This article is also now available as a full video, click the link below to open the video in a new tab:
For this episode I will be talking about different types of Cyber Threats. This can happen at different levels including the following:
- Device Level – Phone is very common
- Account Level
- Network Level
- Platform Level
- Social Engineering and Psyops
The video provides some additional details to help you determine which if any of those categories could apply to you.
If you’re trying to determine if you have been subject to any kind of cyber threat, the technical term for these symptoms is indicators of compromise. This can include the following:
- Excessive Data Use
- Overheating
- Excessive Network Traffic from Data Exfiltration
- High CPU – Cryptomining
- Pop-ups, adware
- Spyware – silent monitoring
Manipulation can also occur outside of a direct hacking attempt in the form of social engineering, sometimes escalating to the level of psyops. An example of social engineering is a ‘bad actor’ who is able to influence your followers to not like or share your content, creating a shadow ban. An example of full psyop level activity took place in Houston,TX (see article link below) where two Russian linked Facebook groups were able to create a protest and counter-protest using Facebook and $200 in ad spending.
References:
Mitre Attack Framework. https://attack.mitre.org
Lockheed Martin Cyber Kill Chain. https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Texas Tribune. https://www.texastribune.org/2017/11/01/russian-facebook-page-organized-protest-texas-different-russian-page-l
targetedtechtalk@protonmail.com
Follow @TargetedTechTlk