Cybercriminals have existed for a long time and they aren’t going anywhere anytime soon. Anyone who has ever been victim of cybercrime may be puzzled as to how it happened. How do cybercriminals decide who they are going to target? Is there actually a method to their attacks or is it random?
The truth is, cyber crooks are using different techniques to target future victims based on location (aka geo-targeting). Geo-targeting can be broken down pretty simply. Essentially, cybercriminals will seek out countries or locations that are wealthy as opposed to those that are not. Since an attack is not “one size fits all,” they will customize their invasion to be believable to the intended audience. For example, if the attack occurs via email, criminals will use common language of the area and imitate well-known businesses or brands.
These online criminals are working hard to advance their strategies, creating more sophisticated approaches, and are targeting different audiences based on where they live. This is how they do it.
IP address
Every device has an IP address which allows anyone to locate the geographical location. Hackers have access to many online services that track IP addresses. Once obtained, a hacker might know as much as your location, the company you work for and which internet service provider is used.
Domain extension
Using email to infect or hack devices is an easy option for cybercriminals. Scammers are able to identify a user’s location based on the email extension. It is not at all difficult for these cybercriminals to determine extensions and their locations. Once they have domain extension locations they are able to attack the desired location with a quick email scam.
API
The technical definition of an Application Programming Interface is a set of routines, protocols and tools for building software application. Essentially, these instructions allow apps and services to communicate with one another without the user. Once a hacker has gained some knowledge about your device, they can use different types of API’s to extract information. By looking at the language you have downloaded for your keyboard, applications used and previous searches, your location can quickly be narrowed down.
If you’re now wondering how you can hide and protect yourself from hackers, there are plenty of strategies and steps anyone can take to protect themselves from cybercriminals. Our blog is a great resource that tackles many different angles of cybersecurity. Also, register for our security and risk management conference happening in October!
Leave a Reply