Security News |
2015 Top 5 KnowBe4 Blog Posts |
- Apple's OS X Security Honeymoon Is Over: 41,365 views
https://blog.knowbe4.com/apples-os-x-security-honeymoon-is-over
- The Seven Deadly Social Engineering Vices: 19,079 views
https://blog.knowbe4.com/bid/290552/The-Seven-Deadly-Social-Engineering-Vices
- Antivirus Isn't Dead, It Just Can't Keep Up: 16,219 views
https://blog.knowbe4.com/antivirus-isnt-dead-it-just-cant-keep-up
- KnowBe4 got a CEO Fraud phishing attack. Wrong Mark!: 12,641 views
https://blog.knowbe4.com/knowbe4-got-a-ceo-fraud-phishing-attack.-wrong-mark
- Near-flawless Social Engineering attack spoiled by single flaw: 9,824 views
https://blog.knowbe4.com/near-flawless-social-engineering-attack-spoiled-by-single-flaw
|
Credit Union CEO Fraud Horror Story |
I received this the last day of the year from a Director of IT Security who works at a mid-size credit union. "Stu, I think you’ll be interested in my story. If you want to share it, just anonymize it sufficiently. I’ve been very concerned about Business Email Compromise (BEC), particularly because government entities have continually sounded the warning. It’s obviously a very fast way to lose a lot of money, so I determined to prove our own controls. I visited our Finance department head. Did she know about BEC? Yes, she said. Was she sure that we couldn’t be fooled into falling for this scheme? She was very emphatic that this couldn’t happen here with the controls we had in place. Well, says I, how about a test? She agreed, and the game was on. I explained the exercise to our CEO, who agreed to let me spoof his email address. Fortunately for me, he had just recently requested a wire on behalf of one of our CUSOs. Perfect. I originated a phishing message in the KnowBe4 system using the recent wire request as additional bait (hey, sorry folks – I forgot about this one; please expedite ASAP. Sorry, my bad). I kept our Finance head in the loop, so there could be no way any funds actually left the credit union. She kept insisting that nothing was going to happen. The big day arrived, and I kicked off the campaign to send the request to the Finance group responsible for processing wires. We didn’t have long to wait. Two minutes after transmission, Person 1 took the email and passed it along to Person 2, who went straight to the Finance head’s office. This is exactly what is supposed to happen. However, our Finance leader took a little jolt. She was expecting to be informed that the group found the message suspicious. Instead, she was asked to confirm the wire so it could move along. A little chill went down her spine. She let the cat out of the bag at that point, and called her group together for a chat. In the end, it was determined that the wire would never have been sent. However, she was very worried that there wasn’t more immediate awareness of the scheme before it reached her. The main reason their guard was let down just a little was “it came from our CEO”. She used the opportunity to drive home the necessity to follow procedure no matter who it was – our CEO, the POTUS, or Stu Sjouwerman. Lessons Learned:
- Test, test, test – no matter how comfortable you think you are, nothing beats a good test for assurance.
- If you have upper management’s support, your job is SO much easier. If you don’t have it, I can only recommend one option – update your resume; you’ll never win.
- A good service provider like KnowBe4 can help you accomplish your information security program’s objectives."
Excellent lessons I must say. It's worth doing this kind of test in your own organization and see what the results are. Organizations that discover they're victims of business email compromise exploits should immediately contact law enforcement officials to report the attacks, says Camelia Lopez, a federal prosecutor for the Eastern District of Texas. Here is a short video that explains more: http://www.cuinfosecurity.com/fighting-business-email-compromises-a-8770 Right after I sent this to our customers, one of them answered back with this: "I can do you one better… the following is true and first hand. I still have the emails." And he's right, that one _is_ better. Read it here: https://blog.knowbe4.com/credit-union-chilling-ceo-fraud-story
|
Chinese Hacker Steals Data From Airline, Uses It To Sell Tickets |
You can use this to send to your users:
Recently, a 19 year old Chinese guy was nabbed and charged with stealing data from a yet unknown airline. He exfiltrated flight booking information of more than a million of the airline's customers. Next, and here is the crafty part, he spoofed the airline in a text message to the airline's customers and claimed their flight had been cancelled and lured them into rebooking their flights with him and stole that money. You have to give it to him, this is pretty smart. So, remember to THINK BEFORE YOU CLICK. Do not trust any phone call, email or text message that asks you for personal information such as credit card data. Always contact the company yourself, do not click on links, open attachments or dial phone numbers in emails. Call the number on the credit card or pull the number from the website where you went yourself.
|
Why CEOs Are in the Dark About Cyber-Security |
A new study about the gap between executive awareness and enterprise security finds that the majority of IT security professionals believe CEOs make decisions with little regard to security. IT security pros also believe management teams are not regularly briefed on cyber-security issues. The survey, commissioned by cyber-security company CyberArk, was conducted by Dimensional Research and captured the opinions of 308 IT security professionals worldwide. The goal was to capture hard data on visibility and support for security programs at the executive level and determine which metrics are used to define security effectiveness. "Compliance does not equal security. It can lull a CEO into a state of complacency because all it demonstrates is the simple checking of a box without context for responsible levels of information protection," said John Worrall, chief marketing officer of CyberArk. "Security professionals are briefing executives on the wrong information. They need to arm their CEOs and executive teams with information that matters, such as threat detection risks versus compliance and system availability." More at: http://www.cioinsight.com/security/slideshows/why-ceos-are-in-the-dark-about-cyber-security.html
|
Insider Data Breach: The Hidden Hack Attack |
According to the Open Forum by American Express, 36% of company data breaches are caused by employee mistakes. For instance, employees could very well send private company information, such as client or customer reference lists, to their personal emails, provide online account credentials to strangers, or leave online company data unattended, which can all lead to sensitive data exploitation. These insider related data leaks can be directly attributed to lack of oversight, accountability, and, more importantly, proper training from their employers. http://www.business2community.com/cybersecurity/insider-data-breach-hidden-hack-attack-01410396#MYiBtQBlYitB8ZPG.97
|
Survey From Our Friends At Malwarebytes. Win A Surface Pro 4 |
Our friends at Malwarebytes would like your opinion about endpoint security solutions and your preferences. The survey takes about 5 minutes and will enter you in a raffle for a new Surface Pro 4. Here is the link: https://www.surveymonkey.com/r/MBEndpoint
|
|
|
|