By now, most people know about the potential threat from business email compromise orBEC. With BEC, someone in a company gets their email taken over by a hacker and the hacker uses the trust implied in that email to exploit others in the company.
“Formerly dubbed as Man-in-the-Email scams, BEC attackers rely heavily on social engineering tactics to trick unsuspecting employees and executives. Often, they impersonate the CEO or any executive authorized to do wire transfers.” As bad as BEC is, at least it threatens just a single company—the one with the compromised email.
When you tell me that phishers go after large enterprises, I get it. There’s a lot of valuable data there. When you tell that they go after banks, cause that’s where the money is, I understand. But, when you tell me they’re going after relief agencies, I call them cold-hearted.
That’s the news making headlines from researchers at Lookout Security. According to a blog post there, they have “detected a mobile-aware phishing campaign targeting non-governmental organizations around the world, including a variety of United Nations humanitarian organizations, such as UNICEF.”
Given the proliferation of the internet and e-mails as the preferred means of communication, ransomware attacks are on an upward spree. Malware attacks 2017 show that nearly 40% of all e-mail spam contains ransomware. It brings forth the question, what exactly is ransomware?
It is a malware attack that cripples the victim’s files with unbreakable encryption. The cyber attacker then demands money, usually in the form of cryptocurrency (such as Bitcoins) to unlock the data. Hackers can spread ransomware through malicious e-mail attachments, infected external storage devices, infected software apps, and compromised websites. Some attacks also use remote desktop protocol and other approaches which do not rely on any user interaction.
Netflix, the popular online entertainment and video streaming site, has millions of subscribers and hence is a tempting target for the cybercriminals that look to hack into email accounts to gain illegitimate access to services. When they target many, even a small percentage of success could mean something significant.
If you work at an organization, there’s a pretty good chance you’re in for a yearly performance appraisal. And if you are, it’s likely that someone from human resources will send you an email around that time reminding you of that. But beware, that email may not be what you think it is.
There’s a new corporate phishing attack going on that involves hackers sending unsuspecting employees an email notifying them of their upcoming performance appraisal. The hacker’s use of social engineering in this attack is very clever because they convince the victims that the appraisal is mandatory and that they might get a pay raise. So, pretty much everyone who receives it will respond to it.
When you think of phishing, you probably think of ransomware (which you should). And when you think of ransomware, you probably think about money (which you should). The money the hackers are trying to get as a ransom.
There’s no doubt that most phishing attacks, either directly or indirectly, are about money. But not all. According to an article on KnowBe4, “Universities worldwide are the target of phishing attacks by a hacking group aimed at stealing research and intellectual property.“
As previously discussed on this blog, Instagram is now more popular than Facebook when it comes to phishing attacks. As the article detailed, Instagram is popular as a target for phishing attacks because Instagram phishing attacks can so easily go viral, given that every victim can quickly lead to hundreds of more emails to trusted relationships.
Well, the folks at Facebook, the company that owns Instagram, heard the cries for help and decided to do something about it. To that end they are rolling out a new tool to protect Instagram users from phishing attacks. There’s just one problem: it won’t work.
You might think that phishing emails from these “third world” countries would be unsophisticated and easy to detect. You’d be wrong.
First North Korea. According to the Digital Journal, “Several U.S. businesses have been targeted by a campaign seemingly to originate from North Korea and using the tactic of spear-phishing. The cyber-assault is sophisticated, using legitimate documents as the targets.”
At this point, mentioning a new Google attack vector is almost not news anymore, given how many times the company’s services have been exploited. It’s to be expected though. Google makes most of its service available free of charge, which means not only do you have free access to it, so do hackers. And given these services’ widespread adoption, it’s not surprising that Google is a frequent target.
When hackers go after you with phishing emails, you’ll never guess which brand they impersonate the most. Microsoft. “Given the ubiquity of Windows and Office, as well as other services including the Outlook.com webmail service and Xbox Live, Microsoft’s position at the top of the list should come as no surprise.”
You’ll never guess which popular Calendar app was used to phish Gmail users earlier this year. Google Calendar. For a long time now, Google Calendar has had a major flaw. If someone sends an event request to your Gmail account, it automatically assumes you want to go and adds it to your calendar. It does so even if the event request is an attempt to phish you.
Got an Android Phone? You’re going to love this. Attackers can now take control of your phone over-the-air.
From Check Point Research, “Check Point Researchers have identified a susceptibility to advanced phishing attacks in certain modern Android-based phones, including models by Samsung, Huawei, LG and Sony. In these attacks, a remote agent can trick users into accepting new phone settings that, for example, route all their Internet traffic through a proxy controlled by the attacker. This attack vector relies on a process called over-the-air (OTA) provisioning, which is normally used by cellular network operators to deploy network-specific settings to a new phone joining their network. However, as we show, anyone can send OTA provisioning messages.”
It never ceases to amaze how clever hackers are or how far they’ll go to phish someone. Whenever they find a flaw in their attack methodology, eventually, they figure out a way to overcome it.
Normally, a phishing attack will try and lure victims to a website to steal their credentials. The phishing website is typically a single, static webpage. In other words, everyone who ends up on that page sees the same page. The problem for hackers is that once this one webpage is identified as a phishing page, word gets out and that site gets blocked by anti-phishing technology pretty quickly.
The rate of cybercrimes has risen drastically across the globe in recent times. The advanced technology, the sophistication of attack methods used, and seemingly legitimate appearance of today’s phishing emails are a testimony of the strides of advancement that the phishers and cybercriminals have made in the past decade.
However, the advice for securing ourselves from phishing emails seems to have remained stagnant since the 2000s. One would always hear the same old song playing on when the topic at hand is that of phishing protection or ensuring cybersecurity in general. We need to defend ourselves from cyber threats by gathering information and resources that match the level of advancement of our adversaries. Merely following some age-old tips without cross-checking their effectiveness in the present scenario makes us more vulnerable than stronger to face the multitude of phishing attacks that hackers launch each day.
It seems like every week we hear about another major security breach. There was the Equifax breach in 2017 that compromised the data of 143 million people and the JP Morgan Chase breach in 2014 that affected 83 million households. Then there was Anthem and Target and Uber and Home Depot. I think you get the point.
It was not long ago the white house was in the news when US intelligence agencies concluded Russia tried to sway the US presidential election in favor of Donald Trump alleging that the Russian hackers stole the information of rival Hillary Clinton’s campaign. The White House is said to be one of the most secured and safe-guarded buildings in the world. But when it comes to cybersecurity, no one is spared. Yes, even top-ranked White House officials including the Homeland security Advisor and other White House officials were spoofed by cyber-criminals.
How many employees have to get phished before they take action? How much ransomware has to be paid before they take action? How many personal records have to be stolen before they take action? What will it take for email security service providers to install phishing protection technology and protect their customers? Apparently they haven’t hit the limit yet because the one thing we know for sure is that they aren’t doing a very good job of it.
If you’ve ever taken phishing awareness training, you’ve most likely been taught to identify domain name spoofing. Domain name spoofing is a phishing tactic where an attacker sends you an email from one domain, the attacker’s domain, that looks almost identical to another domain, a domain you trust.
The idea is that if the recipient of the email looks at the email address quickly, they may not notice the slight difference. Here’s an example of an email from a lady named Beth at Google: beth@gooogle.com. Or is it? No, it’s a domain name spoof spelling Google with three Os.
A recent article on the Help Net Security website discussed the results of research into the effectiveness of phishing filters. Phishing filters are used in email security to scan emails for malicious links or attachments.
Phishing filter technology is becoming widely adopted and it’s generally thought to be pretty effective at preventing phishing attacks. That’s not what the research found.
Spear Phishing is a type of phishing attack which generally targets “Whales” or “high-level organizational actors” such as C-suite executives (e.g., CEO, CFO, CIO, etc.) or upper management to steal financial and sensitive or confidential information from unsuspecting top-level management. Spear phishing data breaches account for more than half of the phishing scams worldwide, which occur every year. Verizon reports elucidate that a high proportion of these data breaches begin with a directed phishing campaign targeted against an enterprise. Although corporations deploy sophisticated phishing prevention software to safeguard their data, they remain vulnerable because of human error, which allows adversaries to bypass such security measures, including anti-phishing solutions.
Osterman Research came out with theirOffice 365 Email Security 2019 Benchmarking Survey and the results are scary for organizations using Office 365 for email. The results are based on 318 in-depth surveys with IT and security managers of enterprises using Office 365 in the United States and the United Kingdom. According to Osterman, the purpose of the survey was to gain a better understanding of the security management issues faced by organizations using Office 365.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.