Hovah Yii
Recently, I experienced the unsettling and distressing event of having my Hotmail account hacked. This incident not only disrupted my daily life but also provided me with valuable lessons on cybersecurity and the importance of vigilance in protecting personal information online. Here's what happened, what I learned, and the steps you can take if you find yourself in a similar situation.
β
It all started on the morning of Tuesday, May 28, 2024, at 4:43 AM, when I received an email from an unknown sender. The email contained an old password associated with my Hotmail account, a password I had reset three months prior. This immediately raised alarms, as it indicated that my old password had been compromised.
β
1οΈβ£ Verification and Security Checks:
2οΈβ£ Reporting the Incident: I decided to report the incident to the Cyber999 Cyber Incident Reference Center. Although I initially faced issues with the online form, I sent a detailed email to cyber999@cybersecurity.my. Hereβs a template you can use:
β
Dear Cybersecurity Team,
I am writing to seek urgent assistance regarding a concerning email I received, which may indicate a potential phishing attempt or security issue with my Hotmail account.
Details of the Situation:
Email Address: YourEmail@hotmail.com
Date of Incident: [Insert Date]
Description of Issue: I recently received an email from an unknown sender who shared an old password associated with my Hotmail account. I had reset this password three months ago. This email has caused me significant concern as it indicates that my old password may have been compromised.
Actions Taken:
- I verified that I can still access my Hotmail account and confirmed that my current password is different from the one mentioned in the suspicious email.
- I have not clicked on any links or downloaded any attachments from the email.
- I have scanned my devices for malware and viruses to ensure they are secure.
Concerns and Questions:
- I am concerned that my old password may have been leaked in a data breach, and this email could be part of a phishing attempt to gain further access to my account.
- I would like to understand how the sender managed to send me an email containing my old password.
- I am seeking guidance on additional steps I should take to secure my account and prevent any potential security breaches.
Please advise on the best course of action at your earliest convenience. Your expertise and prompt assistance in this matter would be greatly appreciated.
Thank you for your time and support.
Sincerely,
Your Name
Contact Number
Email Address
β
I was pleasantly surprised by the prompt response from Cybersecurity Malaysia. They provided detailed instructions on securing my email account and addressing potential vulnerabilities:
β
1οΈβ£ Addressing Email Security Issues:
2οΈβ£ Changing Passwords and Enabling Multi-Factor Authentication (MFA):
3οΈβ£ Running Security Software:
4οΈβ£ Lodging a Police Report:
β
1οΈβ£ Monitor Device Activity:
netstat -ano | findstrΒ
"ESTABLISHED"
# Check details of a specific process (example PID: 24356)
tasklist /FI "PID eq 24356"
# Terminate the process if suspicious
taskkill /PID 24356 /F
β
β to identify suspicious connections and terminate them using appropriate commands.
β 2οΈβ£ Set Up Two-Factor Authentication (2FA):
3οΈβ£ Use Strong Passwords:
4οΈβ£ Check for Data Breaches:
β
Although this incident was unfortunate, it reinforced my belief in the importance of cybersecurity measures. The quick and efficient response from Cybersecurity Malaysia showed me that there are resources and people ready to help in times of need. Always be vigilant, take proactive steps to secure your accounts, and never hesitate to seek professional assistance when faced with a cyber threat.
β
Understanding the broader context of cyber attacks can help emphasize the importance of cybersecurity:
By sharing my experience, I hope to raise awareness and help others protect their digital lives from similar attacks. β
β
Hovah, in his final year at University Malaysia Pahang studying Bachelor of Engineering Technology (Electrical) with Honours, is deeply involved in IoT research. A passionate reader and programmer, he has honed his skills through years as a student mentor at Chumbaka and as a freelance developer. Proficient in Next JS and Flutter frameworks, he has developed over seven web and two mobile apps, and contributed to backend code for business websites. Currently, he's collaborating with Go-Emerge Sdn Bhd on developing leica-store.my.