The cases presented below are a couple of example of classical cyber-attacks that are conniving, stealthy, and almost ingenious.
- Case 1: While surfing the web at home, the user of a hacked PC was prompted to create new accounts in order to use her own Wireless Access Points (WAP). Not knowing what was happening behind the scenes, the victim would use a common username or email address along with a password that was used for several other online accounts. The result: the hackers gained complete and unblocked access to her email, Facebook, Twitter, Pinterest, or even online banking site.
- Case 2: On the premises of a Starbucks coffee shop, hackers positioned a Wi-Fi hotspot and disguise it so that it appears to belong to Starbucks. Attackers then redirect victims to frequently used websites that were actually modified or fake to capture login credentials or deploy keylogging malware to harvest personal identity information.