CyberheistNews Vol 6 #30 |
Celeb Hacker Who Phished Nude Images Gets Six Months In Prison |
And why are we headlining with this? The guy was a technology n00b.
He social engineered his celebrity victims using simple credential phish emails, an easy cut & paste job in his own words.
Andrew Helton from Oregon pleaded guilty to hacking celebs' emails and stealing explicit images earlier this year. District Judge John A. Kronstadt sentenced him to six months in prison and two years of supervised release.
Between March 2011 and May 2013, Helton used a simple phishing scheme to steal the usernames and passwords of 363 Apple and Google email accounts including those of many celebrities. Once he had access to his victims' email accounts he was able to access all of the contents of their email accounts including 161 sexually explicit or nude images of thirteen of his victims.
Helton's lawyer said his client shouldn't be sent to prison at all. He argued that the defendant only used the most basic phishing technique. Helton sent out emails that looked like they were from Apple and Google, asking the victims to verify their accounts by clicking on a link that led to a fake website.
"There was no expertise involved. All I did was essentially copy and paste," the defendant said, serving as a reminder that security awareness training is a *must* for everyone, not just celebs.
Trust me, you can't trust anyone online. :-)
|
Scam Of The Week: RNC Attendees Get Hacked Through Fake Wi-Fi Networks |
The PR people at Avast decided to have some fun and created a series of fake Wi-Fi networks at various locations around the Republican National Congress in Cleveland.
Avast’s team set up several networks, using names such as "Trump Wifi" or "Google Starbucks," which were designed to look as though they were set up for convention attendees. Upon connecting, trusting a random and unprotected network they found in a public setting, the users unwittingly gave Avast access to spy on their devices.
Over the course of a day, Avast found over a thousand attendees that were completely negligent in their device’s security. Over 60 percent of the users who connected had their identity completely exposed, and slightly less than half of them checked their email or used messenger apps.
So, here is what I suggest you send to employees, friends and family. You're welcome to cut/paste/edit:
A security company decided it would teach people a lesson and set up several fake Wi-Fi access points around the Republican National Convention site in Cleveland last week.
Over the course of a day, more than 1,000 attendees used these open, unprotected Wi-Fi hotspots to check their mail, used smartphone apps, and even played Pokemon while everything they did was looked at by the security researchers. Imagine if they had been bad guys.
You should always watch what Wi-Fi hotspots you connect to, and use a VPN to help keep your sensitive information out of the hands of hackers.
Would be interesting if they did the same thing at the Democrats' convention and compare the results. Read more about Avast's findings in their press release, they have a bunch of stats on who did what. It's not pretty: https://press.avast.com/en-gb/amidst-charged-cyber-security-dialogue-republican-national-convention-attendees-show-negligent-behavior
|
At BlackHat USA 2016: A Complimentary Tool For Spear Phishing Twitter |
A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX.
Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it. Yikes.
While you are at BlackHat 2016, come visit the KnowBe4 booth 1566, meet Kevin Mitnick between 5-7pm August 3rd and get his lockpick business card. Business Hall Hours: Wednesday, August 3 – 10:00-19:00 Thursday, August 4 – 10:00-17:00
Black Hat USA 2016 Mandalay Bay - Las Vegas, NV July 30 - August 4, 2016 Visit KnowBe4 us booth 1566 https://www.blackhat.com/us-16/
|
New Symantec Report On Ransomware Statistics |
The average ransom demanded by hackers jumped to 679 dollars -- up from 294 dollars -- at the end of 2015. With 31% of global infections, America continues to be the most affected country by ransomware between January 2015 and April 2016, the report noted.
Realizing the potential for higher profits, cyber criminals are increasingly targeting the business space and employees in organizations made up 43% of ransomware victims.
According to Symantec, 2015 was a record year with 100 new ransomware strains discovered, and all but one of the new variants discovered so far in 2016 are crypto-ransomware which is very often impossible to decrypt.
F-Secure "Customer Journey" Of Getting Your Files Back
F-Secure did an evaluation of ransomware infections and how to get your files back if you don't have backups: three out of four ransomware criminal gangs were willing to negotiate the ransom fee. Here are some highlights:
- Those strains with the most professional user interfaces are not necessarily also those with the best customer service.
- Crypto-ransomware gangs are usually willing to negotiate the price. Three out of four variants were willing to negotiate, averaging a 29% discount from the original ransom fee.
- Ransomware deadlines are not necessarily “set in stone.” 100% of the groups contacted granted extensions on the deadlines.
- One of the groups claimed to be hired by a corporation to hack another corporation – a kid playing a prank, or a sinister new threat vector?
Here is the F-Secure PDF with all the data: https://fsecureconsumer.files.wordpress.com/2016/07/customer_journey_of_crypto-ransomware_f-secure.pdf
|
Re: "Wow, the bad guys are moving fast with CEO Fraud" |
We sent you a NewsFlash last week with a real-world example of CEO Fraud. Bad guys targeted our new controller just a few weeks after she had started with us by monitoring us on LinkedIn. I was asked if there is a way to block that, apart from stepping all employees through security awareness training and configuring your email server against spoofing. (by the way, here is how you can find out if bad guys can spoof you): https://info.knowbe4.com/domain-spoof-test-eb
Well, there something you can do in LinkedIn!
If you onboard new staff in high-risk positions like C-level execs, HR or Accounting, you should tell them to turn off "Sharing Profile Edits" in LinkedIn.
That way, anyone who may be following or connected to an employee that maintains a LinkedIn profile, any changes made to their profile will not appear in the LinkedIn wall or main page. This will help thwart anyone watching any of you at your company.
It's a simple switch under LinkedIn Settings/Privacy/Blocking and Hiding. Note: It's not 100% effective, but works most of the time, you may have noticed that LinkedIn is a bit buggy :-)
|
Warm Regards, Stu Sjouwerman |
|
|
|