WHO IS OUR NEXT TARGET?

Abdul Basit Rotimi
3 min readJun 11, 2022

--

Photo by Stillness InMotion on Unsplash

We heard about millions of cyberspace crises on the loss of billions of dollars based on Human error from unknown activities carried out on the internet.

Internet is a market we visited every second you know in the market we have different intentions going there some might buy groceries while some are to steal.

In cyberspace we called it Mr. Computer virus, Worms, Trojan horse, D-DOS attack, Botnet, Ransomware Attack, On-path attack, Drive-by-download, phishing (spear/whaling), Social networking, Email spoofing, Cyber-squatting, Business Email Comprise(BEC), Cyber Espionage, Identity theft, Crimeware, Zero Day, Baiting, Social engineering ………. all this are what we have in cyberspace. a little illustration of how this is costly and sometimes leads to death.

Illustration:

Janet committed suicide Nigeria scam (also called the 419 fraud), A Nigerian 419 scam is a confidence trick in which the target is persuaded to advance relatively small sums of money in the hope of realizing a much larger gain.

In February 2003, Jiří Pasovský, a 72-year-old scam victim from the Czech Republic, shot and killed 50-year-old Michael Lekara Wajid, an official at the Nigerian embassy in Prague, and injured another person, after the Nigerian Consul General explained he could not return $600,000 that Pasovský had lost to a Nigerian scammer.

Leary, who was sentenced to 94 years in prison for setting off fire bombs in the New York (USA) subway system in 1995, had developed his algorithm for encrypting the files on his computer.

Punjab National Bank in India was cheated to the tune of Rs. 13.9 million through false debits and credits in computerized accounts.

Are you wondering how did they fall into the trapped of the adversaries don’t get doubt about it you and I are their next target, all humans are vulnerable to security errors because everybody has responsibility for security but not everyone knows about security (cyber) you might think am not using a smartphone, I don’t have any Mission-critical (Mission-critical accounts are email, social media, cell phones, banking, and e-commerce)? My business doesn’t require access to the internet.

The same goes for churches. One leader of a religious organization told me that God was its firewall and no one would ever target a church. Again, that’s not true. Churches and nonprofits have bank accounts that are accessible via the Internet, and I have seen them victimized on numerous occasions.

Be it small-scale businesses, non-profit organizations, CTO, CEO, CFO, CISSP, CISO, Granny, Grandpa, institutions, hospitals, banks, Forces, e.t.c.

Have this in mind “What is vital to you, is the adversaries target “ this is what makes us the next target.

Sometimes I received anonymous messages from different entities about:

Can you help me to hack a Facebook account?

Can you help me to hack the GoDaddy account?

Can you hack a Bank account?

Can you lock out the credit card holder account?

I’m 100% sure that the entity that asked this question are individuals that have nothing up to a thousand dollars in their account so they do care about your life and be security concerns. If this should be the case adversaries can be anybody (Competitors, Criminal, Friends, Children, Families, Terrorist, Spies, Troublemakers, Ungrateful Discount Employees). You might be doubt about Children, but this is 100% real, someone else told me about a scenario that A guy crack his father’s account withdraw all the money, send it to his BITCOIN wallet went to the bank with his father to complain about the withdrawn money so remained gallant you may be their next target. Adversaries may be motivated by money, revenge, political beliefs, achievement, and things you do have.

I will end up with this every organization/Individual belittles Security awareness in their daily activities. If you don’t know repeat this after me -

“If you think Security Awareness Is Costly, My Life Is At Risk”

References:

The secret to cybersecurity,

LEAP(Lexcode Education & Assessment Platform)

Written By: Abdul Basit Rotimi

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Abdul Basit Rotimi
Abdul Basit Rotimi

Written by Abdul Basit Rotimi

Abdul Basit is a seasoned cybersecurity analyst loved to provide security solutions to attack victims.

No responses yet

Write a response