Blog Layout

Three Hackers Walk Into a Cafe... and Facetime Me

From the words of a Walker Employee...

"I Facetime with my sister and two-year-old niece all the time. It’s one of my favorite uses of technology, but when I answered their call on a recent Tuesday night, I was greeted by three strange men waiving at me from an internet cafe. It was a real shock. I hung up, they called again. Each time, my sister’s photo came up on the screen which made it upsetting. I wondered, in an old-fashioned way – are the lines crossed? Could phone lines even be crossed in the age of cellular technology?! Then, I started to get texts and threats from her phone number. I couldn’t believe my sister or I had been hacked. I emailed my sister to not make contact with me over the phone for the time being. We both tested some things and turns out it was me they were after. A bit rattled, I began to dig in. "

How Was This Even Possible!?

"Come to find out, these hackers spoofed my sister’s old work number which was still in my phone under her name. They had enough information to piece together our relationship and then make easy contact with me because, of course, I would answer her call."

But Why Was I Targeted?

"A friend of mine in digital forensics ran my information for me. She came back with many hits for my information on a variety of stolen lists on the dark web. I suppose I expected some of my info to be out there; after all, I was involved in the Equifax data breach -- but who wasn’t? The surprising thing were the accounts that I never think twice about that were out there. 

My Pinterest account? What could be useful to a hacker on that? My inspiration for Thanksgiving decor?! My LinkedIn account? OK, sure, my name and job history are posted, but I don’t make purchases on their platform – doesn’t seem like valuable information worth stealing. My Twitter account? I barely use it. What are hackers going to do, troll people under my name? The value of these accounts was confusing to me. Regardless, here were three of my accounts with logins and passwords posted online from less publicized data breaches."

The Deep, Dark Web.

"Until this experience, little did I know that there are people working to package and sell digital identities online. They are not just looking for your name and credit card on one list from a big breach; they are looking to compile your name and personal information across many stolen lists and multiple data breaches. They are packaging a more robust digital profile to sell on the deep or dark web. These profiles are worth decent bucks because they are real identities, not just one-offs on a leaked list. The more accounts and information per identity, the more lucrative the sale.

I am relaying my experience here not to get into the technical aspects of how these hackers got in. I can’t know for sure how they pieced enough things together, but I learned a lot while trying to uncover what may have happened and re-secure my phone and online accounts."

Protect Yourself.

Here are some steps you can take proactively to protect your online identity:
  • Turn on Multi-Factor Authentication (MFA) for all of your accounts! Start with your email and banking accounts. Then, yes, do it for Pinterest, turn it on for LinkedIn, Facebook, Instagram. Don’t assume that an app or account isn’t valuable in some way to a hacker.
  • Change your passwords regularly! Make sure they are complex.
  • Do a review and deep clean of your online accounts. Don’t use Twitter anymore? Cancel it! Remember that blog you started years ago and abandoned? Delete it!
  • Purge the apps on your phone that you are not regularly using.
  • Check your credit report. If you are involved in a data breach, sign up for their free monitoring offer or pay for your own service. (I know, I know, that’s another account to manage!)
  • Rinse and repeat.

Modern Life.

Security – whether for personal or business -- is constantly changing. Just because you set up a strong password when you first joined Facebook, doesn’t mean that your work ends there. Review your online presence at least annually and add new security tools as they are developed. This is what’s required of us now in our modern, digital lives.

written by:

Diana Sutcliffe

Diana Sutcliffe, Billing & Contracts Manager at The Walker Group, has a background in finance and business operations. Her wide-ranging interests include IT and cybersecurity news, current events and applied information technology. She is especially interested in the impact of technology on modern, human life.


More Recent News

Perpetual Purpose Trust-Ownership Webinar, The Walker Group, Todd Bailey, Jessica Rich, Kate Emery
September 28, 2024
In 2023, The Walker Group made history as the first business in Connecticut to transition to a Perpetual Purpose Trust (PPT)-ownership model. This innovative structure ensures that the company's values, mission and culture are preserved as it transitions beyond its founders, safeguarding them for future generations. In this insightful webinar presentation, we explore key topics such as: ~ What it means to be a Perpetual Purpose Trust (PPT)-owned company ~ Why The Walker Group chose this unique model ~ The legal and financial considerations of adopting a PPT ~ The impact of a PPT on employees and the community This session features The Walker Group's co-CEOs, Jessica Rich and Todd Bailey, along with founder Kate Emery, and expert insights from Jenny Kassan, President of The Kassan Group. Watch the webinar recording to learn more about this progressive, new approach to business succession!
Jessica Rich, co-CEO of The Walker Group
September 24, 2024
The Walker Group is proud to announce becoming Connecticut’s first Perpetual Purpose Trust (PPT)-owned company. This innovative ownership model allows us to prioritize a social mission that benefits our employees, clients, and community. co-CEO Jessica Rich discusses this transformation and its positive impact on Friends with Employee Benefits: A OneDigital Podcast. Tune in to learn more about how our purpose-driven approach is shaping a brighter future!
The Walker Group featured in Nick Romeo’s book, “The Alternative”
By The Walker Group June 17, 2024
The Walker Group featured in Nick Romeo’s book, “The Alternative”
Share by: