat and black hat. Needlessly to say, they operate to what suits their best interest at the given time.

There are other types of a hacker, “Green Hat” – newborn hackers, “Blue Hat” – are white hats who are employed to improve security systems and conduct pen-testing, and the last is “Red Hat” – which are vigilante hackers, these are the individuals that hack in the name of justice.

old man holding up a fan of cash
Businessman…the old school hackers before the internet.
Photo by Andrea Piacquadio, please support by following @pexel.com

Big Wins with You Losses

Hackers tend to go after big-name financial institutions because of the chance to win big and get a nice payday. However, the risk of doing so results in possibly being caught, fined, and put in prison. So what is a better alternative to avoid that? That’s right, you guessed it, they target the little guy, putting your sweet cornhole on the menu.

While your money may be the most important thing to you, your information like social security, address, and entire name, pretty much everything that says who you are online and in life is way more valuable to a hacker.

The collecting of your personal information is called “information aggregation” and once complete or they feel enough is acquired could result in you getting charged for things you didn’t sign up for, like a loan, a timeshare, or getting a speeding ticket in the mail for a car you don’t own. Basically, your data goes up for sale on the dark web to the highest bidder. And here you were thinking no one had an interest in you, well not you per se since it’s the data they want but still don’t discredit yourself. You go you.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

teen looking up at the sky.
The sky is the limit on how many accounts I can hack.
Photo by Myicahel Tamburini, please support by following @pexel.com

Hacking When We were Young

Remember when I mentioned that anyone could be a hacker? I was kidding but then again, I wasn’t. You see hackers can come in many shapes, sizes, and flavors. Flavors are the level of skills that they possess to get the job done. Most hackers are often referred to as “Script Kiddies” (No, there’s no relation to them and this site, you’re safe), they’re low-level and mainly purchase malicious code also known as scripts to use to perform malicious attacks.

But then you have your hackers who really know what they’re doing. Such as the likes of Kevin Mitnick- the world’s most famous computer hacker. He hacked into North American Defense Command, Digital Equipment Corporation’s network system. He was arrested and later upon release, decided to hack Pacific Bell’s voicemail system as a flex to show that he could.

Albert Gonzalez started around the age of 12 and was later arrested for debit card fraud in relation to stealing card information. He stole more than 180 million payment card accounts across different companies. And Jonathan James or maybe formally known by his fictitious name “C0mrade”, was deemed one of the best hackers in history.

This was attributed to him gaining access to private network systems with the flex being “this was done just for the fun of it”. Again, recall what you were doing back when you were 15, at the age of 15, he hacked into NASA (National Aeronautics and Space Administration), the Department of Defense (DoD), and South Bell to steal software.

This is insane because his hacking into NASA led to them being shut down for 21 days and cost about $41,000. Getting things fixed was cheaper back in the day, am I right?

young man with a look of worry
I just had to click on a file saying, “Baddies: one-click nude-pic”.
Photo by Mati Mango, please support by following @pexel.com

So, you’re probably worried about trying to protect yourself from getting hacked and having all your juicy information all over the internet. Well, I have good news, it’s too late. Well, not entirely, maintaining best practice use of devices and being mindful of your interactions on the internet could save you a lot of financial pain in the long run.

Never leave your device alone in an area whether you trust your surroundings or not, practice using complex passwords – involving letters, numbers, and characters, which makes it harder and takes more time to crack. Do not use any part of your name or the name of anyone you may know for Bluetooth and or Wi-Fi devices as this could give hackers possible information to utilize and further their pursuit.

Always use multi-factor (MFA) or two-factor authentication (2FA) when dealing with online accounts and any other login site as this helps with ensuring that it is you accessing them. Always make use of anti-virus/anti-malware as this will hinder hackers’ attempts to install unwanted programs/files onto your machine. And always make sure your operating system, the OS, is up to date.

Most of how to protect yourself is using common sense, like you wouldn’t just leave your front door unlocked while you’re away on vacation or just have some random person walk in your house to Netflix and chill, don’t leave your device unattended, and don’t let people you don’t know on your device or network. I mean I know hackers can get clever and lucky but most of the time it’s made easy for them.   

gentleman in suit face palming his head.
I have a degree in computer science but what I really needed was common sense.
Photo by Andrea Piacquadio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you have a feeling that may have missed something about hackers? Script a comment below.

Swapping Phones and Trading Places

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Jesus Saves but Scriptingthewhy saved my bank account baby! Read this script!
Photo by Brett Sayles, please support by following @pexel.com

Hey you, yes you, you the reader. Do you want to know a secret? I know something special about you. The fact that you’re reading this means that you are in the market for getting robbed.

I’m sure there hasn’t been a point in time, where you haven’t had the thought to give some stranger on the internet your hard-earned cash. Please keep in mind that hard-earned was said depending on your work ethic, we all know that results may vary. You say “no”? None of this sounds appealing to you. Don’t worry, that wasn’t my angle.

Humans, it has long been known that we are creatures of habit. We don’t like change much, so we often don’t like it when our plans have hiccups. This could range from something small like having to pick up a tube of toothpaste because you just squeezed your last bit this morning and now you have to add another item to stop for on your shopping list or, to something big like having your phone no longer working because it’s not in your name despite the fact it was fully functional the day before.

You don’t quite understand that last one? Don’t worry, I’m going to script it for you.

Lord, I think this is what Z-Daddy was talking about. This phone was working a minute ago.
Photo by Alex Green, please support by following @pexel.com

A Change in Signal

If you can, picture you’re using your phone for one minute and you put it down only to come back moments later to find that it no longer operates the same. You try making some calls, double check to see if you have any “bars” (“signal”, if you wanted to be technical).

You turn on and off the airplane mode, restart your phone, and still nothing. It’s obvious that something is off and this clearly isn’t normal, you shouldn’t try putting it off to deal with it later.

There is a super high chance that you could be experiencing SIM Swapping. SIM (Subscriber Identity Module) swapping which may go by other names like SIM hijacking, SIM splitting, or sim jacking (not sure how much I like that last one, sounds like a trip to HR), is the art of an attacker/hacker gaining control of your phone number.

Once your number is obtained, life for you is going to go from Netflix and Chill to Bodies by Drowning Pool pretty quickly.

Another globe crisis and cyberattacks on the rise…I’m good with this.
Photo by Ashutosh Sonwani, please support by following @pexel.com

Changing Faces

If you’re an advent reader of mine then you’ll already know or have a good sense of who would commit this act and why, but if you’re not, ask yourself the following. How could you have committed this heinous crime of not subscribing? Why haven’t you subscribed to keep up to date on when I post? And are you going to be missing out if you don’t subscribe? To that last one, I can honestly say “yes”.

Subscription shaming aside, this act is committed with the intent of the attacker becoming you. Why would someone choose you as a target you may be asking? As mentioned before, imposing as you can grant them access to everything you have and more.

They can intercept incoming messages meant for you. Some events have involved credit cards being charged and financial institutions trying to confirm if the purchase was legit only for the attacker to confirm in your place.

Sometimes there’s just no other way to say it.
Photo by Saksham Choudhary, please support by following @pexel.com

Ways to Phone Jack

So you may be wondering, how is something like this executed. I mean, clearly, there has to be some telltale signs before it even happens, right? Well…in most and by most meaning all, you’ll never know that your information is being collected.

This could be done by using keyloggers malware, phishing emails, or which happens in most cases social engineering. The attacker will be someone who has been in the same vicinity as you and has listened close and long enough to obtain enough information to pose themselves as you.

Enough to fool your cellphone provider into giving them more information that they may be missing to commit further attacks. Once that happens, the fun of trying to get everything back in order begins, depending on your response time when you find out your phone no longer has service.

I watched out for social engineering, and I’m didn’t crazy.
Photo by Kindel Media, please support by following @pexel.com

Becoming Socially Unacceptable

At this junction, which is normal, you might be wondering how to prevent this from happening. Social engineering is tricky to catch, so you have to pay attention to everyone you’re within earshot of. Trying to do this constantly will drive you insane and pretty much overload your senses…well and at some point, you’re going to lock eyes with someone for a little longer than what’s considered to be normal, and you may end up weirding them out. The point is, you’re going to end up like Jim Carrey from the movie 23 and be uber-paranoid.

An easier and more sane solution is to be mindful of your volume in places where you’re required to verbally give your information as talking to the person as if you two are in a rave could end poorly since eavesdropping is an easy skill perk that we all have. If writing it down, make sure you are aware of people who may walk by as this could lead to them being able to perform “shoulder surfing”, this is a clever name I know. I didn’t coin it but still somehow, I can feel your judgment.

Some other countermeasures you can take instead of opting for text-based confirmations are, your cellphone provider will let you add a PIN (Personal Identification Number) to your account for an extra layer of protection. When making use of 2FAs (two-factor authentications) verification methods, opt for biometrics which relies on either facial recognition or fingerprint scanning as this involves confirmation of your physical being.

Another method is having a security key that looks like a flash drive but a simple tap or insert into the phone could be more secure if you didn’t want the hassle of trying to get your phone to recognize your face. It is highly advised to contact your provider as soon as possible if you get a “Number changed” or your phone stops operating normally, the effects and fallout could run into years of working to get everything fixed.

Within 5 hours a credit card statement of $7,845.35 could be in your name and that could be the prelude to what’s to come.    

Small Detour:

Check out this person’s experience with SIM swapping because their story is wild, click here.

Sean: I want to be a hacker like Z-Daddy when I grow up.
Z-Daddy: I’m not a hacker kid, you know what, forget it.
Photo by cottonbro studio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Is there something I may have missed about SIM swapping? Script a comment below.

TLC was Right About Your Boss

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

women sat in bed taking note.
I probably should check to see if there’s anything new on Scriptingthewhy before I login for work.
Photo by Ivan Samkov, please support by following @pexel.com

Here you are sitting in front of your computer, and you’re thinking to yourself;” You know today is the perfect day to go on some un-named sites.” That was a joke, no one ever thinks that. In fact, most people rarely think to stray away from their daily norms.

You get up out of bed, grab a cup of coffee, say hi to the cohabitator or fellow inhabitants, and then move on to go about your day online. This may be the case if you work from home, but for the rest of the world, it’s sitting in morning traffic and questioning the meaning of life while simulating The Belko Experiment in our heads.

Well, have you ever had that feeling after spending some time online, you logged out and called it a day but when logging out you feel like something is a little off. That feeling could be that random download that you didn’t care to stop but in case you thought that couldn’t be the case, let me explain how.

man sitting holding a book at desk smiling.
Sarah’s working from home today? Oh yeah, it is Double-Cheeked up Thursday.
Photo by Andrea Piacquadio, please support by following @pexel.com

R.A.T Vs Rat

What is this file that is taking residence on your computer? Well, look no further than you may have a rat in your midst. No, not the cute rodent that most people find disgusting because their cousins are often found running the subways of New York.

A side thing to note; they are actually clean animals; they just don’t get a fair shake. Us silly humans, we’re always fearing what we don’t understand. You may have a Remote Access Trojan (R.A.T), this is a type of malware that finds its way into your computer and can perform surveillance and can gain unauthorized access to your personal computer (PC).

RATs can behave in the manner of keylogger applications by automatically collecting information on keystrokes, usernames and passwords, browser history, and emails are a few things to mention.

They differ from keyloggers however, in the sense that RATs give the attacker the capability to gain access to unauthorized remote access to your PC. So if you could imagine, your boss who has a crush on you and is really good with computers, and since you may be working from home, somehow they take control of your computer, flip on the webcam and there you have it. You may not want to be walking around in your lounge clothes double-cheeked up when you’re supposed to be in work attire is all I’m saying.

Another lovely surprise is a backdoor is left open for the attacker to come and go as they please without you ever noticing. This can lead to changing the behavior of the machine, browsing, and copying files, and using your internet connection to perform some good old illegal activities.

man using binoculars to see.
This was the webcam before the internet. Yup, Sarah is working from home today. #IWantAPoundCake
Photo by Andrea Piacquadio, please support by following @pexel.com

Hacking Motives

You may be thinking to yourself saying “This is nuts! Who would do such a thing?” Aside from your crushing hard-on-you creep boss, hackers – who could be anyone, they don’t look any particular way – would resort to using this tactic to get information for a wide array of reasons.

Scenarios could be collecting your information either selling it or using it as blackmail or performing some type of extortion with it, installing more malicious malware, or doing a combination of all the above.

What are some motives that would cause one to do this? Well in most cases it has to deal with people wanting money, it kind of makes the world go round you know. And in other cases, in the words of Bag-Head (I know that’s not his name but I’m calling him that anyway) from the movie The Strangers, it’s because you were home. This is said because there are some instances where an attack takes place simply because it was able to.

businessman sat at laptop thinking to himself.
Sarah is inspiring me to get a mail-order bride. $200? I don’t know, that’s a bit expensive.
Photo by Sora Shimazaki, please support by following @pexel.com

Phishing for Mail-Order

Thinking to yourself now, “How do I stop something like this from happening to me?” Don’t know what age you are while reading this, but I grew up in the era when your parents would inform you, they were going to be leaving soon and you are going to be in charge of the house, firmly said “If someone is at the door and it’s not us, don’t open the door.”

That very saying still holds true, spear-phishing is one technique used in this attack. Any emails, website links, and redirected to download files or software received from unknown parties should be reported and removed immediately. Using anti-virus and anti-malware will aid in making sure the RAT isn’t able to work properly and assist in halting the collection of any information.

If a computer is infected and is linked to other computers, you should assume that all personal information has been compromised and immediately change login information from a clean computer. Following this credit cards and all financial activities should be monitored in the following months to catch any shady activity.

If you’re at work and find this has happened, get in contact with the system administrator and inform them of the potential threat. A well-known fact is that companies get hit due to complacency when checking emails. Yes, while a mail-order bride doesn’t sound like a bad idea, that potential risk to have your identity stolen or worst having the company’s PC corrupted could see you in line with hitting an iceberg.

two people talking in a modern workspace.
Ben: So… that link you sent me. I purchased a mail-order bride. We’re good with that, right?
Sarah: I never sent you a link. Wait, you bought what now!?
Photo by Sora Shimazaki, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Have you ever experienced a RAT attack? Script a comment about it below.