iPhone 또는 iCloud가 해킹 된 경우 수행 할 작업

업데이트 됨
Cover image for: iPhone 또는 iCloud가 해킹 된 경우 수행 할 작업

Criminals don't always target high profile accounts. Phishing, scams, and social engineering can be used for purposes from identity theft to fraud and access to your employer’s database. The type of information a criminal can steal -- as well as the technology through which they can steal -- have radically changed over the years. Most specifically the threats, information types, and technology currently targeted are cloud-based, and via mobile devices, which can be intercepted, tracked, or stolen.

There’s a huge grey area between cyber-criminals and white-hat hackers, who are usually hired by big tech companies to spot and report encryption and security flaws. Hackers aren't always geniuses, but it’s a common misconception that often prevents both regular users and companies from taking the right measures to prevent cyberattacks or respond appropriately. The truth is that insecure data is relatively easy to hack.

Anybody can be a target to hackers, and the impact of being hacked can be far-reaching, including:

  • identity theft
  • data breaches
  • loss of money or valuables
  • blackmail threats
  • reputation damage
  • release of sensitive information

Hacking, phishing, and data theft can be avoided as long as the target knows how to protect themselves. And as much as we love helping users recover their data with iPhone Backup Extractor, we’d rather help you to avoid a data breach situation in the first place.

To keep your data safe, we wrote up a comprehensive article on how to protect your iPhone, Photos and iCloud account, and another on how to prevent companies from legally harvesting your data.

해킹당한 경우해야 할 일

If you’ve been hacked, you'll need to follow these steps:

  1. Contact the police. If someone claims they've stolen your data or tries to blackmail you, it's likely a criminal offence. If someone is bullying your child online or has tried to get in touch with them in any way, contact the police and offer them all the data required. Ask your child whether they gave away personal data (address, family members’ name, school) and do your best to understand the full scope of the issue.

  2. Take back your hacked account. The vast majority of online services have various protection methods to prevent users' from losing data or access to their accounts.

  3. Check if the account recovery options have been modified. Hackers may use various recovery options to make sure they can regain access to your account. Remove any suspicious recovery methods and update your account recovery options.

  4. 해킹 된 계정과 관련된 보안 질문을 업데이트하십시오 .

  5. Activate two-factor authentication (2FA) on your devices or on your credit card. Any hacking attempt will be blocked before the start if you implement this security feature.

  6. Check all associated accounts. If you discover a hacked account and you change the password, this doesn’t mean your data is safe. You need to check all accounts associated with the hacked email because all of your associated accounts are vulnerable. For example, someone could access your cloud account if is associated with the hacked email. Make sure you also update these credentials. Similarly, if you use the same password for multiple accounts, change the password for all accounts that use this password, not just your hacked account.

  7. De-authorize apps able to access these accounts. Sometimes an infected app is responsible for the hacking. By removing them or disabling the access to the hacked account you can avoid future hacks.

  8. Block your credit card. If your credit card data has been exposed or if your account was used by a hacker, block it as soon as it possible. Based on a filed police report, your credit card can be blocked by your bank.

Once you've taken these immediate steps, look into protecting your accounts and devices from new hacking attempts.

How to recover your data after you've been hacked

If you've lost your data following a hack, there are a number of things you can try to get it back.

법 집행 및 안티 바이러스 산업의 노력 덕분에 일부 이전 랜섬웨어 소프트웨어로 암호화 된 데이터를 무료로 잠금 해제 할 수 있습니다. noransom.kaspersky.com 에는 도구 목록이 있습니다. 일부 범죄자는 유료 "잠금 해제"도구를 유료로 판매하거나 컴퓨터를 다시 감염시키는 무료 도구를 제공하므로 평판이 좋은 소스에서만 소프트웨어를 다운로드해야합니다.

If the ransomware is not one for which there is an unlocking tool then you don't really have many options. If you have a backup of your data then the best option is usually to wipe your computer and restore from the backup.

Alternatively, if you have the System Restore (Windows) or Time Machine (macOS) options active, you can try to recover the encrypted data with a restore. On Windows, you can also try to retrieve your data using ShadowExplorer which is a tool that searches for shadow copies of your files and allows you to save them. This doesn't always work as newer ransomware will also seek out and delete the shadow copy backups as part of the infection process.

무엇을 하든지 항상 안티 바이러스 프로그램을 사용하여 악성 소프트웨어를 제거했는지 확인하십시오. 암호화 로커 랜섬웨어를 제거하려고하면 암호화 된 데이터가 모두 손실 될 수 있습니다.

결론

약간의 예측만으로 많은 사이버 보안 위험을 피할 수 있습니다. 비정상적인 링크를 클릭하는 것부터 실수로 해커에게 데이터를 제공하는 경우 평판, 수입 및 안전이 위험에 노출 될 수 있습니다. 자신과 가족을 더 잘 보호하려면 다음 권장 사항을 따르십시오.

어떻게 도와 드릴까요?

지원 팀이 도와 드리겠습니다!

근무 시간은 월요일부터 금요일, 오전 9 시부 터 오후 5시 (그리니치 표준시)입니다. 시간은 현재 9:56 오후 GMT입니다.

우리는 1 일 이내에 모든 메시지에 답장하고자합니다.

지원 섹션으로 이동 › 문의하기 ›
우리의 멋진 지원 팀

이 기사를 개선 할 수 있습니까?

사용자의 의견을 듣고 싶습니다. 전자 메일을 보내지 말고, 의견을 남기거나, 트윗하지 마십시오. @reincubate?

© 2008 - 2021 Reincubate Ltd. 판권 소유. 영국과 웨일즈에 등록 #5189175, VAT GB151788978. Reincubate® 및 Camo®는 등록 상표입니다. 개인 정보 정책 & 자귀. 런던에서 Built로 지어졌습니다.