Beruflich Dokumente
Kultur Dokumente
2015. He was part of a hacking group that targeted important government employees such as ex-
FBI director Mark Giuliano, Avril Haines, Amy Hess, and James Clapper. He used simple
hacking methods such as calling help desks, convincing the staff that he is a genuine caller to
gain access to accounts or reset passwords. By accessing the email account, he was able to leak
documents he was able to obtain. Kane was able to access Brenna's icloud account and took
Kane Gamble employed a social engineering method known as "phone hijacking", where
he contacted the various phone and broadband service providers of his victims, and through
persuasion about his identity being genuine, he was able to gain hold of the victim's passwords.
They should have been trained and educated on the possible scams and the methods used by
criminals to gather sensitive information about the customers. The employment of poor security
measures by the service providers to transfer information is a cause for these attacks. For
instance, at AT&T, to transfer information, all they need is information that is found on the
victim's phone bill. If the fake caller pretends that they can't remember their password, then they
are required to provide the information on the bill to get through. The service providers should
have implemented better security measures and procedures to give out passwords to callers who
This type of attack can be prevented by implementing and following these measures:
1. Introducing a passcode for the account helps in preventing hackers from getting access to
it.
2. Using multiple email addresses to access different accounts helps in the prevention of
phone hijacking. For example, using the different email address to access mobile-carriers
account, a different one to access sensitive accounts such as Facebook, or online backing
and put in place a different email address as their primary address. Using different
accounts prevents hackers from hacking into other accounts that contain sensitive data.
Most of the victims of these attacks use only one email address with the same password
for all the accounts that they hold. So if the hackers get hold of that single email address,
3. Disabling online access to one's wireless account is another way to stop hackers from
gaining access
4. Informing the mobile services providers that changes to one's account are allowed to be
made only in person with valid identity proof and not through phone.
5. Using google voice helps users not to fall for the phone hijacking scam as google voice
6. To protect online accounts, the victims should have created unique and high entropy
passwords that are different to each and every online account they hold.
7. Using different security questions with slightly different answers across various sites
makes it difficult for intruders to gain access to any other website (Weisbaum, 2018).
8. Another important preventive measure that could have been employed was separating the
9. Using a one-time passcode every time to login instead of using saved passwords could
have helped the victims from falling for the ways of the hackers.
10. Using devices that support biometric authentication to access data and sensitive
References
Weisbaum, H. (2018). How hackers are hijacking your cell phone account. Retrieved from
https://www.nbcnews.com/business/consumer/how-hackers-are-hijacking-your-cell-
phone-account-n859986