Hacking News | Latest | How a Hacker Storms One's Life


Should everyone in this world now believe that they and all their data are insecure?

Ahmad Saghir (Islamabad)

Can WhatsApp be hacked? 

Can we access other people's chats?

Can deleted messages be viewed again? 

In the facility of editing the message sent under the new feature of WhatsApp, if the criminal completes the conversation and deletes it, will he now be able to access the edit points? . Is it correct to use black web, dark web and other hacking software in the world of hacking? . These are the questions to which I contacted more than forty hackers in Pakistan and outside Pakistan and tried to get answers. WhatsApp hacking is no longer a dream but any social media app whether it is Facebook, Instagram, Gmail and Google accounts can be hacked.

The exact number of hackers worldwide remains unknown since many hackers with malicious intentions are unidentified. However, there are more than 166,000 registered ethical hackers worldwide. Hacking is one of the most common cyberattacks worldwide

China, Russia, Turkey, Taiwan, Brazil, India and Italy are the top countries in the world where there are more hackers. According to a figure, more than 570,000 websites have been hacked since 2015 in the United States alone, while 119.17 million documents have been hacked and exposed. Most of the victims of hackers are small businesses, while cyber attacks are also the main target of hackers. Kevin Mitnick, who stole the computer codes of Nokia and Motorola, is considered the greatest hacker of all time. Famous among the biggest cyber attacks ever

The Melissa Virus, NASA Cyber Attack, The 2007 Estonia Cyber Attack, Cyber Attack on Sony's PlayStation Network, Adobe Cyber Attack, The 2014 Cyber Attack on Yahoo, Ukraine's Power Grid Attack.

There are 8 major cyber security attacks in the world which shook the foundations of the cyber world.

  1. Colonial Pipeline Ransomware Attack. Date: 2021.
  2. DoD & NASA Hacks. Date: 2000. 
  3. 3. Yahoo Hacks. Date: 2013 & 2014. 
  4. Log4J Vulnerability. Date: 2021. 
  5. Heartland Payment Systems. Date: 2008. 
  6. PlayStation Network Hack. Date: 2011.
  7. CardersMarket Hacks. Date: 2007. 
  8. Attack on Saudi Aramco. Date: 2012.

In cyber attacks, malware cyber attacks are generally considered to be the most common of all attacks, however the most dangerous cyber attack to date was carried out in May 2017. This attack is called wanacry ransomewhere. This attack affected many businessmen all over the world. Not only this, but after this attack, many organizations had to face many losses. 


Hacking and hackers have gone a step further than just hacking important documents of businesses or institutions and started hacking the phones of companies. Android and iOS systems started getting hacked. The most frequently hacked smartphone is Samsung, while iPhone is second, Xiaomi is third, Huawei is fourth and LG phones are fifth. The rate of hacking of the last three smart phones is not low because their security system is very good, but the main reason for this is the low use of these phones. So far, according to the data, Verizon, AT&T, T Mobile, and Dish are the companies that have been the first target of hackers. 

According to hackers, if they have trouble hacking any phone, it's Google phones, with the Pixel 6 series at the top. In August 2007, a seventeen-year-old boy, George Hotz, claimed that he had opened the security lock of the iPhone without a SIM, after which the series of hacking of the phones began. Here I will give a tip to my readers that if they dial the code *#21# on their iPhone, they can know how much their phone is under your control at that moment


According to a statistic, the iPhone is the most hacked phone by far. In this hacking, any hacker can directly access the iPhone, see the apps running in it, copy data, steal all the important things from the picture gallery, calendar and notebook. Hackers mostly use Safari to hack iPhone, or rather Safari is used as a gateway for iPhone hacking.


The hacking that started with the computer has reached the hacking of mobile phones through cyber attacks and now it has reached the hacking of other apps, especially WhatsApp. It is raising many questions.

Why do hackers hack WhatsApp? Is it just to get information or are there other purposes, if WhatsApp is a medium for information and communication then criminals will also use this medium for their own purposes. 



In the discussion, information sharing related to terrorism may be sought to be accessed. Will the states hire government hackers or will all private hackers support the states! .

Somewhere fake and false hackers have come in this field. There is now a long list of hackers and information sellers on social media who are fooling the common people by saying that they will provide accurate and truthful information. I saw the ads of some so-called hackers and tried to contact them, but there was nothing but lies and deceit. Pakistan has a cybercrime department, but so far the expected cybercrime benefits have not been realised.

 

According to a data, there were 8492 cases in Punjab in 2022-23, out of which the most cases were related to financial fraud.

If we talk about WhatsApp, then hacking this app is considered to be the most favourite at this time. So far, the data of 500 million users in more than 80 countries has been hacked and made public in WhatsApp hacking. WhatsApp hacking is considered as a very golden opportunity for earning. Because of its cost, a hacker earns anywhere from $10,000 to $3 million per year just from hacking WhatsApp.

Whether hacking is a crime or a moral turpitude is for governments and states to decide, but we have to decide whether those who commit it are making crores of rupees by defrauding the common people through public advertising, are they mafias, do they have Where do foreign sims and local easy paisa numbers come from? . If this is an organised crime, what steps have been taken so far to eradicate it? Can every fraud person cheat any simple person by becoming a hacker in the name of hacking? The answers to these questions must be given. 

@ahmadsaghirpk7


Comments

Popular posts from this blog

“800 missiles fueled… the countdown to chaos has begun — is Israel ready?” πŸ’£πŸ”₯

Who is Supporting Mossad from Within Iran?

Has Pakistan achieved the potential to become a digital power?