The hackers’ kamikaze effort came at the exact time of the 2013 elections in Iran. Tens of thousands of emails were about to be broken into when Google saved the day by cleverly averting this disaster. Since the past three weeks or so, Google had been noticing something strange happening in its Gmail facility. According to the Google's official blog, many phishing campaigns were being sent to Gmail users. The illegal actions were all based on attempting to disrupt the upcoming elections. The whole operation originated from the region of the Persians.
The hacking activity was supposedly a political ploy. They lured innocent users to a separate page and then tried to sweet talk them into giving their usernames and passwords. The selfsame Iranian hackers had tried this cunning stratagem two years back. Iranians are ready to use their voting power to appoint a new president in place of Mahmoud Ahmadinejad. Hassan Rouhani, a very liberal person compared to the conservative and hawkish Ahmadinejad is hoped to be the likely winner. But there is a firm opposition too.
The exposing of this hacking scandal is something the credit for which goes to Google alone. The executives at Google further spoke of how the sly methods used in the phishing campaign were for the sake of politically blackmailing opponents. This methodology has been used before especially in Malaysia. Google staff didn’t spill the beans on this finding completely since they didn’t want the hackers to know of the plans of the search engine giant. A Dutch firm by the name of DigiNotar had also faced similar attacks on its website’s security in 2011.
This trend in hacking accounts for fun or more serious purposes is a worrisome statistic that is on the increase throughout the world. The beginning of the digital age also brought with it a lot of new problems that have come to plague mankind. Hacking and phishing are just two of the curses of the computer era. There are many others which we do not need to go into here. But the main point is that better detection procedures and security arrangements will have be made to offset the danger of infiltration into accounts and sites by nefarious elements.