DOJ Charges Hackers from the Chinese People Liberation Army with 2016 Equifax Data Breach



chinese-equifax-hackFour hackers have been charged with hacking the U.S. credit reporting agency where data on U.S. citizens and proprietary Equifax secrets were stolen.
 
The saga finally comes to some resemblance of closure. One of the world’s largest data breaches – a total of nearly 150 million records – puts names to its’ assailants.
 
This week, the U.S. Department of Justice announced charges against four Chinese hackers believed to be associated with the Chinese government. Leveraging a java vulnerability and compromised credentials to move laterally within Equifax’s network, the hackers were able to slowly exfiltrate data over a period of 76 days. 
 
According to security vendor CrowdStrike, web server attacks – like the one responsible for the initial access to Equifax – are the second most prevalent attack vector. The number one attack vector (by more than a factor of 2:1 over web server attacks) remains spear-phishing. Bad guy attachments and links dominate, putting unsuspecting users firmly in attack crosshairs.
 
The Equifax attack should be a warning to ensure all web-facing applications and systems are constantly in an updated state. Vulnerability scanning is a great advanced step to ensure this is the case. But equally, organizations need to heed the data demonstrating clearly that the greater threat is email-borne attacks seeking to fool users into clicking on malicious content.
 
Organizations can employ Security Awareness Training as a means to keep users constantly updated on attack methods, social engineering tactics, new scams – and what to do about it should they come across an attack like this.
 
There will be plenty more attacks – hopefully none in the cyber stratosphere like the Equifax breach. It’s imperative to ensure your users – just like your web servers – are kept up to date on the latest methods of attack to minimize the threat surface.

Can hackers spoof an email address of your own domain? 

Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to commit "CEO fraud", penetrating your network is like taking candy from a baby. 
DST

Find out now if your domain can be spoofed. Request your free Domain Spoof Test so you can address any mail server configuration issues that are found.  It's quick, easy and often a shocking discovery. Find out now if your email server is configured correctly, many are not!

Try To Spoof Me!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/domain-spoof-test/ 

Subscribe To Our Blog


Nuclear Ransomware Webinar




Get the latest about social engineering

Subscribe to CyberheistNews