CyberheistNews vol2, #34



CyberheistNews Vol 2, #33







Editor's Corner



KnowBe4


[caption id="attachment_1367" align="alignleft" width="150" caption="Stu"]cybercrime[/caption]



Olympics Scam Roundup



The bad guys are at it again! Please forward this to all employees,

because it's rush hour with a host of Olympics-based scams.







Organizers have recorded 124 different scams so far but expect double

or more. First, there is an "Invitation FACEBOOK - Olympic Torch"

chain letter. It claims that your machine will be infected with

malware but the whole thing is a hoax. Think before you click and

do not forward.







Next, scammers prey on Olympics Mobile game players. Not long ago,

organizers of this year’s Olympic Games released London 2012 –

Official Mobile Game, a fun smartphone app for Android, iOS, and

Blackberry users. But there are a few Russian websites claiming

to be legitimate app markets and they host malware claiming to

be the official London 2012 game. Be very careful downloading

games for your smartphone.







Then, there is a blizzard of bogus Olympics-themed emails that try

to steal money and/or information. They offer fake last-minute

tickets, memorabilia, tell you that you have won an "Olympic lottery"

or that you can sign up for temp jobs online and make some extra

money. These scam emails use well known brands, or even spoof the

London Olympics. Delete all of these immediately.







Especially do not click on any emails with pictures or videos

about the Olympics, because clicking on one of these has a very

high chance to infect your workstation with malware. Even search

results on Google could be infected links so be careful.







Last but not least, be particularly wary of text messages on your

phone, that claim a golden medal win, or something else 'exciting'.

The safe way to get information about the Olympics online is to

go their official website. Here is the link to their 'stay safe

online' tips, which also list 70 websites that sell bogus tickets:


http://www.london2012.com/news/articles/www.london2012.com/about-this-website/stay-safe-online.html





KnowBe4






No, You SHOULD Invest In Security Awareness Training









You probably read my editorial last week about Dave Aitel who took

the position that security awareness training was

not necessary.







Well, Ira Winkler at the Chief Security Officer (CSO) website makes

the case for the importance of security awareness training in his

response to Aitel's article.







I'm grabbing a few lines out of his article, and suggest you read

it, as it has great ammo to get approval for budget: "Every security

measure, technical or otherwise, has and will fail again at some point

in time. If you don't realize that, you really suck as a security

professional. The definition of "security" is literally "freedom from

risk." You will never be free from risk in the real world. What

"security" professionals are actually performing is "risk management."







"Awareness mitigates non-technical issues that technology can't, that

CISOs and other security managers are responsible for protecting

information in all forms, and that in many cases awareness programs

are not optional. The fact of the matter is that no security measure

should be measured by the standard of perfection. The real standard

is return on investment. By that standard, you will find that security

awareness is one of the most reliable security measures available."







He's saying it better than I have up to now. Here is his whole article.

Bookmark that URL and send it to your managers, it's worth it!




security-awareness-can-be-the-most-cost-effective-security-measure?">http://www.csoonline.com/article/712162/

security-awareness-can-be-the-most-cost-effective-security-measure?






KnowBe4






Quotes of the Week









"The people can always be brought to the bidding of the leaders.

That is easy. All you have to do is tell them they are being attacked,

and denounce the pacifists for lack of patriotism, and exposing the

country to greater danger."
- Nazi General Hermann Goering







"No man who ever held the office of President would congratulate a

friend on obtaining it."
- John Adams









Please tell your friends about CyberheistNews! They can subscribe here:


http://www.knowbe4.com/about-us/cyberheist-news/



KnowBe4






Released! Kevin Mitnick Security Awareness Training







Traditional once-a-year Security Awareness Training doesn’t hack it

anymore. Today, employees are frequently exposed to sophisticated

phishing attacks, and your users are now the weak link in your

network security. They need to be trained by an expert, and after

the training stay on their toes, keeping security top of mind.

Click on the orange 'Get A Quote' button and find out how affordable

this is!


http://www.knowbe4.com/products/kevin-mitnick-security-awareness-training/





Busy? Just take 90 seconds and watch this brand new video about the

new Kevin Mitnick Security Awareness Training . You'll be glad you did:


http://www.knowbe4.com/video-kevin-mitnick-security-awareness-training/











KnowBe4






Should Compliance Drive Security?





[caption id="" align="alignleft" width="300" caption="Should Compliance Drive Security?"] KeyboardCritter[/caption]

Practically all of us accept credit cards, so we need to be PCI compliant. The question though is "If we comply, are we secure enough?". It's an easy assumption to make, and a lot of us take that route. We all have firewalls, antivirus and some of us run intrusion detection code, but these products mostly are making (educated) guesses about what is going on. These products are necessary, but they are not sufficient.





When I'm looking at the general threat landscape, I think that PCI compliance should not drive your security posture, it's to some degree the cart before the horse. Many of the recent companies that were the victim of a data breach were compliant. Your security practice will fail if compliance is driving, because as an organization you will fall in the trap of performing to the test instead of performing to the task. (Remember those "Paper MCSE's'? Many were not able to actually function as a Microsoft Certified System Engineer and failed miserably.)



DefenseInDepth





So, what to do?



Think like the attacker. Identify your key assets. Which of the data that we have is strategic IP, customer data and other sensitive / confidential information? The people that have access to this data have a target on their back, and will be exposed to sophisticated social engineering attacks. The attackers are going to go after your high-value systems and people. You need to identify these and prioritize their protection. One of the essential elements of Defense-in-Depth is the outer shell of Policies, Procedures and Awareness.



To make your organization a hard target that is resistant to Advanced Persistent Threats (APT) one of the pieces of the puzzle you need to have in place is security awareness training, and your employees need to be trained by an expert.







KnowBe4






Chinese Hackers "Vacuuming Up" Huge Quantities of Proprietary Data







In the world of spying, you know there is a good chance you are

being observed and you take countermeasures if you can. In the case

of hacking this is more true than ever, and taking countermeasures

is hard. On July 26, 2012 Bloomberg published an in-depth article

about US intelligence who have been watching Chinese hackers for

a long time. The attacks started way in 2002, and the scope is

simply breathtaking. The data hoovered up was pertinent to the

financial crises in European, to lawyers who were filing trade claims

against Chinese exporters and more. The hackers broke into systems at

investment banks, technology companies, oil companies, and pharma.

The amount of data that has been stolen is hugely expensive in the

sense of economic damage. Here is the article. Warmly recommended:


http://www.bloomberg.com/news/2012-07-26/china-hackers-hit-eu-point-man-and-d-c-with-byzantine-candor.html





KnowBe4






New Mac Trojan







Computerworld reported first about this new Mac Trojan which records

instant messages, Skype calls, browser use, then shoots the info to

a hacker-controller server. French security firm Intego discovered a

new Mac Trojan horse this week that is being used to target specific

individuals. The Trojan, dubbed "Crisis" by Intego -- a Mac-only

antivirus developer -- and called "Morcut" by Sophos, is espionage

malware that spies on victims using Mac instant messaging clients,

browsers and Skype, the Internet phoning software. According to Intego,

which published an initial analysis on Tuesday and has followed up

with more information since then, Crisis sports code that points to

a connection with an Italian firm that sells a $245,000 espionage

toolkit to national intelligence and law enforcement agencies. More:




New_Mac_Trojan_hints_at_ties_to_high_priced_commercial_hacking_toolkit?">http://www.computerworld.com/s/article/9229725/

New_Mac_Trojan_hints_at_ties_to_high_priced_commercial_hacking_toolkit?




KnowBe4








One Black Hat Conference Highlight: NFC







If any of your employees have smartphones with near-field communications

(NFC), the talk by Charlie Miller should give you pause. He pointed at

one major area of failure, called 'feature-creep which is very common

in IT. It has happened with NFC on mobile devices. NFC in itself is cool

tech for payments authentication. However, there is a rub. It was

recently “improved” with a device-to-device (D2D) communication feature.

BZZZZZZ. Wrong Feature!



With D2D, you not only expose NFC-related apps, but if you can send a

phone to a web page without the user's knowledge or consent, the phone's

attack surface is suddenly enlarged to its web browser and everything

hooked into that browser like plugins, flash and the like. During

that Black Hat session, such an attack was shown to work, they used

a webkit exploit to do it. It would be a good idea to shut off your

phone's NFC until proven safe.





KnowBe4








How To Spoof A MS-Exchange Server







If you use an Android or iOS device to connect to a Microsoft Exchange

server over WiFi, security researcher Peter Hannay may be able to

compromise your account and wreak havoc on your handset. At the Black Hat

security conference in Las Vegas, the researcher at Edith Cowan

University's Security Research Institute in Australia described an attack

he said works against many Exchange servers operated by smaller businesses.

Android and iOS devices that connect to servers secured with a self-signed

secure sockets layer certificate will connect to servers even when those

certificates have been falsified.



"It's really simple and that's what's disturbing to me," Hannay said. The

whole attack is just 40 lines of python and most of that is just connection

handling." Here is the whole article:


http://arstechnica.com/security/2012/07/spoofing-microsoft-exchange-server-how-to/



KnowBe4








Need To Delete A BotNet From 532 Workstations and 32 Servers? Do It In 10 Minutes.







An end-user clicked on a phishing link and a worm infected his whole

network. How do you get rid of it?


1) Find out what the name is of the executable.


2) Create a Policy and tell it: a) Delete executable b)

Block it from running.


3) Assign the policy to all infected servers and

workstations.
Voila! 10 minutes later the malware is deleted and blocked

from even starting up. The product to use? InstantRevert! Real-time

compliance bought to you by KnowBe4. Learn more about it here:


http://www.knowbe4.com/products/instantrevert/



KnowBe4








Cyberheist 'FAVE' LINKS:







* This Week's Links We Like. Tips, Hints And Fun Stuff.





SUPER FAVE: World's Fastest Roller-Coaster - Ferrari World Abu Dhabi:


http://www.flixxy.com/worlds-fastest-roller-coaster-ferrari-world-abu-dhabi.htm





Queen Elizabeth's Olympics Helicopter Jump with James Bond. Now this

is a -safe- Olympics video to watch!:


http://www.flixxy.com/queen-elizabeth-olympics-helicopter-jump-with-james-bond.htm





A fantastic pit stop of Sebastian Vettel where his team did their job

in just 4 seconds. Impressive isn't it? I wish my dealer was that fast:


http://www.flixxy.com/f1-sebastian-vettel-pit-stop-in-4-seconds.htm?





Wow, this guy used a 3D printer to create a working (!) AR-15 receiver:


http://www.gizmag.com/first-3d-printed-firearm/23473/?





A beautiful short film shows a frightening future filled with Google Glass-like devices:


http://www.flixxy.com/sight-systems-short-film.htm





Ever reached for something and gave up, thinking it was too hard? This

kitty cat has persistence and doesn’t give up:


http://www.flixxy.com/clever-kitty-catches-hard-to-reach-balloons.htm





Five guys take same photo for 30 years every 5 years:


http://www.cnn.com/2012/07/26/travel/friends-summer-photo-tradition/index.html?





The Danish Air Force landed a Hercules C-130 transport aircraft on a

beach, turned around and took off. Here is a view from the cockpit and

from the ground:


http://www.flixxy.com/danish-c-130-hercules-lands-and-takes-off-on-a-beach.htm





A foreign tourist experiences the beauty of Crete and the warmth and

optimism of its people, in contrast to the bleak picture painted by the

news media:


http://www.flixxy.com/the-island-of-crete-greece-see-for-yourself-feel-for-yourself.htm





If you enjoyed the original 'Evian Babies', you may have fun watching them

perform to "The Rollerskate Song" by folk singer Melanie:


http://www.flixxy.com/evian-babies-and-the-rollerskate-song-by-melanie.htm





This is what a six-rotor Wankel looks and sounds like. Likely to be dropped into

a drag-racer. Wow:


http://www.autoblog.com/2012/07/27/this-is-what-a-six-rotor-wankel-looks-and-sounds-like/





Cute bear fave of the week: It is the worst nightmare of any parent, but luckily

for this bear mum, she was given a helping hand after losing her youngsters:


http://www.flixxy.com/bear-cub-rescue.htm




Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews