CyberheistNews Vol 5 #46 Beautiful Social Engineering Attack By Gorgeous IBM Rep



Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, product designs and other trade secrets that can be sold on the black market for huge profits. 


CyberHeist News CyberheistNews Vol #5 #46 Oct 27, 2015
Beautiful Social Engineering Attack By Gorgeous IBM Rep
Stu Sjouwerman

"Credit card numbers are small potatoes.

Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, product designs and other trade secrets that can be sold on the black market for huge profits.

The tactics hackers are using to sneak into business and government networks should curl the hair of any business leader. A few months back, Symantec released a disturbing report on 'Butterfly,' a mysterious and sophisticated group of hackers that it described as 'highly capable, professional attackers who perform corporate espionage with a laser-like focus on operational security. The team is a major threat to organizations that have large volumes of proprietary intellectual property, all of which is at risk of being stolen by this group for monetary gain.'

Last week, Ron Taton, president of Cleveland-based IntelliNet Corp., told me about a real-life incident he'd learned about from a security-software vendor. Here's a version of how it went down, and it's right out of a spy novel: You're a chemical engineer at a large company that's working on something special, let's say new battery technology that will triple the range of electric cars. It could mean billions in revenue and freedom from Mideast oil.

You're proud of your work — you should be — and you include your employer info on your Facebook page. And like most guys (yes, it's a man in this example), you're competitive, so you make sure to post photos and updates from your victories at Tuesday night trivia at the local sports bar.

One night, as you wait for a pitcher to be filled at the bar, a beautiful woman two stools down says hello. You look to the left, then the right and realize she is talking to you. You say hello back, and a conversation begins.

She becomes even more attractive when she talks about technology and lets it slip that she works for IBM. You tell her you're an engineer and love tech. She offers to pay for your pitcher. You forget all about trivia night as she discusses her work and gives you a business card with the iconic blue IBM logo. 'I have some swag in my car,' she says. 'Give me a second.' As she heads out to the parking lot, you pop a breath mint and pinch yourself.

'Merry Christmas,' she says when she returns, placing on the bar an IBM coffee mug, T-shirt, mouse pad and 8-gig flash drive. The next morning at work, the coffee tastes extra rich in the new mug, the mouse moves so smoothly on the new pad, and with a new confidence, you push the thumb drive into your computer.

Within seconds, the company's entire email network is compromised, and hackers begin work scraping messages, documents, attachments and images.

The most sophisticated hackers may clean up after they're done, removing traces of the breach and making it even more difficult for companies to know they've been violated — until a competitor in Russia or China unveils a product developed with stolen intelligence.

'Everything is hackable,' says IntelliNet's Taton. 'Assume you are going to be hacked. There is no such thing as a trench around a network. It doesn't exist.' Instead, he says, companies need to be able to be ready to respond, mitigate and play defense. And skip trivia night."

By the way, effective security awareness training would have helped against a honeytrap like this. Find out how affordable it is and be pleasantly surprised.
https://info.knowbe4.com/kmsat_get_a_quote_now

Hat Tip to John Campanelli for this fabulous story.

Scam Of The Week: Enter To Win Tickets To Star Wars

It's "Scam Of The Week" time to warn your users against phishing attacks that try to trick them into winning movie tickets for the new Star Wars movie. The next 2 months this is going to be a highly successful social engineering attack that a lot of users may fall for. This is what the template looks like that KnowBe4 customers can send their employees:
https://blog.knowbe4.com/scam-of-the-week-enter-to-win-tickets-to-star-wars

If you are not a customer yet, I would send them something like this, Edit if you want:

"Scamsters are trying to trick people into getting complimentary tickets for the coming Star Wars Episode VII movie. You may get emails that ask you to enter sweepstakes, fill out surveys, or complimentary coupons for movie tickets. There are many tricks they might use. Don't fall for them and get your computer infected with malware. STOP - LOOK - THINK before you click."

Interestingly enough, this Star Wars simulated phishing template was submitted by one of our customers in the Community section where you can both submit and use templates that were made by peers and sent to their own employees to inoculate them against social engineering.

You can now find it in the System Templates -> Current Events section. May the force be with you.

PS, We have rented a local movie theatre where we are all going to watch the movie in 3D as our holiday party, should be fun.

Remind Your Employees About Top 10 Holiday Scams

As the new holiday cybercrime season rolls in, it's a good idea to look at the scams of last year, which will be recycled with a few small updates.

It’s important for IT departments to give employees a quick refresher on what to look out for. It’s becoming more important as online shopping increases every year and much of that happens on work computers or the devices that employees use for office communication. Here are the Top 10 scams to keep an eye out for this holiday season:

Black Friday Deals
Black Friday and Cyber Monday are the busiest on-line shopping days and the bad guys are out to get rich with your money. Don't buy anything that seems too good to be true.

Complimentary Apple Watch
Watch out for the too-good-to-be-true coupons that offer complimentary watches, phones, or tablets on sites all over the Internet. Don't fall for it. Make sure the offers are from a legitimate company.

Postal Deliveries
Watch out for alerts via email or text that you just received a package from FedEx, UPS or the US Mail, and then asks you for some personal information. Don't enter anything. Think Before You Click.

Fake Refunds
There is a fake refund scam going on that could come from Amazon, a hotel, or a retail chain. It claims there was a "wrong transaction" and wants you to "click for refund" but instead, your device will be infected with malware.

The Grinch E-Card Greetings
Happy Holidays. Your email has an attachment that looks like an e-greeting card, pretty pictures and all. You think that this must be from a friend. Nope. Malicious e-cards are sent by the millions, and especially at the office, never open these things as they might infect your workstation.

The Fake Gift Card Trick
Internet crooks promote a fake gift card through social media but what they really are after is your information, which they then sell to other cyber criminals who use it for identity theft. Here is an example: A Facebook scam offering a complimentary 1,000 dollar Best Buy gift card to the first 20,000 people who sign up for a Best Buy fan page, which is a malicious copy of the original.

The Charity Tricksters
The holidays are traditionally the time for giving. It's also the time that cyber criminals try to pry money out of people that mean well. But making donations to the wrong site could mean you are funding cybercrime or even terrorism. So, watch out for any communications from charities that ask for your contribution, (phone, email, text, and tweets) and make sure they are legit. It’s a good idea to contact the charity to make sure the request did in fact come from them. It is safest to only donate to charities you already know, and refuse all the rest.

The DM-Scam
You tweet about a holiday gift you are trying to find, and you get a direct message (DM) from another twitter user offering to sell you one. Stop - Look - Think, because this could very well be a sophisticated scam. If you do not know that person, be very careful before you continue and never pay up front.

The Extra Holiday-Money Fraud
People always need some extra money during this season, so cyber fraudsters are offering work-from-home scams. The most innocent of these make you fill out a form where you give out confidential information like your Social Security number which will get your identity stolen. The worst of them offer you work where you launder money from a cyberheist which can get you into major trouble.

The Evil Wi-Fi Twin
If you bring your laptop/tablet/smartphone to the mall to scout for gifts and check if you get it cheaper somewhere online. But the bad guys are there too, shopping for your credit card number. They put out a Wi-Fi signal that looks just like a complimentary one you always use. Choose the wrong Wi-Fi and the hacker now sits in the middle and steals your credit card data while you buy online. When you use a Wi-Fi connection in a public place, it is better not to use your credit card.

Warm Regards,
Stu Sjouwerman

Quotes Of The Week

"There are only two mistakes one can make along the road to truth; not going all the way, and not starting."- Buddha

"A person often meets his destiny on the road he took to avoid it."
- Jean de La Fontaine


Thanks for reading CyberheistNews

Security News
This Week's Five Most Popular HackBusters Posts
    1. No more 'MythBusters'; show will say goodbye in 2016:
      http://www.hackbusters.com/news/stories/433931-no-more-mythbusters-show-will-say-goodbye-in-2016

    2. USA Today releases 'Back to the Future' paper on newsstands:
      http://www.hackbusters.com/news/stories/433802-usa-today-to-release-back-to-the-future-paper-on-newsstands

    3. Teen Who Hacked John Brennan’s Email Tells How He Did It:
      http://www.hackbusters.com/news/stories/431787-teen-who-hacked-john-brennan-s-email-tells-how-he-did-it

    4. Big asteroid to buzz Earth on Halloween, not another like it until 2027:
      http://www.hackbusters.com/news/stories/432767-big-asteroid-to-buzz-earth-on-halloween-not-another-like-it-until-2027

    5. Watch this 'Star Wars: Force Awakens' supercut trailer & get chills:
      http://www.hackbusters.com/news/stories/436261-watch-this-star-wars-force-awakens-supercut-trailer-get-chills
You Can Have Kevin Mitnick At Your Next Corporate Event...

Need to generate excitement and a huge draw? Want the very best to entertain, enlighten, and educate? Kevin offers three excellent presentations, all based on his best-selling books. Kevin's keynote speeches are technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases employee "security awareness."

Kevin is the world's top cybersecurity speaker. Click here for more information:
https://www.mitnicksecurity.com/speaking/speaking-engagement-requests-for-kevin-mitnick

As a second-best option, because it is Cyber Security Awareness Month, CyberheistNews subscribers can also give out this no-charge, limited-time access to the Kevin Mitnick Home Internet Security course (expires on December 31, 2015). Send this to friends and family to keep them safe during the holiday season and prevent their machines from getting infected (which you get asked to fix.)

Site: https://www.knowbe4.com/security-awareness-training
Password: knowbe4

TalkTalk Hackers Demanded 122K in Bitcoin

TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial data. Sources close to the investigation say the company has received a ransom demand of approximately £80,000 (~USD 122,000 dollars), with the attackers threatening to publish the TalkTalk's customer data unless they are paid the amount in Bitcoin. Recently Ashley Madison was also hit with a ransom demand after a hack.

Much more at Brian Krebs' excellent blog:
http://krebsonsecurity.com/2015/10/talktalk-hackers-demanded-80k-in-bitcoin/

New Compliance Manager Template: 20 Critical Security Controls

The KnowBe4 Compliance Manager (KCM) simplifies the complexity of getting compliant and eases your burden of staying compliant year round. It minimizes much of the busy work associated with audits and compliance, and at the same time enables you and your team to remain productive through an audit cycle.

KCM now has the latest version of the Center for Internet Security - Critical Security Controls template updated. Here is the list of the controls:
http://www.sans.org/critical-security-controls

Many organizations use this list as a guideline for maintaining cyber security across their network. Let's have a look at Control Number 17.3 - Implement Security Awareness Training:

  • Implement a security awareness program that
    1. focuses only on the methods commonly used in intrusions that can be blocked through individual action.

    2. is delivered in short online modules convenient for employees.

    3. is updated frequently (at least annually) to represent the latest attack techniques.

    4. is mandated for completion by all employees at least annually.

    5. is reliably monitored for employee completion.
  • Validate and improve awareness levels through periodic tests to see whether employees will click on a link from suspicious e-mail or provide sensitive information on the telephone without following appropriate procedures for authenticating a caller; targeted training should be provided to those who fall victim to the exercise.


Kevin Mitnick Security Awareness Training (KMSAT) is a 100% fit with this control. The combination of KMSAT and KCM is a one-two punch to get and stay compliant with requirements. Get a KCM demo and see how it can cut your compliance time and budget in half:
https://www.knowbe4.com/products/knowbe4-compliance-manager

Social Engineering: Employees Could Be Your Weakest Link

Here is a useful article in ComputerWorld, again emphasizing the need for user education to make sure your networks stay secure. This is a good article to attach to an InfoSec budget request:

"Would your employees recognize a phishing email if they saw one? Social engineering, or the act of attacking the human element of information security, poses a significant risk to businesses. With the level of sophistication of cyberthreats increasing by the day, many organizations can greatly improve the steps they take to defend against these types of attacks.

Cybercriminals have long used phishing and other social engineering methods to trick their victims into providing access to confidential data, such as passwords, Social Security numbers or account numbers. But those techniques are growing in sophistication, according to Verizon’s 2015 Data Breach Investigation Report.
http://www.verizonenterprise.com/DBIR/2015/

In addition to the tried-and-true method of sending legitimate-looking emails to unsuspecting victims, cybercriminals are now using social media and other popular platforms to launch their attacks. With many of these phishing schemes targeting employees, business leaders should be aware of the risks that social engineering can pose to their operations, reputation and customers. More:
http://www.computerworld.com/article/2996606/cybercrime-hacking/social-engineering-employees-could-be- your-weakest-link.html?

John McAfee For Cyber Security President

Steve Morgan at Forbes said: "Say what you will about John McAfee. If you’ve been following the media stories on him over the past several years, then you may say that he runs with a dangerous crowd. McAfee is the first one to say that he may have laughed a bit too loud, but he says that he’s never hurt anyone.

John McAfee is running for President under the Cyber Party ticket. He has told the media that his candidacy is driven less by any long held desire to become President, and more by a calling to protect the U.S. against cyber threats from hostile anti-American nations including China and Russia.

McAfee has a cyber tune that we should all listen to. It is his Cyber Security Doctrine, and like any great song it has a very powerful message. The message is that the American people, the Presidential candidates, and the media who follow the candidates, should all be thinking long and hard about cybersecurity."

Obviously McAfee does not stand a snowball's chance in hell to make it in the White House, but he does have a very well formulated program that you should have a look at and see which candidate comes closest:
http://cybersecurityventures.com/john-mcafee-cybersecurity-doctrine/


Cyberheist 'FAVE' LINKS:
This Week's Links We Like, Tips, Hints And Fun Stuff

 




Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews