Cyber Defense Magazine – August 2019

(Nora) #1

  • if the hackers deal with the professional tools, they can track any email account either it is assured or
    not.


The concept of untraceable email


The first indications that we could cope with the untraceable email correspondence would appear
approximately 30 years ago with the development of the Tor’s project. Indeed, there are no known
hacking tools that would offer the opportunity to the ordinary cybercrime groups to stalk the onion email
accounts. The fact is those accounts are not with the well-designed access control and so many bad
guys could try to approach the accounts simply obtaining the login details or guessing them. The Tor is
the system that would offer us the chance to lead so confidential communications providing us the option
to deal with the great amount of security, privacy and anonymity. The similar case is with the email data
transfer and those solutions would also cope with the good level of intractability. As it’s well-known, the
Tor is the environment being suitable for the both – good and bad guys – and it would use so called the
role-based access control. That would mean that anyone getting the login information can approach any
account and not only that. Namely, anyone with the admin or super user permissions could investigate
any account being from the lower priority, so far. It’s quite clear that so many defense forces would deal
with those products and they would be in position to see what anyone being the part of the Tor’s network
including its email account does within such a surrounding.


The Darknet and security, privacy and anonymity


In the reality, there are a plenty of the Darknet solutions being accessible through the deep web. Those
systems would go far more below the surface of the regular internet and offer so many secret details.
Such an environment would be so handy place for the hackers, cyber criminals, activists and even
defense professionals. The Darknet by itself could be the real oasis to many dealing in so illegal manner,
but in our belief – it would still be controlled by the good guys. So many defense and intelligence agencies
would use the findings being available through the Darknet in order to understand the malicious actors’
behavior, motives and actions, so far. The point is the Darknet would provide some scale of security,
privacy and anonymity, but that sort of protection could get managed by the defense services that would
use such an infrastructure in order to attract the bad guys and lately investigate and remove them from
the web. As it’s quite well-known, the cyberspace is so overcrowded spot and the places with the huge
concentration of the people could get suitable for committing any kind of the criminality. The similar
situation is with the Darknet and the fact is the one who has the control over such an environment would
take advantage over the rest.


The frauds being possible applying the email communications


In the practice, so many email accounts would be the cloud-based ones and there would be present
some possibilities to track those spots. The point is so many confidential information would be exchanged
through the email communications and someone only tracking some private or business correspondence
could get in possession of so valuable details. It’s the quite common case that the open documents would
get sent through the email correspondence and that’s the pretty big advantage to the hackers who could
put under the surveillance the entire small businesses dealing with so poor cyber defense and making
the good incomes per an annum. In other words, someone doing the cyber espionage could obtain so
significant details and use them to trick someone who got absolutely no idea that those data are stolen
and can serve for the financial benefits only. We believe that it’s quite obvious that so many fraudsters

Free download pdf