Skip to content

zer0lightning/Account-Security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 

Repository files navigation

How to secure your accounts after you got compromised.

“What to do when you are compromised and got your account back. Assume all your devices are still compromised and key logged. These steps are post-compromise for regular average users.”

Summary

  • Install a fresh operating system and fully update it.
  • Have a Antivirus Total Security with Firewall
  • Install uBlock Origin and Firefox/Chrome Browser
  • Use a Password Manager.
  • Register new email for specific purposes.
  • Use a Password Manager to manage your credentials.
  • Use Two Factor Authentication (2FA) and isolated email accounts.
  • Enable login notification for suspicious activity.
  • Spotting Phishing: https://identity.utexas.edu/everyone/spotting-a-phishing-email
  • Don't share informations regarding your personal accounts that shouldn't pe public.
  • Use VPN on public networks.

Baselining

  • List all Devices that you are using including Phones, Computers and Tablets.

  • List all the accounts that you have, where are they login.

  • How much public information is available through public searches.

  • What are your attack surfaces.

  • How are these accounts connected.

Hardening

Computer

Malware Scan

Run a malware scan.

Install paid Antivirus with Total Security.

Mobile Devices

Uninstall some unused apps.

Router

In some cases, the attacker is closer than you think. - https://www.forbes.com/sites/thomasbrewster/2020/02/28/fbi-warned-of-fraudsters-paradise-up-to-130000-hacked-asus-routers-on-sale-for-a-few-dollars/#20c8c7222009

Change Password on your Email Accounts

  • Generate Random Different Passwords.

  • Use Password manager like Bitwarden or LastPass.

  • Use unique security questions and answers. Your dog's name are public information.

Email Isolation

  • Create three email address (Social, Banking, Personal)

  • Example: [email protected], [email protected], [email protected]

  • The public email shouldn't be connected to important accounts.

  • Password Backups should be printed and saved in a vault, and in an encrypted container.

  • Recovery Email should be private and as secure as the other emails.

Phone Security

  • Enable Pin, Password or Fingerprint.

  • Enable Disk Encryption.

Sim Card Security

Sim Card Swapping - A SIM swap scam is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message or call placed to a mobile telephone. https://www.cnet.com/how-to/sim-swap-fraud-what-it-is-why-you-should-care-and-how-to-protect-yourself/

  • Enable Sim Card Pin.

  • Strong password for your Phone Online Account with Two Factor.

  • Call phone service provider and put a note.

  • Don’t allow number porting unless done in store with two pieces of ID.

  • Don’t allow sim card swapping and new activation unless done in store.

  • Create a unique security question, add note prevent guessing.

Email Security

Read: https://twofactorauth.org/

Renew Backup Codes

Compromised backup codes can still be used to gain access to an account, without having access to 2 Factor Devices like SMS or email. An attacker can use this, get back in. - https://www.techrepublic.com/article/bypass-two-step-authentication-with-app-passwords/

2 Factor Authentication

Two Factor Authentication can prevent further access to an account if setup properly. https://nakedsecurity.sophos.com/2018/12/21/more-phishing-attacks-on-yahoo-and-gmail-sms-2fa-authentication/

Enable Two-Factor Authentication (2FA)

Enable Two-Factor Authentication (2FA) using Duo Mobile

Persistent Backdoor Access

Email forwarding generically refers to the operation of re-sending an email message delivered to one email address to a possibly different email address(es). For example: Attacker can force your Facebook Account, that reset link will be forwarded both to your account and the backdoor email. https://www.impsolutions.com/news-and-events/blog/how-office-365-email-hack-cost-millions-and-how-you-can-avoid-same-fate

Stop Automatic Email Forwards

Sign out of Email From Multiple Devices

Failing to revoke any active sessions can still give the attacker a foothold in that account. Some services keeps the session even after changing your password.

Delete Email Application Passwords

Application passwords that are generated while attacker have access to your account enables him to login to an 'email' app with that account. Bypassing 2 Factor all together.

Gmail – Remove App Passwords

Yahoo - Revoke App Passwords

Apple – Remove a device from the list.

Social Media Accounts

Allowing indexing of your social media page reveals some important more information that you want to, also adjust your privacy controls.

Disable Search Engine Indexing on your Social Media Accounts

Adjusting Privacy Settings

Facebook

End all Facebook Sessions

Revoke App Permissions

Snapchat

Forget Snapchat Linked Device

Revoke Connected Apps

Instagram

Remote Logout

Remove Connected Apps

Using Public Wifi

Banking Credentials

If your banking credentials got compromised and identity is stolen.

  • Visit the bank and ask for a new card, put a note and inform them about the incident.

  • File a police report right away.

  • Change password and use the newly created bank email.

  • Enable Two Factor (2FA).

  • Set unique security questions and answers.

Enable Credit Card Monitoring

Credit Freeze

Releases

No releases published

Packages

No packages published