Breaching the Great Lakes

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I don’t know what this website is but they’re talking about something on data. Did we have a issue with data?
Photo by RDNE Stock project, please support by following @pexel.com

We as humans, take many things for granted. Family, friends, pets, and quite often, our personal information. We often share our personal data to make purchases or access services, and we expect it will be protected and used responsibly. But how often is this true?

Many organizations sometimes fail to safeguard or even bravely misuse our information for their own purposes. Then go on record saying that it’s a “you problem” and not a “them problem”, which is kinda correct because you didn’t bother to read the twenty-two-page privacy agreement policy.

Word to the wise, start reading those policies. You’ll start to see how jacked-up companies really are. But outside of the evil corporate overlords being okay with you skimming over the fine print, there is a bigger threat to your information, and it happens more than you would think.

Don’t worry, we have you covered on this one. We’re going to be going over what kind of attack this is, who uses it, the functionality and effects upon release, and what are some of the ways you can keep your information safeguarded better than most companies you’ve done business with.

Yea, I’m about to read another one. Forget work, they’re keep me in the know on threat actors.
Photo by Andrea Piacquadio, please support by following @pexel.com

The Attack

So, what is this attack that most companies just can’t seem to stop? Well, let’s get you acquainted with what’s called a data breach. For those who might not know, a data breach is a serious incident that can compromise the security and privacy of individuals or organizations.

It occurs when sensitive, protected, or confidential data is accessed, copied, transmitted, viewed, stolen, altered, or used by someone unauthorized. Data breaches can have various causes, such as hacking, phishing, malware, insider threats, human errors, or physical theft.

What’s that? They just take your information, that’s not a big deal we can hear you say. While true however stay tuned because data breaches can result in, but are not limited to, financial losses, reputational damage, legal consequences, or identity theft for the affected parties.

Dude 1: Bro, catfishing chicks isn’t illegal.
Dude 2: It’s not but phishing is. You might want to change your username, that’s all I’m saying.
Dude 1: Nah, you worry too much. It’ll be fine.
Photo by Wendy Wei, please support by following @pexel.com

Who Can It Be Now

In this crazy world, who would use such a dirty tactic to harm people? The real answer is it could be anyone. There are times when individuals or groups are named but for the most part, a data breach could be on anyone’s part.

One possible suspect, which is a popular case and highly likely in this day and age, is an unhappy employee who may be in the running to leave the company. They might have access to sensitive data and could leak it to competitors or seek to harm the organization.

A few things that could lead up to this would be but are not limited to; sharing passwords with others, the downloading of unauthorized software or applications on company device systems, and networks that can be compromised by negligence, ignorance, or malicious intent. In simpler terms, business owners, if you want to keep your business healthy, try keeping your workers happy.

Always follow the notion that it’s cheaper to keep them. Ah, that good old married life.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

I was reading a few scripts on Scriptingthewhy and I think it’s about time we came up with a better place to house the voters’ information.
Photo by Mikhail Nilov, please support by following @pexel.com

That Sinking Feeling

Sometimes, these breaches involve voter information, such as names, addresses, party affiliations, or voting histories. This can pose a serious threat to the privacy and security of voters, as well as the integrity of the electoral process. How does this happen you may wonder.

As mentioned before, data breaches can occur due to various reasons, such as hacking, phishing, insider threats, human error, or natural disasters. Pretty much anything that may be considered critical information that is not authorized access to the individual is a data breach.

So, what could be done with this information? Well, a number of things, none of them good. Your information could be sold, or collected, threat actors could pose as you to others you know in order to trick them into giving sensitive information about you or themselves. The mess of a data breach is limitless, and one should act quickly when compromised.

That’s right voter, if germs can’t have your vote than neither should criminals.
Photo by Edmond Dantes, please support by following @pexel.com

The Prevention

Not sure if your information was a part of a data breach? Well, we’re here to tell you more than likely it was. As mentioned, all companies are susceptible to their data being leaked.

To prevent or mitigate data breaches, organizations that handle voter information should adopt best practices for data protection because if threat actors have your voter information, then they have your vote. Best practices such as encryption, authentication, backup, and monitoring help to ensure you have a secure connection. you may not always notice the signs of a cyberattack, especially if it targets your social media habits.

For example, you may see a change in the content you view online, such as going from cute animals to political messages. This could be a way of manipulating your opinions or influencing your decisions.

To prevent this, you should regularly check your accounts and settings, and be aware of what you share online. You can also use a website like “HaveIBeenPwned.com” to see if your email or password has been compromised in a data breach.

You can reduce the subconscious effects of these hidden influence strategies by educating yourself. You can watch documentaries like “The Big Hack”, read about how Russia used social media to interfere in Ukraine, the Brexit scandal, and the recent US elections, and learn how social media and voter data are used to manipulate elections.

One way to resist social influence is to be aware of its presence. When you see different people and posts on your Facebook timeline during an election period, don’t assume they are genuine. They might be bots trying to sway your opinion with customized information based on your profile.

So wait, you’re saying that my information was leaked and since it was my voter information, the “threat actors” were able to sway me via social media and advertisement to vote for someone who I didn’t even like in the first place?
Photo by Edmond Dantes, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on data breaches? Script a comment below.

Phishing with Love

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Erica: I sure hope that the latest script from Z-Daddy behind you.
Sean: What is your obsession with Scriptingthewhy!?
Photo by vjapratama, please support by following @pexel.com

Throughout the history of mankind, there is one emotion that has driven us to do many things. Some of these may be crazy and unconventional, but the result is done with good intentions…sometimes.

It’s the one emotion that no one can seem to live without unless you have no desire for it because you believe you’re cold-hearted, at this point I would cautiously call you a monster and bid you a good day. What is this emotion I’m alluding to?

It’s called love, love is a very interesting and powerfully intoxicating emotion we humans have.  If there is anything to know about love, it’s a good thing. However, if you’re rifling through piles and piles of emails from the weekend only to find one saying “ILOVEYOU” in the subject line followed by a “click here” attachment might not be the love you may want at the current point in time.

Don’t know what I’m talking about? Let me script to you what I mean.

Kim: You don’t even know why I’m mad at you.
Tim: It’s because I didn’t read that script thingy.
Kim: That and you didn’t change the toilet paper roll this morning.
Photo by Katerina Holmes, please support by following @pexel.com

A Lovely Chain Letter

As mentioned earlier, you’re rifling through all of your emails from the weekend, and you find one saying “ILOVEYOU”. While this may seem like someone sent this with the intent to brighten up your day and give you all of those cute, warm fuzzy feelings like reminiscing about grandma’s home cooking, the bad news is it’s not.

This event is referred to as the “Love Bug” or “Love Letter for You”, in other words, you’re getting duped with a computer virus, if you click on the attachment. Just when you thought someone was falling head over heels for you.

That’s a solid question Z-Daddy, I think I was in calculus with my crush Brinda Adams. I wonder if she knows that I exist.
Photo by Pavel Danilyuk, please support by following @pexel.com

Frat Worms in College

Here’s a question for you, can you remember what you were doing in the year 2000? If whatever you were doing doesn’t involve sitting in your room making computer viruses, congrats, you’re a part of the majority. I know there is someone reading this script saying “Actually, I was reverse engineering them because of lack of friends.”

Back in the heyday of the year 2000, on May 4th of that year. A 24-year-old college student from the Philippines, by the name of Onel de Guzman had created this computer virus to steal passwords for internet access because he couldn’t pay for it.

This is very reminiscent of trying to tune to the right frequency on the old-school cable box to get the pre-hub before the now prominent hub, black and orange baby. Page 153 and still can’t find anything, we’re all so broken.

At this junction and for my own sanity, I have to make it known that in some sources ILY is referred to as a virus but overall, it’s a worm. The difference is, viruses tend to come in ones or twos, and they muck up a few files in your computer system whereas worms on the other hand, just need you to open the door, and from there, one can multiply and muck up a whole network. Worms are like the frat boys of the computer world, once in, they like to party.   

YES, I AM LOVED…by a guy? Oh whatever, it’s 2023 I’m not judging, I just need someone to hold me and say it’s going to be all right.
Photo by Andrea Piacquadio, please support by following @pexel.com

Loving Dollar Decline

Here’s a scenario on the ILY process, yes, I know you’re dying to know. So, let’s say you are friends with Tom, and you get a message from Tom saying “ILOVEYOU” in the subject line. You open the email and see there’s an attachment. With you knowing Tom, you open the attachment thinking nothing of it but that’s when having to explain to someone why you ghosted them, and spontaneously pop back up begins.

This triggers an event of messages being re-sent to, not only everyone in your list of contacts but their list as well. Do you see how it wormed its way into your life? This scenario is what happens on small scale but on a larger one, ILY found its way into corporate networks due to Microsoft Outlook being widely used at the time which resulted in files of every type being wiped from the hard drives and in just about 10 business days resulted in 45 million users and cost about $10 billion in damages. That’s $3.5 billion in today’s currency, the power of the good ole American dollar, am I right?

Jake: So, I walked up that computer virus and was like “What’s up”.
Z-Daddy: Jake…you know that’s not help you deal with computer viruses, right?
Jake: Pfft, whatever bro, waited long enough and screen went off. Mission accomplished.
Z-Daddy: That’s…never mind.
Photo by Rusian Alekso, please support by following @pexel.com

Effects and After Effects

Now while this worm had spread its way across many, many, many systems, some of which include the Pentagon, CIA, and U.S. Army, and even ventured to the United Kingdom, this one isn’t much to worry about. A part of it was caught on a server that was quickly turned offline and with no other servers to send information to, there was nowhere for it to spread.

Many large companies had to make the decision to completely turn off their emailing systems. As we all may know, being able to email can convey information and information is money, so you can picture a lot of money was lost throughout this whole endeavor. At this junction you have nothing to worry about, however, this doesn’t mean one can run around clicking on emails with “ILOVEYOU” in the subject title.

Being aware of a potential cyber-attack could make a world of difference when it comes to protecting your computer and your life in general. If you get an email from someone you know and you’re curious about it, check with them on another medium (i.e., text message or phone call) to ensure that it was them that sent the email.

Of course, you should have anti-virus and malware protection on your computer and that it and your operating system is up to date as the older systems have vulnerabilities that are not patched. To touch back onto Guzman, while he has one of the world’s first global computer viruses (worm) under his belt which affected 45 million, charges against him and his buddy were dropped, and he regrets unleashing ILY.

When ILY did its thing and pretty much destroyed email by storm, Guzman was so shaken up that he took a year off from working with computers. He now runs a phone repair shop with his buddy in the Philippines.

She sent I love you and the attachment was her. Thank you, Z-Daddy, for keeping us aware.
Photo by Nataliya Vaitkevich, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you think there’s something I may have missed about ILOVEYOU? Script a comment below.

Never Going Trip Again

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Scriptingthewhy, what do you mean I’ll never vacation again? I can’t do it now.
Photo by Robert Nagy, please support by following @pexel.com

After reading this, you just may never trust writing a review ever again. And you know what, we don’t blame you. It’s getting pricey just to exist. We all enjoy traveling to new places, especially with our partners.

You may have seen or shared some photos of yourself or others on their romantic getaways from the kids, job, or life just in general on social media. But let’s say you visited a vacation spot, and it left a sour taste in your mouth, clearly, your next course of action is to fire up your computer and write a review.

However, you may want to hold your horses before letting that Sandals resort owner know how you really feel because not all websites are created equal or with good intentions.

We’re going to be going over what kind of attack this is, who is using it, the functionality and effects upon release, and what are some ways you can prevent this from being the beginning to the end of your vacations.

Oh, would you look at that, someone else filed another complaint. That would hurt my business…if they were complaining on the real website.
Photo by Mikhail Nilov, please support by following @pexel.com

The Attack

We as humans have a common tendency to seek out others who align with our current or pending point of view. Sometimes when we can’t find this we may resort to posting online as a signal for someone to agree or just be wrong in their thought.

But given the current growing threat in the landscape of the internet, it seems like those days are about to be numbered due to malicious actors making use of the complaint form of TripAdvisor as an attack vector for cyber-attacks. This may sound absurd, but like Spandau Ballet, this much is true.

We revamped the malware and made it better. Don’t call it a comeback.
Photo by Cleber wendder Nascimento, please support by following @pexel.com

Who Can It Be Now

So, an old menace brings an onset of new challenges. The group operating behind the Cyclops campaign back in May 2023 had revamped and offered Knight ransomware as RaaS (Ransomware-as-a-Service)—this is the act of offering the use of ransomware with different payment plans to interested parties, on the RAMP hacking forum.

This was done with the intent to invite affiliates to join their scheme and share the profits from extorting victims. We’re not sure as to how many partake in this invite but it’s something to keep an eye out for.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

I didn’t download a file, did I? How would I remember? I was just trying to get off the computer. 36 hours a day at work is driving me mad.
Photo by Mikhail Nilov, please support by following @pexel.com

That Sinking Feeling

So, how does something like this work, well, we’re glad you asked. This campaign was spotted by Bleeping Computer and after analyzing they found an HTML (Hypertext Markup Language) file, “TripAdvisor-Complaint-[random].PDF, htm”. When opening the file, a fake browser window is launched within the real one. This window displays a TripAdvisor website however, this is a spoofed domain name and URL (Uniform Resource Locator). This technique is called browser-in-the-browser (BitB).

This aims to trick users into thinking they’re on a trusted site but in reality, the stealing of your credentials is pending. What makes BitB attacks more dangerous is, unlike normal phishing attacks where the user is redirected to a malicious website, BitB attack does not require the victim to click on any link or download a file because the fake browser window is embedded in the HTML attachment itself. The user may not notice the difference between the real and fake browser windows, this is unless they pay close attention to the details or have security tools in place for detecting phishing attempts.

However, the fun doesn’t stop there, when interacting with this particular BitB, it pretends to be a complaint submitted, asking for the user to review it. When clicking on the “Read Complaint” button, an Excel XLL file is downloaded named “TripAdvisor_Complaint-Possible-Suspension.xll”.  This file delivers the malware payload to encrypt files appending the “.knight_l” extension to encrypted files’ names, where ‘l’ portion likely stands for ‘lite’.

Once this process is complete a ransom note will be created named “How to Restore Your Files.txt” in all the folders of the computer. The note will demand a payment of $5,000 to be sent to a listed Bitcoin address. Trust us, even if you find the means to pay the ransom, there will be no restoration of your files.

They said they revamped it and made it better, but it still looks the same to me.
Photo by Pixabay, please support by following @pexel.com

The Prevention

While reading this you probably think it’s the end of the world and that you may never go on vacation again. We’re here to tell you, that is not the case. A few ways of protecting yourself is familiarizing yourself with the actual website. When visiting a website make sure you look for “https” and a lock image in your search bar as this will ensure that not only the site is secure, but your personal information is encrypted.

Some fake websites will be harder to spot since scammers are kind of clever, so they’ll be sure to come as close to mimicking the real website as possible, but a bit of mindfulness and staying up to date with your operating system and rising threat trends could safeguard you for your next vacation.

Always remember it’s better to file a complaint with the real TripAdvisor. Sure, they might not listen to you and take your money but it’s better than the alternative of scammers holding your data hostage with the intent to sell at a cost way lower than that Sandals resort owner had charged you.

They charged me an “existence fee”. How do you someone for just being in the area!?
Photo by Mikhail Nilov, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on Knight ransomware? Script a comment below.