CYBER SECURITY ENTHUSIAST

Internet crime stories are dime a dozen but these examples will show you why online security is essential. From ethical hacking to blackmail and car hijacking, these true stories show how you must act now to secure your well-being in the digital landscape.

We carefully curated the best, most fascinating tech stories that cover the risks involved in any digital activity of device, so use the links below to navigate them.
The mom whose laptop was locked down by a ransomware attack
Tom was blackmailed because of his hacked Ashley Madison account
How ethical hackers took over her PC
They remote hacked his car
Ransomware deletes 2 years of academic papers
His WoW account got hacked. Twice
Your data has been breached
Catfish isn’t dinner, it’s lies, manipulation, and theft
Hillary Clinton’s Aides Got Phished And Lost Her The Election
He fell prey to the same scam twice and lost $1,350
Who would want to be you? Some can even become You.
When your workplace, a gaming giant, gets hit
The casual, public Wi-Fi hack
Customer support falls prey to a social engineering hack
Hotel managers and clients had nightmares due to one lock hack posted

Cyber security incidents and getting hacked seem like distant, fascinating things where other people get hurt, but you stay safe. Truth is, getting hacked or scammed can happen to anyone and it might even have happened to you in the past.

The average number of devices used by you and most people have increased exponentially in the recent years. We’re surrounded by IoT devices, wear smart bracelets, have friends who are betting their savings on cryptocurrency,  and we sign up to dozens of social media platforms.

This means cyber attacks have a lot of ways to get to you – either by targeting you specifically or by simply compromising your info in large-scale attacks.

The best way to learn is through experience, so let’s do just that.

Here are the real stories of people who got hacked and what they learned, plus some actionable tips to enhance your security.

 

1. The mom whose laptop was locked down by a ransomware attack

Two days before Thanksgiving, Alina’s mother got hit by a ransomware attack.

5,726 files got locked by CryptoWall, an encryption malware so powerful it is almost impossible to recover the information.

Alina’s mom contacted the attacker through the ransomware’s communication feature. As all ransomware creators, he told her she can either pay to get her files back or lose them forever. Despite backing up her files 6 months ago, she decided that losing half a year’s worth of photos, documents and other files was too much, and so decided to pay the ransom.

ransomware-damage

The price to unlock her files was 500$ in the first week and 1000$ in the second one, after which the files would be deleted. Payment was to be done in Bitcoin, a complicated process which she had to learn on the fly.

Because of a major snowstorm that closed down the banks, Alina’s mom couldn’t pay the ransom in the first week, and ended up having to plead with her attacker to not increase the price to 1,000$. Surprisingly, he accepted and gave her the key to unlock her files. However, no one should ever pay a ransom, the risks far outweigh the benefits.

The full story is here: How my mom got hacked & What I’ve learned after my mom got hacked (and her data held for ransom)

Find out what steps to take for your protection: WHAT IS RANSOMWARE AND 9 EASY STEPS TO KEEP YOUR SYSTEM PROTECTED

 

2. Tom was blackmailed because of his hacked Ashley Madison account

Sometimes it’s not your fault. The websites you use get hacked and your information is exposed. Your instinct will be to say: “but I don’t have anything to hide!”

Well, that’s not exactly true, is it?

ashley madison hack

Tom started using Ashley Madison several years prior to it being hacked in 2015, as a way to cope with a strained marriage.

After the Ashley Madison hack, cyber criminals contacted him and demanded 500$ to remove his name from a publicly searchable registry. If not, they would also send an email to his family, informing them of Tom’s affair.

Tom refused, believing that if he paid them, they would know that he had something to lose and could be blackmailed further. He was wise, but that didn’t mean he didn’t suffer.

In the end, Tom had to live knowing his affairs on AM could be exposed at any time by the hackers. Moreover, there were also people who took it up upon themselves to impart justice on people in circumstances they couldn’t, or wouldn’t, understand.

The story: In Ashley Madison’s wake, here’s one man’s story of sex, sorrow and extortion

Securing your PC doesn’t have to be expensive: 13 FREE PC SECURITY HACKS TO BUILD YOUR ONLINE PROTECTION

 

3. How ethical hackers took over her PC

Sophie is a technology reporter at the Daily Telegraph. As part of an assignment, she accepted to be part of an ethical hacking experiment.

Basically, a group of ethical hackers would try to compromise her system without her knowing how, when and where. Sophie only knew that it would happen at some point.

For a whole month, the hackers did an extensive research on Sophie, crawling through her Twitter and Facebook pages, Daily Telegraph articles and even found out her date of birth from a website on family trees.

social-engineering-tactics

Source

Almost two months after the experiment began, the hackers launched their attack. They pretended to be whistleblowers in control of sensitive government information and sent her an email with some of the files attached.

The malware infection occurred the moment she opened the file, and the attackers got access to everything, including email address and web cam. And it wasn’t even that difficult to do.

The story: How hackers took over my computer

This is how you can protect your email address: THE COMPLETE GUIDE TO EMAIL SECURITY

 

4. They remote hacked his car

Andy Greenberg, a senior writer at Wired, once took part in a groundbreaking experiment which tested how car hacking could be done.  What did the experiment involve? His car would be remotely hacked while he was behind the wheel.

wireless carjacking

As Andy drove on the highway, the hackers started to progressively take control of the car. First, they activated the air vents and windshield wipers. Next, the transmission was cut and finally, they remotely activated the breaks. And they did all of these things with Andy behind the wheel.

The experiment uncovered a massive flaw in Jeep’s cars which was later fixed. Today, this is even easier to achieve, due to the rise of electric cars and the huge push towards autonomous vehicles like trucks, taxis and more.

The story: Hackers Remotely Kill a Jeep on the Highway—With Me in It

Learn more about how software can expose you, something that works the same way whether we’re talking about computers or self-driving cars: 8 VULNERABLE SOFTWARE APPS EXPOSING YOUR COMPUTER TO CYBER ATTACKS

 

5. Ransomware deletes 2 years of academic papers

What’s the first thing people do when they get hit by a malware attack?

They panic and ask for help in a dedicated forum: “My PC is infected. Please, can anyone help me?

For this user however, it was too little, too late. For 2 years he worked on his academic papers, and then they got encrypted by ransomware. The timing was awful as well: it happened right before they were due. Antivirus didn’t help and he had no backup.

ransomware-infection

We don’t know what happened next, or if he paid the ransom to unlock his files. We hope he didn’t pay.

What we do know is that ransomware attacks are much more frequent that you can imagine and they target individuals and businesses alike.

The story: My PC got hacked by troldesh ransomware. please is there anyone who can help.

Find out how to backup your data so ransomware does not affect you: HOW TO BACKUP YOUR COMPUTER – THE BEST ADVICE IN ONE PLACE

 

6. His WoW account got hacked. Twice

Gamers are favorite targets for cyber criminals, since they don’t want to lose the time and money invested in a character and are willing to pay the ransom.

As a result of a potential phishing attempt, this guy had his WoW account hacked and all his progress lost. And it happened to him not once, but twice! To add insult to injury, the hacker created a new character named “Thanx” as a sign of appreciation for his “efforts” as a victim.

world of warcraft logo

Fortunately for him, Blizzard customer service was responsive and recovered his account and all the progress it had on it.

The same type of attack happens in most popular online games. League of Legends phishing volumes are truly legendary, so we talked to their security team to find out how to avoid getting your account stolen.

The story: So my WoW account got hacked… twice.

Learn more about security and gaming: GAMERS, TIME TO TAKE YOUR CYBER SECURITY TO THE NEXT LEVEL

 

7. Your data has been breached

The Office of Personnel Management, OPM for short, can be considered the US Government’s HR Department. Among other things, it keeps records of employee personal information, such as height, weight, hair and eye color.

In 2014, the OPM got hacked, and the information of 22 million government employees leaked, most likely in the hands of a foreign government.

Bad? Well, the 2017 Equifax saga was a nightmare of epic proportions.

equifax hack data identity theft comicSource

143 million US consumers had their sensitive personal information exposed. That’s 44% of the population and today we’re still seeing reports of more Equifax leaks. Odds are, if you’re a US citizen, your info is floating around on the dark web, at the mercy of cyber criminals.

What do you think the US government did to deal with the Equifax hack? After less than one month since the incident, the IRS awarded Equifax a contract for fraud detection.

Clearly, it’s up to you and you alone to protect your identity.

The story: OPM got hacked and all I got was this stupid e-mail

Learn how to stay as safe as possible from identity theft: HOW TO PREVENT IDENTITY THEFT IN 20 ESSENTIAL STEPS

 

8. Catfish isn’t dinner, it’s lies, manipulation and theft

Some people hack you not with malware or suspicious links, but by gaining your trust and love.

This journalist’s mother started using the online dating site Match.com, and eventually formed a connection with a soldier on active duty in Afghanistan. After a while, the soldier asked for a 30,000$ loan to help him clear a sizeable inheritance of gold and jewelry from US customs.

By now, the journalist and her brother intervened, suspecting the soldier was catfishing their mother. In online slang, catfishing means pretending to be someone else in order to extract financial gains. Or it can be a twisted way to get attention and affection.

Source

In the Match.com case, the victims confronted the man with their suspicions and other evidence they had accumulated over time. The supposed soldier revealed he was a man from Ghana trying to support his sisters, and scamming people online was the best way he knew how to do that.

The story: My mom fell for a scam artist on Match.com—and lived to tell the tale

Learn about the top online scams and how to avoid them: TOP 11 SCAMS USED BY ONLINE CRIMINALS TO TRICK YOU

 

9. Hillary Clinton’s Aides Got Phished And Lost Her The Election

Unless you’ve been living under a rock, you definitely know why Hillary Clinton lost the US Election to Donald Trump. One of the biggest scandals of the decade was the Hillary Clinton leaked emails.

Do you know how that happened?

hillary clinton hacked emails

John Podesta was phished. Yes, the chairman of Hillary Clinton’s campaign fell prey to a phishing attack. He received a suspicious mail and he wanted to flag it, but he made a typo. When forwarding the phishing email to a computer technician, he wrote “This is a legitimate email” instead of “illegitimate”.

 

This gave hackers from Russia access to about 60,000 emails from Podesta’s private Gmail account. They stole all that data, gave it to Wikileaks, and the rest is actual history.

“The FBI’s laid-back approach meant that Russian hackers were able to roam inside the DNC’s computer systems for almost seven months before Democratic officials finally realised the gravity of the attack and brought in external cybersecurity experts.”

But it was too late, as the election results have shown.

The story: Top Democrat’s emails hacked by Russia after aide made typo, investigation finds

Learn why phishing is so effective and how you can avoid it: 15 STEPS TO MAXIMIZE YOUR FINANCIAL DATA PROTECTION

 

10. He fell prey to the same scam twice and lost $1,350

In 2007, Justin was at a difficult point in his life. Unemployed, with a weak skill set and verging on alcoholism, Justin decided to turn his life around by moving to Italy.

Determined to find a cheap flight, Justin searched for sellers of frequent flyer miles. He found two sellers and talked to them over the phone. One of them even sent him a photo of his driver’s license. In a twisted sequence of events, both of them scammed him for a total sum of 1350$.

Sounds unlikely? Think again.

Justin tried to find a cheap shortcut and get that ‘too good to be true’ deal and became blind to any potential scammers. Plus, the phone conversations and photos helped dispel any suspicions he might have.

This is how most scamming attempts succeed, by preying on people who give in to the fear of missing out.

The story: How I Lost $1,350 by Falling for the Same Internet Scam Twice in One Week

Learn more about how social scams work and how to avoid them: SOCIAL SCAMS – THE FULL BREAKDOWN AND PROTECTION PLAN

 

11. Who would want to be you? Some can even become You.

One day, Laura received a call from her credit card company, saying someone else had tried to obtain a credit card using her name, address and social security number.

Before telling the police, Laura decided to assess the damage and look over her credit card reports.

identity theft identity fraud

The impersonator had gotten so deep into the system, she managed to override Laura’s answers to the security questions. Eventually, she guessed the answers and saw the extent of the damage.

The impersonator had created more than 50 accounts in Laura’s name, and got credit for utilities such as heat, cable, electricity and even a newspaper subscription. What’s more, the companies went after Laura in order to get their money back.

After notifying the police and tracking down the impersonator, Laura got a court order and managed to fix a lot of the damage, but only after a lot of sweat and stress. While her case was a fortunate one, few people share her luck and this story should act as a reminder to always safeguard your personal information.

Another stolen identity case created a buzz on Reddit. This user had an argument with an old roommate, who then decided to take revenge. He created social media accounts using the victim’s name, photoshopping the person with an ISIS flag and posting questionable content

The story: ‘Someone had taken over my life’

While a scary and multifaceted attack, it is possible to protect yourself against these types of threats. Here are 20 SECURITY STEPS YOU SHOULD TAKE TO PREVENT IDENTITY THEFT.

 

12. When your workplace, a gaming giant, gets hit

In late 2014, one of the biggest and most expensive hacks ever recorded took place at Sony and one employee reveals the inside situation.

It took around a week for people who worked at Sony to get a grasp of the seriousness of the situation. Sony refused to inform them about the extent of the damage, so instead, they had to rely on news sources to get updated.

playstation logo playstation hack 2014

The next week after the attack, Sony employees found themselves thrown into the pre-PC age. Half of the companies 6800 computers and servers were rendered dead and had ALL of their information stolen and deleted.

As a result, employees had to rewrite every single deleted file by hand. Paper became the main form of communication, used in written memos and to-do-lists, even their salaries were paid using hand-written checks.

The damage didn’t stop there. The hackers got a hold of employee personal information. The source of the article had to change all her credit card passwords, Facebook, Amazon and eBay accounts, almost 30 accounts in total.

The story: I work at Sony Pictures. This is what it was like after we got hacked.

Because of their size and income, companies are frequent targets for hackers. Here is a LIST OF 10 CRITICAL CORPORATE CYBERSECURITY RISKS

13. The casual, public Wi-Fi hack

Maurits Martijn, a Dutch journalist at De Correspondent, entered a busy Amsterdam café with Wouter Slotboom, an ethical hacker.

Within a few minutes, Slotboom had set up his gear, consisting of a laptop and a small black device and connected to the coffeehouses Wi-Fi. Soon enough, his laptop started to display what other people in the café were doing on their devices: what games they were playing, what apps they had installed, Google searches, password and email accounts and more.

Public Wifi Security Essential Guide

According to Slotboom, it wasn’t even that difficult. All you needed was around $80-90 worth of software and equipment, an average intelligence and that was it, a few minutes was all it took to get a hold of a few dozen users personal information.

Slotboom’s small, black device could fool a phone into connecting to his own Wi-Fi network, giving him control over the entire traffic coming and going from a device.

If Slotboom wanted to, he could wait until one user wrote in his email address and password and then take it over. With it, he could control most of the services registered on that email.

While you don’t need to be paranoid every time you connect to a public Wi-Fi, it’s best if you know the risks of doing so.

The story: Don’t use public Wi-Fi when reading this article.

There are ways in which you can stay safe on public hotspots: 11 SECURITY STEPS TO STAY SAFE ON PUBLIC WI-FI NETWORKS

 

14. Customer support falls prey to a social engineering hack

What happens when customer support gives away your information? This Amazon user’s tale is an insightful one.

amazon support

An impersonator once found out some of Eric’s fake information he used to register a website by looking into a public WHOIS registry for website owners.

The impersonator then used Eric’s fake information in a conversation with an Amazon customer support representative and found out his real address and phone number. Using Eric’s real information, the impersonator got in touch with various services and even managed to issue a new credit card in Eric’s name.

Eric got wind of his impersonator’s efforts by reading the customer support transcripts, and also found out his real purpose: to get the last 4 digits of his credit card.

Amazon didn’t do anything to protect Eric’s account, even though he repeatedly signaled the problem, so he finally decides to switch from Amazon to Google. As a parting note, he gets an email from Amazon implying they have provided the impersonator with the last 4 digits of his credit card.

This story about this guy’s tumultuous experience with Amazon will make you think twice about storing confidential information in your online accounts. The fact that Amazon failed to protect his account and look into the matter shows how a lack of cyber security education can endanger users

The story: Amazon’s customer service backdoor

Here is a guide on HOW TO PROTECT YOURSELF AGAINST SOCIAL ENGINEERING ATTACKS

 

15. Hotel managers and clients had nightmares due to one lock hack

In this Forbes story, reporters chronicles the chaos experienced by hotel managers and the panic felt by their customers after a burglar used online hacking tools to bypass the electronic locks on the doors.

“I had dreams about it for many nights. I’d wake up and think I saw someone standing there at my desk,” says one of the victims of a burglary.

onity_door_lock

Simply put, the burglar watched a Black Hat Conference speaker demonstrating how to hack a certain type of electronic lock using only $50 worth of widely available tools. He then used that Onity-lock hack to do a series of break-ins.

How did this cautionary tale end? On a bittersweet note. The original burglar is serving a prison sentence, but the electronic locks in question can still be easily hacked.

A Wired reporter tried it himself, almost 6 years after the original Onity hack, and it still worked. He managed to break into a hotel room. His story is amazing and it follows the birth of the original hacking method, how the burglar got to it and what came out of the entire publicized event.

The story: The Hotel Room Hacker

If you rely on electronic locks and other IoT devices to secure your belongings, this guide will be very useful:  IOT SECURITY – All You Need To Know And Apply

Conclusion

These stories may help you realize that not protecting your information and relying on other Internet users to be nice and play fair is not a viable strategy.

Cyber criminals don’t care about the consequences of their attacks. They only want to reach their purpose, and sometimes that purpose may have nothing to do with you. You could just be a collateral victim, but the aftermath would be all too real for you.


This story was originally published by Paul Cucu on November 3, 2016 and updated with recent cases on February 27, 2018 by Ana Dascalescu.

indentity-data-online
2016.04.12 QUICK READ

True Story: What I Found Out About a Person After Having Accidentally Found Their Travel Card

About the Time I Got Hacked
2016.02.10 INTERMEDIATE READ

True Story: About the Time I Got Hacked and Lost All My Work

My Account Was Hacked
2016.01.07 INTERMEDIATE READ

My Account Was Hacked – Here’s How to Control the Damages

Comments

Excellent site you’ve got here.. It’s difficult to find excellent writing like yours these days.

I really appreciate individuals like you! Take care!!

criminal cases and hacking issues are increase day by day. your post is very useful related every person. your username and password have been stolen by someone and in this situation you need to connect Gmail support number for various issues related unable to recover reset Gmail password , hacking issue, blocking issues etc our service solves your issues in short time and makes you trouble free . you belongs to united states or any other country then you connect online support and get the online solution related gmail issues . click on our website link and get any solution.

computer blue screen is a common problem now

Your blog website provided us with useful information to execute with. Each & every recommendations of your website are awesome. Thanks a lot for talking about.

Loved the way you have described all case studies! I have heard about Ashley Madison’s security breach and how people were threaten for money.

The sad part of all case studies, even biggest brands aren’t capable of managing security of their user’s data.

Instructive article, perusing the article I’ve lost myself into past accounts of multi day defenselessness assaults and north korean digital assault on sony. would love to peruse more on these occurrences expressively in your blog

Thank you. Very comprehensive.

Thanks for this awesome meaningfull article for ethical hacking and EHE . from now onwards would love to read your articles daily.

This blog was… how do you say it? Relevant!! Finally I’ve found something
which helped me. Kudos!

Haha yes! It was really relevant for me too 🙂

I am a daily reader of your blog. Keep sharing..!!

Hello and many thanks for your kind words! It means a lot to us! Thank you for reading our blog and please share your ideas on what we should write about.

Recently there was an attack on twitter account of Air India it got hacked by Turkish hacker and they updated the status of All flight are cancelled.This shows how lethal a cyber attack can be also there was a fail cyber attack on UAE oil corporation.

An interesting article which covers a lot of things we all need to be careful of and demonstrates a couple of others.

I might, light-heartedly point out though that the name of the link is “…/12-true-stories-that-will-make-you-care-about-cyber-security/…” and there are 15 stories, so I find myself wondering (not really) which 3 are not true. 🙂

I do see that the title of the story has been changed to “The 12+ …” and also see there are hotlinks to 13 of the stories at the top of the article. The two that didn’t get a guernsey are nos. 5 & 6.

All this doesn’t discount the importance of the article but does refreshingly highlight that we are all human, and I am personally relieved to see that other people too can make mistakes when they are rushed and trying to meet a deadline or that they are simply human like me. On the whole though, well done and thank you for highlighting these dangers.

Hi Floyd and thanks for taking the time to point out the missing hotlinks, I updated and corrected them :). Indeed, there’s a lot of work involved in formatting and sometimes things slip, we’re lucky to have such helpful readers!
The story is titled 12+ stories but, as you know, in the URL you can’t have a lot of symbols. We’re continually updating our resources with the newest and most relevant developments, usually keeping the same title.
Thank you again and have a great day!

Thrill Share, Thanks Ana

Thanks for sharing a nice information

Hello and thank you for your feedback!

This blog was… how do I say it? Relevant!!
Finally I’ve found something that helped me. Thank you!

Hey Paul,
Informative article, reading through the article I’ve lost myself into past stories of zero day vulnerability attacks & north korean cyber attack on sony. would love to read more on these incidents descriptively in your blog.

I have been hacked by an old boyfriend for 7 years. On a daily basis he ruins my life. is their any legal help out their to prosecute someone? police do nothing.

This is a very good article and would have been ever so much more usefull before hacking actually became a threat to EVERY SiNGLE person on the planet. One day, i dont know, whenever I had my first real smartphone stolen or lost I guess. Like an iPhone 3g or a Motorolla Razor back then, combined with the loss of a social security card, a couple licenses, AAA, bank cards etc….have I gradually become more and more awhere of fraudulent cr@p regarding every aspect of my life to the point I swear people think ive lost my sanity. From false electric bills, to CC’s, not to mention the hell that has become fraudulent phone bills in hardware, upgrades, accts. Really I have no idea at all just how far it reaches at this point. Is it unmodest of me to say that my whole complete tall tale to this day should be up in that top 12 list? In my eyes this IS the end of the world. Information being hacked by individuals, god willing yours or anyone elses with ZERO morals falls into the wrong hands could perform some of the most malicious of anythings. I guess it comes down to whose “code” is better. Kind of like an anonymous shouting contest or chess game. “My ‘d@>k’ is bigger than yours.” They didn’t teach us any coding BS or how in the hell to read it when i was in highschool. But it should come footnoted by whoever is lurking in your server, their address, etc…so you can go to their house and introduce yourself. Oneday not too long ago this cyber security ‘deal’ became extremely serious and god forbid as damaging as it has been on myself and my family. Rule #1 – Never lose ANYTHING!!!!!! Rule #2 – ANYTHING At ALL. Especially a smartphone and make sure anytime you connect to the internet via wifi at your home that it is secure with a dome of protection. I’ll kill it with that last fact is so important or you may one day ramage your neighbrhood knocking on every single persons home within a 3 mile radius and demand to know who provides their internet service. And on that very same day you may end up going to a mental ward and then getting arrested because you can’t read the code or prove a damn thing. I could write a book.

Very comprehensive. Worth the time to study. Great guides.

Thank you so much Robert! Your feedback made our day!

Leave a Reply

Your email address will not be published. Required fields are marked *

GO TO TOP