Threats Coming with Short Links
Short links have become an essential part of today’s online experience. Many internet users click on bit.ly, ow.ly or other links created by a URL shortener without hesitation. However, short links can pose significant privacy and security threats that are often overlooked.
Short links have become an essential part of today’s online experience. Many internet users click on bit.ly, ow.ly or other links created by a URL shortener without hesitation. However, short links can pose significant privacy and security threats that are often overlooked.
Short links make Internet browsing and messaging easier and faster, especially on mobile devices. It can also improve social media sharing because message length is often limited.
Most people just copy and paste the automatically shortened link, and most popular URL shortening services allow users to customize the name of the ‘new’ web address. But therein lies the problem. Unlike traditional URLs, short links do not allow the user to hover over and see what the actual website address is. So, in most cases, you can’t be sure what’s waiting for you at the other end of a shortened URL until you get there.
If cybercriminals exploit a zero-click vulnerability in a web browser, infection can occur the moment a user enters the malicious website. Cybercriminals can also use link shortening tools to change the target address as needed.
For example, in a situation where attackers send phishing messages containing some type of link, but the phishing site they created to land on is blocked, rehosting it at a different address is not a problem if they use URL shorteners for the links in their letters. Often, multiple redirects are used to further blur the tracks.
Some link shortening tools allow tracking the actions of those who click the link on the actual target site. This is effectively an intermediary attack: it allows traffic to pass through an intermediary service node that monitors all data exchanged between the user and the target site.
Therefore, the URL shortener can potentially capture entered credentials, social network messages, and the like. Moreover, such links can be used for doxing and other types of tracking if the URL shortener service offers advanced functionality.Top of Form
In most cases, short links for public use are placed in social network posts or web pages. However, if it is sent to a user personally – in a messaging program or in an email sent to a personal or business address – additional risks arise. Using such links, an attacker who has already collected some information about the user can redirect the potential victim to a phishing site where some personal data has been pre-populated. For example, it might redirect to a copy of a banking site that includes a request to enter a valid username and password, or to a service’s “payment gateway” that has a pre-populated personal debit card number and prompts the user to enter a security code.
Never clicking on a shortened URL is not an option given how common and useful they have become. For the most part, URL shorteners are used for legitimate purposes and are completely safe.
However, there are threat actors who want to take advantage of the trust people place in a service, so it becomes important for users to be careful. If a link raises suspicion, is in a resent message, comes from an unfamiliar email, or comes from an unknown person, an easy way to examine the link is GetLinkInfo or UnshortenIt. You can copy and paste it into a tool like:
Security
Attackers Malware Urea
HP Wolf Security’sten reports point to the use of artificial intelligence when creating malware scripts, threat actors relying on malvertising to spread fake PDF tools, and malware embedded in image files.
HP Wolf Security’sten reports point to the use of artificial intelligence when creating malware scripts, threat actors relying on malvertising to spread fake PDF tools, and malware embedded in image files.
The latest in HP Imagine reveals how attackers are using generative AI to help write malicious code. Threat Insights Report published. HP’s threat research team has detected a large, refined ChromeLoader attack spread via malvertisements that lead to professional-looking fake PDF tools and identified cybercriminals who injected malicious code into SVG images.
The report provides an analysis of real-world cyberattacks, helping organizations stay abreast of the latest techniques cybercriminals are using to evade detection and breach computers in the rapidly changing cybercrime landscape. Based on data from millions of endpoints running HP Wolf Security, key attacks identified by HP threat researchers include:
- Generative AI helps develop malware in all environments: Cybercriminals are already using AI to create convincing phishing traps, but to date there has been limited evidence of threat actors using AI tools to write code. The team detected a campaign targeting French speakers using VBScript and JavaScript, believed to have been written with the help of AIZ. The structure of the scripts, comments explaining each line of code, and native language function names and selection of variables are strong indicators that the threat actor is using ARMS to create the malware. The attack infects users with the freely available AsyncRAT malware, an easy-to-obtain information stealer that can record the victim’s screens and keystrokes. This activity demonstrates how AIM lowers the bar for cybercriminals to infect endpoints.
- Subtly crafted malicious advertising campaigns that lead to fake but functional PDF tools: ChromeLoader attacks are getting bigger and more convincing, relying on popular search keywords and malicious ads to direct victims to well-designed websites that offer functional tools like PDF readers and converters. These applications hide malicious code in an MSI file, while valid code signing certificates bypass Windows security policies and user warnings, increasing the likelihood of infection. Installing these fake applications allows attackers to hijack victims’ browsers and redirect searches to attacker-controlled sites.
- “This logo cannot be used” hides malware in Scalable Vector Graphics (SVG) images: Some cybercriminals are bucking the trend by switching from HTML files to vector images to disguise malware. Vector images commonly used in graphic design generally use the XML-based SVG format. Because SVGs open automatically in browsers, embedded JavaScript codes are executed when the image is viewed. While victims think they are viewing an image, they are interacting with a complex file format that leads to the installation of multiple types of stealing malware.
By isolating threats that evade detection tools on computers—but by allowing malware to safely engage first—HP Wolf Security can capture specific insights into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on more than 40 billion email attachments, web pages, and downloaded files without any reported breaches.
Examining data from Q2 2024, the report details how cybercriminals continue to diversify their attack methods to bypass security policies and detection tools:
– HP Sure Click At least 12% of email threats detected by Microsoft bypassed one or more email gateway scanners, the same rate as in the previous quarter.
– The top threat vectors were email attachments (61%), downloads from browsers (18%), and other infection vectors such as removable storage such as USB flash drives and file shares (21%).
– Archives were the most popular malware distribution type (39%), of which 26% were ZIP files.
HP Wolf Security runs risky tasks in isolated, hardware-hardened virtual machines running at the edge to protect users without impacting their productivity. It also captures detailed traces of infection attempts. HP’s application isolation technology reduces threats that can evade other security tools and provides unique insight into intrusion techniques and behavior of threat actors.
Security
Tips for Keeping Social Media Accounts Safe
Social media has become an indispensable part of modern life with billions of users around the world. According to July 2024 data from Kepios, there are 5.17 billion social media users worldwide, or 63.7% of the global population.
Social media has become an indispensable part of modern life with billions of users around the world. According to July 2024 data from Kepios, there are 5.17 billion social media users worldwide, or 63.7% of the global population.
Cybercriminals’ activities on social media are becoming increasingly sophisticated. Users are threatened by many different methods, from social engineering techniques to fake accounts. Hackers can commit fraud by capturing users’ personal data, take over their accounts and use these accounts for spam content or malicious links.
Additionally, since social media users often use the same passwords on more than one platform, a vulnerability in one account can put other accounts at risk.
Common Hacking Methods Used Against Social Media Accounts
- Phishing Attacks
Phishing is a tactic where hackers send fake messages or emails pretending to be a trusted source. Cybercriminals try to trick users into providing their login information or clicking a malicious link that compromises their account. Phishing attacks often target influencers by impersonating brands, sponsorship deals, and even platform notifications.
- Filling out Credentials
This method involves using stolen login credentials (data breaches or leaks) to access social media accounts. Social media enthusiasts who reuse their passwords on different sites are especially at risk from such attacks.
- Brute Force Attacks
Hackers use automated tools to try thousands of different password combinations until they guess the accounts’ password. Weak or common passwords make users an easy target for brute force attacks.
- Malware and Keyloggers
Malware can be installed on devices via malicious downloads, email attachments, or drive-by downloads. Once installed, malware such as Remote Access Trojans track keystrokes, allowing hackers to steal users’ passwords and gain access to your accounts.
- Session Hijacking
If users are using public or unsecured Wi-Fi, hackers can hijack their sessions to access their social media accounts. By capturing data exchanged between the device and the network, hackers can access users’ sessions without needing login information.
Methods to Protect Social Media Accounts from Hackers
- Use Strong and Unique Passwords
The first line of defense against hackers and account takeovers is a strong, unique password for each account. Avoid using birthdays, common expressions, or words that can be easily guessed. Instead, choose long and random combinations of letters, numbers and symbols.
- Enable Two-Factor Authentication (2FA)
Two-factor authentication adds an extra layer of security to your account by requiring you to verify your identity with a secondary method (usually a code sent to your phone) after you enter your password. This makes it much more difficult for hackers to access your account, even if they somehow get hold of your login information (email address and password combination).
- Be Careful of Phishing Scams
Always double check the sender before clicking on links in emails or messages. Avoid downloading attachments from unknown senders or clicking on suspicious links. Hover over links to see the actual URL before clicking, and if you’re unsure, go directly to the website in question instead of using the link.
- Keep Your Software Updated
Outdated software may contain vulnerabilities that hackers can exploit. Update your operating system, browser, and applications regularly to ensure security patches are applied.
- Use VPN When On Public Wi-Fi
Public Wi-Fi networks are notorious for risks that make it easy for hackers to get hold of your data. Use a VPN to encrypt your internet connection and prevent your data from being stolen when using public networks. bitdefender‘s VPN service offers secure, encrypted connections that protect your online activity from prying eyes.
- Limit Third-Party App Access
Many social media platforms allow you to log in to third-party applications. However, every app you allow to access your social media accounts increases your risk of exposure to hackers. Regularly check apps that have access to your account and revoke unnecessary permissions.
Security
Google reCAPTCHA V2 System is a Victim of Huge Controversies
The Google reCAPTCHA V2 system, which we frequently encounter today, is used as an important barrier in terms of internet security. However, recent developments show that artificial intelligence can easily overcome this system. Here is the final point in the struggle between artificial intelligence and reCAPTCHA!
The Google reCAPTCHA V2 system, which we frequently encounter today, is used as an important barrier in terms of internet security. However, recent developments show that artificial intelligence can easily overcome this system. Here is the final point in the struggle between artificial intelligence and reCAPTCHA!
A group of researchers from the Swiss Federal Institute of Technology developed Google’s reCAPTCHA V2 system using the image recognition model called YOLO (You Only Look Once). 100% successfully managed to pass. This model is an artificial intelligence algorithm that specializes in recognizing objects. By training this model with a dataset of 14 thousand traffic images, the researchers achieved a perfect result in visual verification tests.
Google reCAPTCHA V2 System: Motorcycle and Fire Hydrant Tests with Artificial Intelligence
The model used in the research was a bicycle, fire hydrant, objects such as motorcycles It was very effective in recognition tasks. Although similar successes were achieved in previous studies, reaching a 100% accuracy rate in this project was a remarkable development. This clearly shows that artificial intelligence has reached a point where it can overcome CAPTCHA systems without difficulty.
reCAPTCHA V2 was based exclusively on visual verification tests and is still actively used by many websites around the world. Although Google Like reCAPTCHA V3 Although it has moved on to more advanced systems, widespread use of V2 continues. For this reason, artificial intelligence defeating V2 is considered a serious threat to internet security.
Google reCAPTCHA V2 System: YOLO’s ability to run on low hardware is a great advantage
The YOLO model can work effectively not only on high-performance devices but also on low-end devices. This makes the power of artificial intelligence suitable for use at all levels. Researchers also This artificial intelligence model They also state that they have taken various additional precautions, such as preventing people from constantly logging in from the same IP address.
This development raises big questions about the security of CAPTCHA systems. Artificial of intelligence As it becomes more powerful day by day, it is a matter of curiosity how secure such security systems will remain in the future.
-
Cinema and Art2 weeks ago
Those who could not stand the horror movie left the hall!
-
Social Media2 weeks ago
YouTube announced its new change! Deleted names are back
-
Hardware news and contents2 weeks ago
Xiaomi Soundbar 2.0ch introduced worldwide
-
Gaming1 week ago
The Expected News Arrived from Dragon Age: The Veilguard
-
Gaming1 week ago
22 New Games Will Be Added to GeForce Now in October
-
Mobile1 week ago
The launch date of the Huawei Nova 13 series has been announced
-
Mobile2 weeks ago
Samsung Galaxy S26 May Never Be Released
-
Wearable Technology2 weeks ago
Meta Orion Scared Apple