Everyone knows that one of the most common sense things you can do to make your home secure is to lock your doors and windows before you go to bed or when you are away from home. But surprisingly, many people fail to lock the front door securely when it comes to their email accounts.
I previously discussed making your online life more secure by using more secure passwords. In that article, I pointed out the top 25 Worst Passwords that you can use, but I still regularly find people who choose to use an easy to remember password rather than a secure password.
As an email host provider, I see email hacking attempts everyday and the one thing they all have in common is that their success is directly dependent upon users who use weak passwords. Hackers are smart and they pay attention to what works.
For example, have you ever wondered why you still get emails from Nigeria that want you to funnel money out of the country, but you have send them $199 to get the process started? The reason you still get those sorts of email messages is because they work! There are still people out there who fall for this scam every day. And as soon as this scam begins to provide no rate of return, the con artists will come up with another scam just as profitable.
Hackers are no different. They find something that works and they stick with it. I freely admit that I have struggled with the prospect of posting the information that I plan to include in this message, but at the end of the day, I would rather post this information and perhaps make email hackers change their strategy than to withhold key information that can make you safer online.
So, I guess the first question you might have is “Why would anyone want to hack my email account and what does ‘hack’ mean any way?”
The word “hack” is a term that has always meant obtaining access to systems you do not have permission to access. Back in the day, hackers would gain access to the telephone company computers via the telephone in order to make long distance calls for free. With the birth of computers connecting via telephones, the goal was to gain access to mainframe computers for prestige, bragging rights, or pure greed.
In the 1980’s and 1990’s, there were three movies made that glorified or at least put Hollywood glamor into hacking: 1983’s “WarGames“, 1992’s “Sneakers” and 1995’s “Hackers.” All of which are very entertaining movies and I can highly recommend any or all of them if you want a date night at home with your sweetheart and big bowl of popcorn. However, each one of them in their own way glorify hacking in ways that simply are not grounded in reality. Hacking is not sexy and it certainly isn’t glamorous. It may have started out with white-hat hackers (those that intended no harm) and black-hat hackers (those who intended break and steal things), but as far as I’m concerned all hackers today are interested in one thing and one thing only: money.
An email hacker wants to gain access to as many email accounts as possible to:
- Send vast quantities of spam emails to generate sales for shady products
- Send vast quantities of phishing emails to gain access to electronic accounts such as email, eBay, or others.
- Generate traffic to various websites to increase their click-counts to earn more link affiliate money.
- Deliver viruses to computers in order to take control of those machines and use them to do all of the above.
So, now that you understand the motive; how do you lock the front door to your email account and possibly prevent your identify being stolen? It is actually pretty simple. You’ve got to learn how to work the lock!
Learn How To Work The Lock
The first step to securing the lock on your email account, is understanding what a lock that is easy to pick looks like. I provided a list of the worst 25 passwords in an earlier post. But today, I want to show you what a hack attempt really looks like and the passwords that an actual hacker used on a non-existent email account on our server. Just for the record, our server is configured to automatically detect break-in attempts and shut down those accounts under attack. In this case, since the hacker was going after an account that didn’t actually exist, we were able to track the complete attack.
The attack started at exactly 5:00am and was over by 5:11am. In those eleven minutes, the hacker tried 367 combinations of passwords and different variations of the email account. (For the sake of this article, let’s assume that the email account being attacked was bubba@myownemail.com.)
Here’s a list of unique passwords that the hacker used repeatedly:
0 3.1415926 123 1234 12345 100200 110110 111111 112233 121212 123123 123456 123654 147258 159357 | 222222 333333 520520 521521 555555 654321 666666 789456 888888 999999 1234567 7654321 5201314 5211314 567890 | 6789012345 7777777 12345678 88888888 123456789 147258369 aaaaaa angel anthony daniel iloveyou internet jennifer jessica | mail123 mail1234 mail123456 mail666666 mail888888 master michael michelle mishael password pepper qwerty sunshine welcome |
bubba bubba123 bubba1234 bubba123456 bubba666666 bubba888888 bubba1960 bubba1961 bubba1962 bubba1963 bubba1964 bubba1965 bubba1966 bubba1967 bubba1968 | bubba1969 bubba1970 bubba1971 bubba1972 bubba1973 bubba1974 bubba1975 bubba1976 bubba1978 bubba1979 bubba1980 bubba1981 bubba1982 bubba1983 bubba1984 | bubba1985 bubba1986 bubba1987 bubba1988 bubba1989 bubba1990 bubba1991 bubba1992 bubba1993 bubba1994 bubba1995 bubba1996 bubba1997 bubba1998 bubba1999 | bubba2000 bubba2001 bubba2002 bubba2003 bubba2004 bubba2005 bubba2006 bubba2007 bubba2008 bubba2009 bubba2010 bubba2011 bubba2012 bubba2013 |
There are several things we can learn from this list:
- Who knew that hackers understood ∏?
- The number patterns are fairly obvious, but if you are going to use a password that is all numbers, be sure to use a unique number that isn’t known to everyone, ie: see #1.
- Note that there are several of the 25 worst passwords being used by this hacker. Proof once again that those passwords are terrible choices and perhaps proof also that the list of the 25 worst are actually used.
- The individual names like daniel, jessica and michael surprised me at first, but upon reflection, the only reason I can think that this hacker is using these names is that they are very popular names and therefore might be the name of the owner of the email account, one of their children or grandchildren.
- The most interesting grouping are those passwords that start with the word “bubba.” Remember that we said earlier to assume that the account under attack was bubba@myownemail.com. (We replaced the actual email account with bubba to hopefully confuse any future hackers.). The “bubba” series is actually everything to the left of the ‘@’ symbol along with every year from 1961 to 2013. The idea is to combine the name of the email account with the birth year of either the owner of the account, their children or their grandchildren.
The method of trying a series of passwords repeatedly is called a dictionary attack. The hacker has compiled a list of passwords that have been successful in the past, and they are constantly refining and changing their dictionary of passwords on the basis of what works. To make matters worse, hackers communicate with each other via the internet and share their dictionary of passwords with each other. So, while you might consider updating your password once in a blue moon, a hacker is refining his list of passwords daily if not hourly.
Ultimately, the key to securing the front door of your email account is to try to think like a hacker. A hacker depends upon the average person picking the first password that comes to mind. A child’s name, or a birthday. All you have to do to frustrate a hacker is to choose not to play his game. And it really doesn’t take much to make a hacker decide to move along to someone else, just make his job as hard as possible.
Want to use a birth date in your email password? Just choose one of some famous person or an ancestor born 200 years ago. Do you remember the date of your your first kiss, or the birth of your dog, or even the death date of a favored relative? Then feel free to use them, but break up the numbers with letters in-between. Or better yet, reverse the date instead of using 01/01/1998, try inserting letters like “d89C91b10A10”.
You can even use an ancestor’s middle name as part of your password as long as it was unique enough. For example, my grandmother’s name was Ethel Odie. No way to forget that name! And, no, I don’t actually use that name, but it makes my point very well.
Here’s a good rule of thumb: If you want to use any thing for a password that someone might find on Facebook or MySpace or a personal webpage or the yellow pages or a church directory, forget it and try something else. For example, your address is not a good starting point, but perhaps address of the hospital where you were born might work.
Here’s another good rule of thumb: Create a password for your email account and then throw it away and pick another. Rinse and repeat several times. By the time you’ve created your fifth or sixth unique password, you’ll probably have a pretty good password.
The trick is to create a password and then try to think like a hacker. Don’t assume that a cute password is secure, in fact, you should assume that a cute password can be broken faster than any other. Pretend that your email password is just like the front door to your house. Do you have a deadbolt on your front door? Then, create a password that is as secure as the deadbolt on your front door.
A really good password should have the following traits:
- It should be at least eight (8) characters or digits long. In fact, the longer the better. I’ve heard of some people using software on their computer that allows them to generate random passwords with lengths of 50 characters or more.
- Your password should contain a mix of letters and numbers.
- Your password should have at least one upper case letter.
- A great password includes symbols like #*$)( or !.
Create a password with all of these traits, using information that is not accessible to anyone or published anywhere and you’ll be well on your way to locking the front door of your email account.
[Re-posted from TPCQPC.com]