CyberheistNews Vol 6 #19 |
Scam Of The Week: Hidden Dangers Of HTML Attachments |
The last six to nine months, we have seen a lot of .DOC and .JS file attachments as malicious attachments used for mainly ransomware attacks.
However, our researchers have spotted an up & coming trend; malicious HTML "attackments" that are used for credentials phishing. There are a few reasons why the bad guys have taken a liking to HTML:
- Reduced chance of antivirus detection
- Users are familiar with this, and do not see harm
Bad guys are using .HTML attachments to spoof bank login pages, popular online services, and secure messages from financial institutions.
Inevitably, your filters are going to miss some of these, and I suggest you send the following to your employees as part of your ongoing awareness campaign:
Internet criminals never stop trying to get past our spam filters and trick you into clicking on phishing links or opening malicious email attachments.
This is a warning against a new type of attack that uses an HTML attachment which tries to scam you into entering your user name and password.
HTML attachments are often used by banks for secure messages, so you might think that these are always safe. They are NOT. If you get an email with an HTML attachment, be just as careful as always and do not open it unless you have asked for it, or have verified with the sender that the attachment is legit.
Remember: Always Think Before You Click!
We have a new blog post with lots more detail, background, examples and screenshots here: https://blog.knowbe4.com/the-hidden-dangers-of-.html-attachments
|
InfoSec Analyst: "We Make People Suck At IT Security" |
Ex-Gartner IT Security Analyst Ben Tomhave calls himself an infosec obsessive and I admire his insightful analyses when they appear. This time he commented on the recent attacks that followed the Verizon Data Breach reports.
His blog post is an excellent perspective on the current state of security and he broke it apart in three sections. The first is about the woes of patching and he nails it. The second is about people and I'll quote him here:
"The second major theme from DBIR and myriad other reports is that people continue to be the weakest link in security models. Now, this is for a number of reasons, most of which revolve around the fact that we give them easily exploited systems and then somehow expect them to magically protect these vulnerable boxs without any tools for self-defense.
"So, ultimately, as infosec and IT professionals, it's our fault that people suck, because we're making them suck. Think about that the next time you want to mutter "stupid users" over the latest compromise.
"Beyond the fundamental failures of expecting people to not get pwnd in a vulnerable environment, there are other things that can and should be done. Doing security awareness in the traditional, stupid, CBT-driven way is not it. Instead, we need to do a far better job engaging our target audience and embed practices and awareness into their DNA.
"You cannot do this in one standard cookie cutter manner, but instead must invest in more progressive methods."
I could not agree more. I have worked very hard these last five years to provide you with a platform you can use to better manage the problem of social engineering and is also easy, affordable and fun to use. Check all the features here: https://www.knowbe4.com/security-awareness-training-2016-features/
The third part of Tomhave's analysis relates to the controversy about the source data used for the Verizon report, and is very entertaining just by itself. Warmly Recommended! http://www.secureconsulting.net/2016/05/dbir-2016-lots-of-noise-and-dr.html
|
Brunswick Corp.'s 13,000 Workers' W-2 Data Compromised |
Brunswick Corp. reported on May 3 that it was victimized by a spear phishing scam that netted the W-2 information for possibly all 13,000 current and former company employees.
On April 29, 2016 a Brunswick employee responded to what was thought to be a legitimate email from management requesting the W-2 information. In fact, the data was sent to an unknown and unauthorized and individual.
Brunswick noted "that this was not a technical intrusion of its information systems, but rather a criminal scam that plays on human nature."
I just learned that this type of data loss costs about $300 per employee in combined legal fees and buying identity theft protection. Do the math, that is 3,900,000 dollars in damage. Compare that to just 7.50 per employee per year for Platinum Level security awareness training at that volume discount level. You just saved a whopping 3,802,500 budget dollars and you're the IT superhero.
|
Should Someone Who Falls For A W-2 Phishing Attack Be Fired? |
The Alpha Payroll company fired an employee who fell for a W-2 phishing scam. This CEO Fraud attack compromised all of the 2015 W-2 records produced by the firm for their clients. Steve Ragan has the story at CSO, it is an interesting read and a more interesting discussion. Here is the link to the story: http://www.csoonline.com/article/3064675/security/alpha-payroll-fires-employee-victimized-by-w-2-phishing-scam.html
I'd like your opinion on this and I created a super simple 2-question survey that you can use to give me your feedback. Should someone who falls for a W-2 phishing attack be fired? In the next issue I will report back what you told me! https://www.surveymonkey.com/r/W-2fired
|
Don't Miss The May Live Demo: New-School Security Awareness Training |
Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. Old-school security awareness training doesn’t hack it anymore. More than ever, your users are the weak link in your network security.
Join us tomorrow Wednesday, May 11 at 2:00 p.m. (EDT) for a 30-minute live product demonstration of the innovative Kevin Mitnick Security Awareness Training Platform to see the latest features and how easy it is to train and phish your users:
- Send Phishing Security Tests to your users and get your Phish-prone percentage.
- Roll out Training Campaigns for all users (or groups) with follow-up emails to “nudge” incomplete users, as well as point-of-failure training auto-enrollment.
- NEW EZXploit™ patent-pending functionality that allows an internal, fully automated "human pentest”.
- NEW USB Drive Test™ allows you to test your user’s reactions to unknown USBs they find.
- Advanced Reporting to watch your Phish-prone percentage drop, with great ROI.
PS: If we have time we'll show you the new Browser Plugin Vulnerability Detection we just added last week!
Find out how thousands of organizations have mobilized their end-users as their first line of defense: Register Now: https://attendee.gotowebinar.com/register/6490307561967355137
|
Warm Regards, Stu Sjouwerman |
|
|
|