A double edged sword

 

Dear reader this week we were tasked to write a real word example of the following statement: "if a person has control over any function, it can also be used to control the computer". My example of choice is a YouTube video I have seen recently or rather genre of videos where people with hacking knowledge hack scammers.

I am going to put a link of a video I saw recently about this topic at the end of this post. In that video you could see how an Indian scam center works and what they trying to do to unsuspected people. The video does contain strong language, so viewer discretion is advised.

The usual method in these videos are that the scammers make the “client” install some remote desktop software like TeamViewer and then gain access to their computer. The scam can take multiple routs from here. There are types when they “send a refund” to the client but the amount is “too much” so the client has to send some back, or that they make them give their credentials for the account or just trying to steal information from the computer and many more. Which ever method they choose the damage can be significant.

A lot of people do not know enough about IT to be able to prevent scams like this, fortunately there are some people who get back on these scammers. Although these scam centers usually contain a lot of inexpensive computers that are easily replaced but if the hacker could get some important files, it was worth it.

This activity is a perfect example because their own tactics are used against them. By opening up the client’s computer with remote access they establish a connection to their own device too. This is a perfect opportunity for someone who know how to do these things to get access to their computer and plant some viruses or other files or even get access to their microphone and camera.

These things are illegal, so I do not recommend trying this out. If someone wants to try these things, they should do it on their own devices or ask someone for a written permission. I also recommend doing it on a virtual device so none of your files get accidentally corrupted no matter what happens!

Thank you for reading this week’s blog.

Balint Adam

5/4/2021

https://www.youtube.com/watch?v=k25QGUhzODA

Comments

Popular Posts