My Run-In With a Real-Life Hacker

I received an unexpected email from a friend today with a Google doc attachment. It was a friendly note, so friendly that I did consider clicking on it โ€” even with about 20 years experience watching all manner of hacker tricks.  Fortunately, I stopped and asked a simple question, which is almost always enough to separate real email from phishing attacks.

โ€œDid you mean to send me a document?โ€

Iโ€™ve done this 100 times, and Iโ€™ve nearly always received a, โ€œOh no, I must have been hackedโ€ response. Today, however, was different. Thatโ€™s why Iโ€™m nervous for you.

โ€œYes, I sent it myselfโ€ฆ,โ€ was the response I got from my friendโ€™s email account. โ€œLog in to view the document.โ€

Whoa.  Knowing my friend as I do, I could tell this was not written in her chatty style.  But outside of that language analysis and my already raised eyebrows, I might have clicked.  So I persisted.

โ€œHow is the new home?โ€ I asked, fishing for any sense that my friend was behind the email. Again, I expected that a hacker wouldnโ€™t bother responding. After all, in a traditional phishing attack like this, itโ€™s likely the bad guy sent out a million of these emails, just hoping to get 100 or so people to click and cough up their login credentials.

Seconds later, I got a response.

โ€œNice and lovely.โ€

Two email responses? This was getting interestingโ€ฆand concerning.  I now had a pretty strong feeling that a computer criminal was behind the keyboard, but there was still a small chance it was my friend. So I did two things. You can try these two if you think you might be talking to a criminal.

1) I contacted her on Facebook, borrowing from a technique called โ€œout of bandโ€ authentication. I used a different tool to communicate with her to ask  if the email was real. Mind you, itโ€™s possible that both my friendโ€™s Gmail and Facebook accounts were hacked, and the criminal could have โ€œpassedโ€ this test. But it it at least a good start. If Iโ€™d had more time, I would have sent her a text message from my cellphone, and waited for a reply, which would genuinely qualify as โ€œout of bandโ€ authentication.

2) I devised a question that a hacker probably couldnโ€™t answer.

โ€œIโ€™m coming to visit (your new city) soon. Remind me what neighborhood are you in?โ€

Then, the email fell silent. Again, this isnโ€™t a perfect strategy: a very clever criminal could have hacked into her Facebook account and replied back with her new neighborhood (which, of course, I know).  But again, Iโ€™ve climbed up the ladder of authentication pretty easily, and also not said anything too offensive.

What does that mean? Many people fall for booby traps because they are simply too polite to say, โ€œThat doesnโ€™t sound like you!โ€ Criminals rely on social conventions like these to trick us. Such a statement might actually generate a reply like, โ€œI canโ€™t believe you said that. Iโ€™m really offended,โ€ or similar. Many people fall for that. So having  polite but informed banter is a good tool for situations like this.

Those details aside, Iโ€™m writing this up to share with you something that really concerns me. It is incredibly labor intensive for a hacker to reply to notes like mine. That says one thing to me: Someone is trying awfully hard to trick you into surrendering your login information. So watch out.

So what was going on? Iโ€™m pretty sure it was this. Users who click on the attachment are taken to a page that looks like Google docs, but itโ€™s not, and are tricked into logging in to a page controlled by criminals, thereby giving up their Google credentials.

This is bad because a bad guy could send out emails in your name, but really, itโ€™s much worse than that. Millions of people use Gmail as their password recovery tool, so when hacker gains access to it, s/he can often use it to hack other accounts. For example, they go to an online banking site, click on โ€˜I forgot my password,โ€™ and have a password email reset link sent to your Gmail account. The problem can spiral pretty quickly.

My friend wrote an hour later or so to say she knew nothing about the emails, and a hacker must have broken in.  Sheโ€™s in full recovery mode now. If this has happened to you, Google has instructions on what to do.

Meanwhile, NEVER click on a link to an attachment you donโ€™t expect, even if it comes from a friend. And even if that โ€œfriendโ€ asks you to click on it several times.  On the Internet, nobody knows youโ€™re a dog.  And you donโ€™t know if youโ€™re talking to a hacker, either.

[Editorโ€™s note: If you suspect your personal data has been compromised by a hacker, itโ€™s important to monitor your financial accounts daily.  In addition, you can check your credit reports for fraudulent accounts or other errors that could be a result of identity theft.  Monitoring your credit scores, which you can do for free through Credit.com, can also tip you off to identity fraud if you see a sudden, unexpected drop in your scores.]

This post originally appeared on BobSullivan.net.

More on Identity Theft:

Image: Tyler Olson

You Might Also Like

Find out what someone can do with your stolen Social Security num... Read More

October 19, 2023

Identity Theft and Scams

how to prevent identity theft
The Federal Trade Commissionโ€™s Consumer Sentinel Network re... Read More

May 17, 2022

Identity Theft and Scams

A young couple sits in bed together looking at a laptop
Identity theft is a major problem. According to the Federal Trade... Read More

November 19, 2020

Identity Theft and Scams