CyberheistNews Vol 11 #26 [Eye Opener] Almost All LinkedIn User’s Data Has Been Scraped and Is up for Sale on the Dark Web

CyberheistNews Vol 11 #26
[Eye Opener] Almost All LinkedIn User’s Data Has Been Scraped and Is up for Sale on the Dark Web

700 Million LinkedIn user’s personal details were posted for sale earlier this month, putting 92% of their userbase at risk of social engineering and spear phishing attacks.

Hacker TomLiner put up a post last week on the dark web offering 700 Million LinkedIn records. Listed as a “GOD User”, no doubt TomLiner is active and well-known in that online community.

The data includes a number of details about each user, including:
  • Email addresses
  • Full names
  • Phone numbers
  • Physical addresses
  • Geolocation records
  • LinkedIn username and profile URL
  • Personal and professional experience/background
  • Genders
  • Other social media account usernames
What makes this so dangerous is that this aids the spear phishing diligence the cyber criminals already do as part of Business Email Compromise attacks. In many ways, these details make the job easier. The more legitimate a BEC phishing email can be made to look legitimate using actual details, the more likely the scam will be successful.

According to LinkedIn, this isn’t technically a breach, since no private information was stolen. Instead, they claim it’s an aggregate of the 500 million records stolen in April and other sites.

Even so, just knowing that cyber criminals can arm themselves with some impactful details familiar to the potential victim, you should be looking for ways to empower users to know when they’re being targeted. Security Awareness Training is one of the most effective ways, as it opens your user’s eyes to how the bad guys try to trick them, teaching them to stay on their toes with security top of mind – even when emails appear legitimate.

Blog post with screen shots and links:
[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

Join us THIS WEEK, Thursday, July 8 @ 2:00 PM (ET), for a live demonstration of how KnowBe4 introduces a new-school approach to security awareness training and simulated phishing.

Get a look at new features and see how easy it is to train and phish your users.
  • NEW! AI-Driven phishing and training recommendations based on your users' phishing and training history.
  • NEW! Brandable Content feature gives you the option to add branded custom content to select training modules.
  • NEW! Security Awareness Proficiency Assessment Benchmarks let you compare your organization’s proficiency scores with other companies in your industry.
  • Did You Know? You can upload your own SCORM training modules into your account for home workers.
  • Active Directory Integration to easily upload user data, eliminating the need to manually manage user changes.
Find out how 39,000+ organizations have mobilized their end-users as their human firewall.

Date/Time: THIS WEEK, Thursday, July 8 @ 2:00 PM (ET)

Save My Spot!
Yet Another Disk Image File Format Spotted in the Wild Used To Deliver Malware

Disguised as an invoice, cyber criminals use a Windows-supported disk image to obfuscate malware from email gateways and security scanners. The question is how viable will it be?

The bad guys are in constant need to find ways to evolve their art as the good guys improve their security solutions to respond to current attack methods. Historically, we’ve seen a number of image files used including virtual hard disks and ZIP files, as well as .ISO, .IMG, and .DAA files.

But, as security solutions get wise and use AI to simply determine “has this user EVER received an image file???” to flag an email, the cybercriminal needs to look for a new format. According to a recent article from security vendor Trustwave, they’ve spotted a WIM (Windows Imaging Format) file disguised as an invoice or consignment note in the wild.

The WIM format is one developed by Microsoft. The WIM file contains a single executable – the Agent Tesla malware. Because Windows 10 and above support this filetype, it’s possible that it can be directly opened by the recipient.

This one seems a little out there, as the user experience to detonate this malware involves first extracting the WIM file’s contents (and “extracting” is a very foreign concept to most users). So, it seems the bad guys are relying on the recipients ignorance to simply click the affirmative buttons blindly to install the malware.

Users can easily be educated about such tactics using continual security awareness training that keeps them updated on the latest types of scams, phishing methods, and more.

Blog post with screenshot and links:
See How You Can Get Audits Done in Half the Time, Half the Cost and Half the Stress

You told us you have challenging compliance requirements, not enough time to get audits done, and keeping up with risk assessments and third-party vendor risk is a continuous problem.

KCM GRC is a SaaS-based platform that includes Compliance, Risk, Policy and Vendor Risk Management modules. KCM was developed to save you the maximum amount of time getting GRC done.

Join us THIS WEEK, Thursday, July 8 @ 1:00 PM (ET), for a 30-minute live product demo of KnowBe4's KCM GRC platform. Plus, get a look at new compliance management features we've added to make managing your compliance projects even easier!
  • NEW! Control guidance feature provides in-platform suggestions to help you create controls to meet your specific scopes and requirements.
  • Vet, manage and monitor your third-party vendors' security risk requirements.
  • Simplify risk management with an intuitive interface and simple workflow based on the well-recognized NIST 800-30.
  • Quick implementation with pre-built requirements templates for the most widely used regulations.
  • Dashboards with automated reminders to quickly see what tasks have been completed, not met, and past due.
Date/Time: THIS WEEK, Thursday, July 8 @ 1:00 PM (ET)

Save My Spot!
The Biggest Bitcoin Heist Ever: A Whopping 3.6 Billion Dollars

I'm not sure why this is not all over the press. Bloomberg picked up on this though. A pair of South African brothers have vanished, along with Bitcoin worth $3.6 billion from their cryptocurrency investment platform.

They said on June 23rd: "A Cape Town law firm hired by investors says they can’t locate the brothers and has reported the matter to the Hawks, an elite unit of the national police force. It’s also told crypto exchanges across the globe should any attempt be made to convert the digital coins."

It's an unbelievable story. Bitcoin Buyer Beware:
Implement DMARC the Right Way To Keep Phishing Attacks Out of Your Inbox

DMARC, SPF, and DKIM are global anti-domain-spoofing standards, which can significantly cut down on phishing attacks. Implemented correctly they allow you to monitor email traffic, quarantine suspicious emails, and reject unauthorized emails. But less than 30% of organizations are actually using them. And even fewer are using them correctly.

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way. You’ll also discover six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

You’ll learn:
  • How to enable DMARC, SPF, and DKIM
  • How to best configure DMARC and other defenses to prevent phishing attacks
  • What common configuration mistakes organizations make
  • Why a strong human firewall is your best last line of defense
Get the details you need to know now to protect your organization from phishing and social engineering attacks. And earn CPE credit for attending!

Date/Time: Thursday, July 15 @ 2:00 PM (ET)

Save My Spot!

Let's stay safe out there.

Warm Regards,

Stu Sjouwerman
Founder and CEO
KnowBe4, Inc

Quotes of the Week
"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth."
- Marcus Aurelius - Roman Emperor (121 -180 AD)

"Nothing is easier than self-deceit. For what each man wishes, that he also believes to be true."
- Demosthenes - Statesman (384 - 322 BC)

Thanks for reading CyberheistNews

Security News
Misconfigured Cloud Database Increases Risk of Social Engineering

DreamHost, a major website hosting provider, exposed 814 million user account records in an unsecured database, researchers at Website Planet have found. The data exposed included a wealth of information about WordPress accounts that used DreamHost’s services, such as “WordPress login location URL, first and last names, email addresses, usernames, roles (admin, editor, registered user, etc.),” and other information.

DreamHost quickly secured the database after being notified, but Website Planet warns users to be on the lookout for spear phishing attacks.

“The danger of these emails being exposed would be for cyber criminals to launch a targeted attack based on the domain, account, or other information that only the hosting provider or website admin would know,” the researchers write.

“We saw records that listed how many administrative accounts or users were associated and listed them all with timestamps of when they were added. DreamHost has a good reputation of protecting their customers from domain hijacking or domain theft and offers domain privacy for free. This exposure appears to contain only information connected to their DreamPress managed WordPress users and not their hosting or domain customers.”

The researchers add that while the database didn’t expose passwords, it still made it much easier for potential attackers to launch social engineering attacks. “The way the records were structured they identified the URL or website domain name and the user’s role such as: admin, editor, subscriber, etc.,” the researchers write.

“This information would provide a clear picture of the hierarchy and who may be the best potential phishing or social engineering target based on their roles. The danger of having even partial administrative credentials exposed is that it removes half of the work required to access an account.

Once a cyber criminal has the username, email address, and location of the WordPress admin dashboard, the only thing left is to get the password. Social Engineering is the easiest way to build a position of trust and try multiple methods to trick the victim to provide their password.” New-school security awareness training can enable your employees to thwart targeted social engineering attacks.

Continued in Blog:
Become a Certified Security Awareness and Culture Professional (SACP)™

In today’s evolving cybersecurity landscape, the skills of security awareness professionals are increasingly viewed as crucial to protecting organizational information assets from human error.

Be a leader in the security awareness and culture profession. Earn H Layer’s Security Awareness and Culture Professional (SACP)™ credential and demonstrate your competency to design and lead security awareness programs that build a sustained security-awareness culture.

The Security Awareness and Culture Professional (SACP)™ credential is the only independent, vendor-neutral certification designed specifically for the newest in-demand job roles in security awareness.

Don't miss the $40.00 discount on the SACP Certification Application through July 31, 2021. Use Coupon Code SACPlaunch21 at checkout to take advantage of this special savings.

Learn more about the SACP Exam or download the SACP Candidate Information Bulletin.

Don't wait. Apply today and become one of the first professionals to earn your SACP Certification.
What KnowBe4 Customers Say

"Thank you for hiring great folks like ToddL. We have been very pleased with the support provided by ToddL and wanted you to know how much we appreciate quality support! Thank you."
- P.A., Systems Analyst

"We are happy campers. So far the product has done everything we could have hoped for. Our phishing scores are dropping and overall, the organization seems to be more security conscious. The support from Rachel R. has been stellar and we were able to get it all configured quickly. Thank you from Colorado!"
- B.S., Director IT
The 10 Interesting News Items This Week
    1. SolarWinds hackers had months-long access to Denmark's central bank:

    2. Bitcoin cyber attacks surge 200%:

    3. Four states propose laws to ban ransomware payments:

    4. KnowBe4's Security Awareness Training Series "The Inside Man" New Season Three Wins Two Prestigious Awards:

    5. New House Bill Aims to Drive Americans' Security Awareness:

    6. Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground:

    7. Survey finds massive gap in awareness of cyberattacks:

    8. DoubleVPN servers, logs, and account info seized by law enforcement:

    9. “Heads Are Spinning In Insurance Business” amid dramatic escalation of ransomware:

    10. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments:
Cyberheist 'Fave' Links
This Week's Links We Like, Tips, Hints and Fun Stuff

FOLLOW US ON: Twitter | LinkedIn | YouTube
Copyright © 2014-2021 KnowBe4, Inc. All rights reserved.

Subscribe To Our Blog

Cybersecurity Awareness Month Resource Kit

Get the latest about social engineering

Subscribe to CyberheistNews