Am I hacked?

Mlytics SOC Engineers
Mlytics
Published in
7 min readMay 30, 2024

Hey there, fellow netizen! Let me ask you a question: Have you ever wondered if your online accounts are as secure as they should be? Well, you are in the right place because today, we are diving into the world of data protection.

Image generated by ChatGPT

Now, picture this: you are chilling online, scrolling through your feeds, and suddenly, it hits you like a ton of bricks — “Am I hacked?” My friend, it’s a valid concern, especially in this digital age where cyber threats lurk around every corner. But fear not because I’ve got your back.

Let’s start by dissecting your password.

  • Do you use your birthday as a password? Uh-oh. that’s like leaving the front door wide open for hackers.
  • What about your pet’s name? Yep, that’s another red flag waving in the breeze of cyber insecurity.
  • Do you use your significant other’s name in your password? If so, you might as well send out an invitation to hackers.
  • How about your favorite sports team? Using it as your password is like handing over the keys to your digital kingdom.
  • Do you rely on common phrases like “password” or “123456” or “88888888”? Well, let’s just say you are not exactly winning any awards for originality. And congratulations, you’ve just made a hacker’s job a whole lot easier.
  • Well, don’t think of writing that common phrase spelled backward, either. That’s not fooling anyone, my friend.
  • Oh, and that keyboard pattern password like “!QAZ2wsx”? Yeah, hackers can crack that faster than you can say “cybersecurity.”
  • Last but not least, do you use the same password across multiple accounts? If so, you are playing a dangerous game of digital roulette, my friend.

So here’s the deal: if you answered “yes” to more than 3 of these questions, it’s time to take action, my friend. Head online pronto and change that password faster than you can blink.

The time taken to crack a password contains the Name and Birthday.

Now that we have covered the basics of what not to do when it comes to passwords let’s discuss how to create a rock-solid one that will have hackers scratching their heads in frustration.

Now, I know what you’re thinking — how on earth am I supposed to remember a password that looks like it fell out of a hacker’s nightmare? Fear not, my friend, for I have some tips and tricks up my sleeve to help you manage your passwords like a pro.

First off, consider using a password manager. These handy tools securely store all your passwords in one encrypted vault, so you only need to remember one master password to unlock them all. It’s like having a digital keyring for your online accounts — convenient and oh-so-secure.

But if you’re not ready to dive into the world of password managers just yet, fear not. You can still create strong, memorable passwords by using passphrases instead. Simply string together a series of random words or phrases, throw in some numbers and special characters for good measure, and voila — you’ve got yourself a password that’s both strong and easy to remember.

And last but not least, don’t forget to update your passwords regularly. I know it’s a hassle, but trust me, it’s worth it. Set yourself a reminder to change them every few months or whenever you hear news of a major data breach. Your future self will thank you for it.

Writer’s Note: How to Make a Password You Won’t Forget

Hey there! Struggling with those tricky passwords like “9M3g@JGkRMsSxzZ” that are just impossible to remember? I totally get it. Here’s a tip: why not use a passphrase instead? Think of it like a mini-story or a funny moment that’s easy for you to recall. For instance, if there’s no limit on password length, you could use something like: “May, 2nd will be the date that I will never forget because I met a girl with a height of 175 cm! and she is so pretty!” This way, you’re mixing numbers, symbols, and a personal touch, boosting security and making it a breeze to remember. Give it a try!

Back to the main question: “Am I hacked?”. Well, fear not, because there are tools and websites out there designed to put your mind at ease. One such popular tool is “Have I Been Pwned?” (HIBP). This user-friendly website allows you to enter either your email address or password, then scans it against a vast database of known breaches to determine if your information has been compromised.

Here’s the lowdown on how it operates: simply navigate to the Have I Been Pwned website, input your password (rest assured, it’s encrypted and never stored), and hit enter. In mere moments, the tool will inform you if your password has surfaced in any past data breaches.

captured from https://haveibeenpwned.com/
Information of the security breaches that impacted the input email

Now, if your password does appear as compromised, don’t hit the panic button just yet. Instead, take swift action to change your password on any accounts where you’ve utilized it. And while you’re at it, consider bolstering your security measures by enabling two-factor authentication for an added layer of protection.

Note: It’s important to note that even if you change your password after discovering it may have been compromised, your information might still be out there. See, “Have I Been Pwned?” primarily focuses on whether your email address has been exposed in a breach, not just your password. So, while changing your password is a crucial step in safeguarding your accounts, it doesn’t necessarily erase the fact that your email may have been part of a breach.

But wait, there’s more to the tale of online safety. It’s not just about having a rock-solid password; it’s also about choosing your online haunts wisely. Imagine having a fortress of passwords, only to register on a website or app that’s about as secure as a house of cards. Yup, your precious password could still end up in the wrong hands faster than you can say “data breach.”

So, how do you know if a website or app is up to snuff in the cybersecurity department? It’s not as daunting as it sounds, I promise. One handy tool in your arsenal is the OWASP Top 10, a list of the most critical web application security risks compiled by the Open Web Application Security Project (OWASP). Think of it as your cybersecurity cheat sheet, highlighting the most common vulnerabilities that hackers love to exploit.

Now, when you are skimming through those terms and conditions (I know, not the most thrilling read, but bear with me), keep an eye out for mentions of compliance with OWASP Top 10 or other cybersecurity standards. If a website or app proudly proclaims its adherence to these standards, that’s a good sign that it takes your digital security seriously.

But here’s where things get even more interesting. Ever heard of a WAF? It stands for Web Application Firewall, and it’s like having a digital bouncer standing guard at the door of your website or app. A WAF acts as a barrier between your precious data and would-be attackers, monitoring incoming traffic and blocking any suspicious activity.

Now, here’s the cool part: a WAF can help website owners or admins comply with the OWASP Top 10 by automatically detecting and blocking common security threats. It’s like having a cybersecurity expert on standby 24/7, keeping your digital fortress safe from harm.

source: Mlytics Origin Shield

So, next time you are browsing the web or downloading a new app, take a moment to peek behind the curtain and see if they’re rocking the WAF. And if you’re ever in doubt about their cybersecurity measures, don’t hesitate to reach out to their support team for clarification. After all, it’s your data on the line, and you have every right to know if it’s in safe hands.

Now, let’s talk turkey about the value of your personal data. It’s not just about protecting your accounts; it’s about safeguarding your identity, your privacy, and, yes, even your financial well-being. In this fast-paced cyber world, your personal data is worth its weight in gold. You owe it to yourself to protect it like the precious commodity it is.

Some might think that because they aren’t high-profile individuals like a president or because they don’t own vast wealth, their personal data isn’t valuable. This is a dangerous misconception. Everyone’s privacy matters and the consequences of neglect can be severe.

Consider the case of Mat Honan, a journalist for Wired, who experienced a devastating hack in 2012. Hackers wiped his devices and gained access to his email and social media, all because of interconnected accounts and a lack of proper security measures like two-factor authentication. The damage was profound, impacting both his personal and professional life. This example illustrates that nobody is immune to cyber threats, and everyone’s data is valuable and worth protecting.

Image generated by ChatGPT

So, there you have it, amigo. The lowdown on password protection in a nutshell. Remember, stay vigilant, stay informed, and above all, stay safe out there in the wilds of the World Wide Web. Happy browsing 🎊

References

[1] Mlytics. (n.d.). CRS and OWASP Top 10 Vulnerabilities. Retrieved from https://help.mlytics.com/en/knowledge/crs-and-owasp-top-10-vulnerabilities

[2] Mlytics. (n.d.). Mlytics origin shield. Mlytics. https://help.mlytics.com/en/knowledge/mlytics-origin-shield

[3] Wikipedia contributors. (n.d.). Have I Been Pwned?. In Wikipedia, The Free Encyclopedia. Retrieved May 30, 2024, from https://en.wikipedia.org/wiki/Have_I_Been_Pwned%3F#:~:text=The%20service%20collects%20and%20analyzes,address%20appears%20in%20future%20dumps.

--

--