CyberheistNews vol 2, #17



CyberheistNews Vol 2, #17







Editor's Corner



KnowBe4


[caption id="attachment_1367" align="alignleft" width="150" caption="Stu"]cybercrime[/caption]

Scam Of The Week: "Help My Cousin"



We all get them, a friend or a family member asks us to help out and

click on a YouTube link, and increase the hits for that video. It will

help them: raise funds / pass an exam / help the needy / fill in the blank.







However, this is a fantastic way to social engineer anyone, using their

natural tendency to want to help people. The link provided could be

spoofed, or very similar to YouTube and dupe people into clicking the

link. Here is an example of such a possible scam email, but there are a

thousand variants of it. So Stop, Look, Think before you click!







"I have a favor to ask for my 1st cousin Amy. She and some of her pre-med

class mates have created a YouTube video as an assignment for her Cardiology

Final. They used real information, and they taped a fictional newscast with

a Charlie's Angels flavor. The athlete in it is her boyfriend. The number

of hits is going to determine their grade. I would really appreciate it

if you could just *hit* the video (you don't need to watch it)."


-- Link to YouTube here --







If this would be a malicious link, one click is enough to infect that PC.







KnowBe4






Spend One Minute And Look At These Graphs!











After a year of helping our customers train their employees against social

engineering, we decided to go back, look at the actual numbers over those

12 months, and show you a few case studies that clearly show the sequence of:





1) The initial Phishing Security Test (PST) that shows the baseline Phish-prone

percentage,





2) Stepping all employees through our Internet Security Awareness Training, and





3) Follow up with regular PSTs that continue to keep them on their toes. All

graphs start out high on the left (baseline), and drop dramatically over time.







Under each case study is the type of organization, number of employees, the

number of PST’s that were sent to these employees, and which Phishing Campaign

templates were used to send to the users.







Spend ONE minute and look at these graphs, it's visible proof the KnowBe4

system works:


http://www.knowbe4.com/visible-proof-the-knowbe4-system-works/







Let us know if you want to know how much this is for your own employees,

we can get you a quote back by email in less than a day.


http://www.knowbe4.com/get-a-quote-isat/





Quotes of the Week









It was the great American baseball player / philosopher, Yogi Berra who said:







- “When you come to a fork in the road, take it.”







- “Always go to other people’s funerals, otherwise they won’t come to yours.”







- “It’s like déjà vu all over again.”







- “The future ain’t what it used to be.”







We love you Yogi.







Please tell your friends about CyberheistNews! They can subscribe here:


http://www.knowbe4.com/about-us/cyberheist-news/





Stop Phishing Security Breaches







Are you aware that many of the email addresses of your organization are exposed on the Internet and easy to find for cybercriminals? With these addresses they can launch (spear-) phishing attacks on your organization. This type of attack is very hard to defend against, unless your users are highly ‘security awareness’ trained.





IT Security specialists call it your ‘phishing attack surface‘. The more of your email addresses that are floating out there, the bigger your attack footprint is, and the higher the risk is. It’s often a surprise how many addresses are actually out there.





Find out now which of your email addresses are exposed. The Email Exposure Check (EEC) is a one-time free service. KnowBe4 customers with a Gold package get an EEC sent to them regularly so they can address the issues that are found. An example would be the email address and password of one of your users on a crime site. Fill out the form and we will email you back with the list of exposed addresses. The number is usually higher than you think.





Sign Up For Your Free Email Exposure Check Now


http://www.knowbe4.com/20120228-Primary/







KnowBe4






If You Do The Cyber Crime, Expect To Do The Time







Roger Grimes at InfoWorld observes something encouraging..."Every public

speaker and writer likes a good catchphrase or refrain that will grab the

audience's attention. One of mine: Whenever you read that a superhacker

has been arrested, it's never the superhacker. Even when we know who the

superhackers are, we can't arrest them. They operate with near impunity.

Why stop if you can never be caught?







"For two decades, my pet rant was true -- but the tide has turned. These

days, some of the biggest fish are being arrested. My friend Brian Krebs

from Krebs on Security has long been documenting the rise and, at last,

the fall of Russian cyber criminal enterprises." Full article:


http://www.infoworld.com/d/security/if-you-do-the-cyber-crime-expect-do-the-time-190042?











KnowBe4






Remove Hidden Data And Personal Information By Inspecting Documents





This is a good hint for your users from the Microsoft website: "If you

plan to share an electronic copy of a Microsoft Word document with clients

or colleagues, it is a good idea to review the document for hidden data

or personal information that might be stored in the document itself or

in the document properties (metadata). Because this hidden information

can reveal details about your organization or about the document itself

that you might not want to share publicly, you might want to remove this

hidden information before you share the document with other people. This

article describes how the Document Inspector feature in Word can help you

find and remove hidden data and personal information in your documents."




information-by-inspecting-documents-HA010354329.aspx">http://office.microsoft.com/en-us/word-help/remove-hidden-data-and-personal-

information-by-inspecting-documents-HA010354329.aspx












KnowBe4






AV Vendor claims 600,000 Infected Macs in Botnet





The CSO website reported: “A Mac trojan horse spotted by security analysts

since last year has infected more than 600,000 Apple computers, says

Dr. Web, a Russian antivirus vendor. Apple only patched the vulnerability

this week, around a month after hackers began spreading the BackDoor.Flashback.39

trojan, with most infected Macs located in the United States and Canada.”





Now this -is- an antivirus vendor, and it’s their job to make the

environment seem as dangerous as possible so they can sell their wares,

but still. Even if it’s half or one quarter, that still means the Mac OS

is now large enough to be a target, and that Mac users -also- need to

get their Internet Security Awareness Training like everyone else!







KnowBe4






99 Percent Of Malicious Action Starts On Workstations







Roger Grimes made this remark on InfoWorld when he commented on the 2012

Verizon Data Breach Investigations Report that was released last week.

What he said was: "You should enable event log monitoring on all managed

workstations and servers. Don't make the mistake of only monitoring servers

-- 99 percent of the malicious action begins on a regular end-user's

workstation before it spreads to the servers holding the data. Often,

by the time attackers reach the servers, they are operating with an

elevated end-user's credentials, and event log monitoring becomes much

tougher." This is a warmly recommended article called: "What to monitor

to stop hacker and malware attacks":


http://www.infoworld.com/article/2619761/security/what-to-monitor-to-stop-hacker-and-malware-attacks.html







KnowBe4








Cyberheist 'FAVE' LINKS:







* This Week's Links We Like. Tips, Hints And Fun Stuff.





Awesome compilation of 183 different viral video clips in 4 minutes.

Watch in Full Screen and HD. Put your seatbelt on!


http://www.flixxy.com/best-of-the-web-compilation-2012-hd.htm





The PAL-V 'Personal Air and Land Vehicle' is a two seat hybrid car and

gyroplane made in Holland. Now you can leave home and fly-drive to almost

any destination. I want one! Really:


http://www.flixxy.com/pal-v-flying-car.htm





Cool, weird and unusual security gear. The unusual security stuff for sale

at the recent GovSec Conference in Washington, D.C. Slideshow at networkworld:


http://www.networkworld.com/slideshow/39823?





Google X labs confirms augmented reality glasses project with video demo,

but look at this from the perspective of that friend being spoofed, and the

meeting is a robbery instead. Even more opportunity for social engineering:


http://www.gizmag.com/google-x-augmented-reality/22072/





Rita Hayworth and her co-stars are dancing to "Stayin' Alive" in this

brilliantly edited compilation from her most popular movies:


http://www.flixxy.com/rita-hayworth-dancing-to-stayin-alive.htm





Chris Hadnagy gave a speech at RSA entitled, “Human Hacking Exposed:

6 Preventative Tips That Can Save Your Company.” Worth watching (17:25)


http://youtu.be/p40fZFAUz6U





The jumper has a parachute on and holds on to the wing for dear life,

while the pilot does a 1G roll. Woo HOO !


http://www.flixxy.com/aircraft-rolls-with-a-man-on-the-wing.htm





Amazingly simple glider launched by foot power is able to land on short

fields and runways. Made in Switzerland. Very cool!


http://www.flixxy.com/foot-launched-glider.htm





Take a mini-vacation on a busy day and enjoy this stunning video: Japan in

8 minutes! Best in full screen and as high definition as you can:


http://www.flixxy.com/japan-in-8-minutes.htm





James Cameron and a team of Titanic experts work out in a new computer generated animation how the Titanic sank and reached the ocean floor:


http://www.flixxy.com/new-cgi-of-how-titanic-sank.htm





Top Gear's Jeremy Clarkson takes the BMW Isetta "bubble car" for a spin - only to get caught out by its unusual design:


http://www.flixxy.com/bmw-bubble-trouble-top-gear.htm




Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews