top of page

4 common hacking techniques that you should know



We all agree that Cybersecurity is essential for businesses growth and survival. This is why some organisations are investing massively in cybersecurity software, some are hiring more cybersecurity staffs to test and monitor their Information Security Management System, and others are investing in the training of their staffs to detect threats and avoid falling in traps.


Unfortunately not all organizations have the budget to cater for those requirements and lot of them tend to neglect the cybersecurity needs. Hopefully, only 15% of breach of information are caused by direct attacks. However, 85% of breach of information are caused by human errors/mistakes, which may lead to catastrophic results.


Here below are 4 common hacking methods that everyone should know:



Phishing

If you follow us regularly, you must already be familiar with the various types of phishing and know how to avoid the traps. Follow the link here below if you would like to know more about phishing in general.



Bait and Switch Attack

This hacking method has become quite common lately. Hackers have indeed taken advantage of the boom of digital marketing, specially the increasing number of sponsored ads on social platforms and search engines.


Basically, hackers will buy advertising space on different platforms and will promote an advert. For example they can use an advert which promotes a new smartphone for just Rs8,000.


However, after approval from the platform, the hacker will change the link of the advert and will redirect victims to another website where a malware will automatically be installed on the device.


This is a basic example and unfortunately hackers are becoming more and more sophisticated and apply methods that can barely been seen or recognized by non-cybersecurity professionals.



ClickJacking Attacks

Also known as ‘’UI redress attack”, this method of hacking has gained popularity with the increase of streaming websites.


For this method, a hacker will build a website that will offer free streaming of movies or sports event illegally.


When a victim will visit the website, they will be asked to click on a poster to launch the streaming. However, the hacker will insert a transparent or opaque layer on the poster, and when a victim will click on the link, it will automatically download a malware on the device.



Fake W.A.P.

Fake Wireless Access Point is a type of hacking that is relatively common now. With the increasing popularity of wifi, specially free wifi in shopping malls or other public places, hackers have developed this method to steal sensitive data and eventually force the install of malwares.


For example, when going to shopping malls, people tend to look for free wifi offered by the mall. Hackers might set up a wireless router with a similar name of the public spot, which might give free access to internet. However, when connecting to the router, they will be ask to register and provide personal details to have access to internet. This Is how hackers will steal your information and try to get access to your other accounts. In some cases, hackers will ask to download a program that will steal your data.



Luckily in Mauritius, organisations can benefit from subsidies to train their staffs and Ascentrix can assist organizations on this mission. As part of our mission to help our clients create a culture of security for their organization, Ascentrix provides general training and bespoke training sessions. Please contact us for more details.


bottom of page