Pin Me

Introduction to Identity Attacks

written by: Ashwin Satyanarayana•edited by: Ronda Bowen•updated: 7/4/2011

Have you been Impersonated online? Do you understand the repercussions of an impersonation? Has your identity ever been attacked? Apart from all the usual threats that might emanate out of such an attack, we also have the possibility of this resulting in a reputation soiling attempts. Read on :

  • slide 1 of 1

    Hackers worldwide have evolved into adolescents and teens looking for some nerve-tingling fun of having fooled their next door neighbors and hacking into their emails. It is now a corporate dread. A matter of war unleashed upon unsuspecting individuals and companies and translating into lost identities, lost financial data and of course, lots of money.

    With a low threat level, and a medium Incident level, Identity Attacking is the primary tool for promoting anonymous malicious activities and by pass some of the common security features. Identity Theft Attacks are some of the most common phenomena today and if you don’t prevent yourself or your company from this, you could be the next one to woken up from a nightmare which is unfortunately real.

    Contrary to what most people seem to think, hackers aren’t suffering from any Attention Deficit Disorder (ADD), they are discreet as a wild cat on a hunt. Every attacker hopes to go on a hacking spree without being traced, identified and of course, caught. He strives to do that by changing his identity before launching his attack on his unsuspecting targets. The fact that this mysterious coterie of attackers want to remain hidden and operate discreetly, we have what is now being called as an Identity Attack which these hackers exploit to hijack information, systems or networks.

    Identity Theft Attacks can be used for impersonation, gaining illicit access into target networks, execute anonymous attacks, embezzling sensitive corporate data and many more malicious attacks.

    The spread of this type of attack is so rampant that the users (individuals and corporations) have realized the need to keep themselves secure (at least, I hope that are reading this now). Typically, there are 4 ways to combat a possible Identity Theft Attack on your network/computers/system/self.

    1. Using Proxy Servers
    2. Proxy Bouncing
    3. IP Spoofing
    4. Onion Routing

    Of the 4 mentioned above, using Proxy Servers and IP Spoofing happen to be the most employed combat systems for Identity Theft and Identity Attacks. The Identity Theft Attacks are Particularly Nasty because of the simple fact that these attackers not only ensure that they go unapprehended, but might actually push the blame on to someone innocent by throwing about these little red herrings and by acts if impersonation that can throw investigators off track.

Identity Attacks

All you ever wanted to know about Identity attacks, how they are caused, the various counter measures available to help save ourselves from such an attack.
  1. Introduction to Identity Attacks
  2. Understanding Identity Attacks: Proxy Servers