Privacy Policy Banner

We use cookies to improve your experience. By continuing, you agree to our Privacy Policy.

Developments are related to the data that was leaked as a result of the penetration – Tel Keel Arab

Developments are related to the data that was leaked as a result of the penetration – Tel Keel Arab
Developments are related to the data that was leaked as a result of the penetration – Tel Keel Arab
-

The “Telkl Arabi” website learned from reliable sources that the money of a number of Moroccans was stolen through the “Glovo” application; Where they reached text messages stating that deductions ranged between 5 and 10 dirhams that have been transferred from their accounts.

This comes in the context of announcing an unknown group “Jabrot Al -Jazairia” about the penetration of the Ministry of Employment website and the leakage of employees’ data.

For his part, Younis Al -Sukouri, Minister of Economic Integration, Minor Contracting, Employment and Talents, confirmed that the Ministry’s website was actually subjected to a cyber .

Al -Sukouri’s stated that the matter is related to an institutional website, and that no personal or data has been violated, and no database was subjected to hacking.

In this context, the information analyst, Hassan Kharj, stated, in a statement to “Telelal Arabi”, that “the data that has been hacked is not easy. What I regret is the way to deal with the topic, given that what has been hacked is a news site, while the information that was leaked by the hackers includes all the information related to the person, from the full name, to the age, to bank data; Reaching that person. “

Outager stressed that there is a close relationship between the recent penetration and the process of stealing money through the “Glovo” application.

-

On the gaps that such groups use to penetrate the sites of state institutions or applications, and how citizens can protect themselves from such attacks, the same spokesman explained: “For me, there are two parts;

“With regard to the technical part,” SQL Injecation “attacks are among the most dangerous threats that target databases, as the injects information or malicious software orders within the fields dedicated to data , which allows him to implement direct orders on the database via the server. This vulnerability enables the attacker to access sensitive information, such as email addresses, officials accounts, and names Users and passwords; which poses a great danger to the data and safety of data.

On the part of the human element, Rajouj referred to social engineering; As 22 percent of the breakthroughs in the are caused by the latter; It is considered one of the strongest hacking methods in the world.

The analyst, in his speech, highlighted that “social engineering” depends on two patterns of thinking; The is the “Alpha”, and the second in “Bita”; Where the hacker adopts techniques; Including a “text message” through which, as, for example, your banking institution that makes you feel that you have reached information and want to verify it. In this case, a person may not think in some cases critically, and he keeps them up by providing the data they demand, to find himself in the end, in addition to many other ways. “

In this regard, Rajouj stressed “the need to go to the banking institution and demand the of the bank card, so that these transfers do not reach huge amounts and deductions.”

The same spokesman continued that the National Social Security Fund stated, through a issued by it, that technical and administrative research will be opened, noting that the administrative research that it intends will be in order to verify whether the technology of “social engineering” has been practiced on an official or director, through fraud and access to accurate information that enabled them to penetrate.

-

-

-
NEXT “We no longer need the other”: Vincent Cassel as a couple with Narah Baptista, his very surprising secrets on life for two