TPH: Hacked!
Dear TPH,
I have an email address provided by my Internet service provider
which I use regularly. Recently I found out that my email
account has been hacked. The hacker sent me an email through
my account threatening that he will forward my personal emails
to other people. I changed my password but he still manages
to send me emails from my account. What should I do about
it?
-R.P.
Dear R.P.,
By the time you woke up, brushed your teeth, had your morning
tea, and went down to buy The Sunday Times today, the hacker
who gained access to your account would have read this article
on the Online Edition of The Sunday Times in the wee hours
of the morning. He would have forwarded all the letters you
got from your ex-boyfriend to your present boyfriend and the
sexual harassment complaint you wrote against your boss to
all your work mates. And frustrated by my attempt to help
you, he would have also hacked into my personal email accounts
and printed leaflets out of the latest set of poems I wrote
and mailed myself!
Anyway, don’t panic just yet. If you
can still access your email account and change your password,
this whole episode is most likely a hoax. Let me explain.
Remember the last time you sent your friend
an e-card for her birthday? No? What…? You forgot her
birthday??? At least you remember the e-card you received
from her don’t you? All she would have done is put her
name and email address as well as your name and email address
on her chosen e-card at the e-greetings website and pressed
‘send’. When you received the card, it would have
appeared as if she actually sent the card through her email
account!
It is possible for someone with a basic
knowledge about how email works; to build a webpage or a simple
‘home-made’ application with C# or VB.net that
can send and receive emails. These applications can send emails
under any given name and email address.
This is because the Simple Mail Transfer
Protocol (SMTP) that is used to send emails does not require
users to authenticate themselves before sending an email.
In fact it is very difficult to enforce such an authentication
process for practical reasons. Therefore, it is possible for
anyone to send emails under a false pretence.
There is a different procedure for receiving
emails. When someone sends you an email, the domain of your
email address points to your ISP’s mail server, where
the email you receive is routed. Only you have access to them
with your username and password.
If the ‘hacker’ is not so sophisticated,
it may be possible to trace the email you received to its
originating IP address and thereby to an approximate geographic
location from which it was sent.
This can reveal evidence about whether your
email account was actually hacked. Next week, I will explain
how to trace an email to its point of origin. Until then,
it is best that you inform your ISP about the incident who
may be able to check the access logs to your account and confirm
if any outside sources have accessed your account and if so,
they can take necessary steps to prevent it from happening
again.
-TPH |