‘Hillary
can’t dance anymore’.
The
recent Indo-Pak aggression sparked a widespread discussion about the ‘Dance of
The Hillary’ malware and the adversary's attempt at cyber warfare.
Understanding Cyberwarfare
Cyberwarfare
can be an effort undertaken by an enemy state using cyberspace to attack vital
computer systems and disrupt information systems, networks, and online working
in that state. Cyberwarfare is a new type of war that bolsters the position of
the forward participant in the race of cyberspace and technology. Cyberwarfare
has become the latest trend while fighting wars, as almost everything is
present and dependent on the internet. Regardless
of how physically strong a person may be, everyone is vulnerable on the
internet—whether it's their data, financial information, or any other digital
asset that could become a target for Cyber Extortion.
As soon as the tussle between India
and Pakistan began on May 8th, speculations about a cyberattack being launched
by Pakistan also started to surface. This incident demonstrated how formidable
cyberwarfare can be.
Subterfuge
To Panic
The tsunami around Pakistan led to
a cyber threat initiated with a WhatsApp message, which included manipulative
language, heightened claims and a risk of pertinent threat or doom; it said
that the malware was targeting WhatsApp, Facebook and E-mails to steal your
banking details, passwords and would give access of your device to the enemy. This
message, drafted with such technical words, sounded genuine to a prudent person,
even professionals, but was nothing short of an attempt at subterfuge, as
confirmed by the Press Information Bureau upon fact-checking. It was
found that this malware news was only spread to spawn trepidation among anyone
who received it.
Interestingly, this Dance of the
Hillary malware isn't new. It has been around since 2011 and made headlines in
2016-2017, clearly meaning that its resurfacing was a clear attempt to create
panic.
Indispensable Cyber Hygiene
The difference between spreading misinformation about a malware infection and launching an actual malware attack is Capability; while the adversary might not have been capable enough, general cyber awareness is essential in case a computer network faces a cyberattack.
- Do not open any attachments sent to E-mail, SMS, WhatsApp, or any social media from an unknown account. It can be a PDF, a video file, or any extension asking the person to install something.
- Many apps have an auto-download feature, which, although convenient, can cause a computer system to fall prey to a cyberattack.
- Cyberattacks commonly use phishing, smishing, and vishing to hack a computer system. If you receive any unknown communication, report it on https://sancharsaathi.gov.in.
- A widely believed misconception is that regularly updating your software slows down the speed of the operating system. While it only amounts to inculcating new features in your device, updates also tend to overhaul security bugs present in a device, restricting possible entry for malware.
- Enable Two Factor Authentication.
- A widely believed misconception is that regularly updating your software slows down the speed of the operating system. While it only amounts to inculcating new features in your device, updates also tend to overhaul security bugs present in a device, restricting possible entry for malware.
Comments
Post a Comment