Friday, January 17, 2025
Home Blog Page 18

Credit Card Scams and How to Avoid Them in 2022

0

Credit card scams are on the rise, with billions lost annually to crooks and fraudsters.

Both individuals and businesses can be at risk of credit card scams, which are now recognized as the most common form of identity fraud – there were half a million cases in the US last year alone. Fortunately, you can take several simple steps to avoid getting caught up in a con – here’s what you need to know.

Only Buy From Trusted Websites

One of the most common ways that scammers get hold of victims’ credit card details is via cloned or fake websites. These sites may appear totally legit and could even masquerade as a well-known brand’s website but have, in fact, been set up by crooks purely to harvest unsuspecting visitors’ card details.

Avoid this by only buying from trusted sites. To do this, start by looking at the website’s address bar to ensure it’s that of the business you think it is. Scammers deploy tricks such as replacing the odd letter with a special character (such as a $ for an S) so that, at first glance, the website address seems legit.

Also, ensure that the address starts with ‘HTTPS’ rather than just ‘HTTP’ – this indicates that it’s secure and mechanisms are in place to protect your payment and personal details.

Use Secure Payment Processing Systems

How you process customers’ card transactions is crucial for businesses to avoid clients’ details falling into the wrong hands.

Ensure your merchant service provider offers the highest levels of security possible – some are specifically designed for what is considered ‘high-risk’ industries. It’s also vital to ensure that any physical copies of receipts your business holds are kept securely. This means keeping them locked away, ideally in a safe, where they can’t be easily accessed.

Check Your Statements Regularly

A low-tech but extremely effective way to guard against credit card scams is to check your card statements regularly: ideally, once or twice a fortnight.

Many scammers, having gotten hold of your card details, will siphon off very small amounts of money initially, so you’re unlikely to notice. After a while, they may use your card details to make an expensive purchase, potentially clearing out your available funds.

Go through your statements with a fine tooth comb, looking for anything unusual or a payment to a business or individual you don’t recognize. If you spot something suspicious, get in touch with your bank or card issuers immediately to let them know what’s happened.

Protecting Your Card

Scammers don’t just operate in the digital world: it’s important to take steps to ensure the safety of your physical card.

Crooks now have access to devices that can potentially harvest your card details even when it’s safely tucked away in your wallet or a pocket – the scammers simply need to be physically close to you – which can be surreptitiously done while waiting in line to pay, for example, or walking around a busy store.

Now cardholders on the market will block out attempts to read these details – an easy, cost-effective way to guard against fraudsters. Alternatively, although unconfirmed, some suggest wrapping a card in aluminum foil will also have the same protective effect.

Keep Your Devices Secure

Another way scammers can access your credit card is via the devices you use. To prevent being hacked, ensure you not only deploy high-quality virus and malware protection but also update it regularly.

Avoid, too, using public Wifi connections, especially to make purchases. These connections are relatively easy for hackers and snoopers to access, allowing them to get hold of your card and personal details.

Consider using a VPN (a virtual private network) to connect to the internet, which provides a much more secure way to be online and makes even connecting via public Wifi safe.

A VPN works by protecting your device’s IP address and encrypting all internet traffic – even in the unlikely event that a hacker gains access to your data, they won’t be able to interpret it.

Stay Safe from Phishing Attacks

Phishing attacks are on the rise and are a common way that con artists commit credit card fraud. Typically, an email is sent to an unsuspecting recipient, often appearing to be from a legit business or brand or possibly from the recipient’s bank. However, when the victim clicks on the link and enters the requested details, they’re actually giving their information to a scammer.

Always be on guard for phishing emails: never click on a link unless you are absolutely sure the message is from who it says it is. Poor spelling, grammar, or layout is a major red flag of a phishing scam, as is an incorrect ‘from’ address. To check the latter, simply hover the mouse over the sender’s name, and see if this matches the company that the message purports to be from.

Staying Safe from Scams

Around 10% of the adult population in the US falls victim to credit card scams every year – avoid being part of this statistic by taking the relevant steps outlined above to stay safe and secure from fraudsters.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

CISA Tells Organizations to Patch Linux Kernel Vulnerability Exploited by Malware

0

The US Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a Linux kernel flaw to its Known Exploited Vulnerabilities Catalog and instructed federal agencies to address it within three weeks.

The vulnerability is tracked as CVE-2021-3493 and it’s related to the OverlayFS file system implementation in the Linux kernel. It allows an unprivileged local user to gain root privileges.

CVE-2021-3493 has been exploited in the wild by a stealthy Linux malware named Shikitega, which researchers at AT&T Alien Labs detailed in early September. Shikitega is designed to target endpoints and IoT devices running Linux, allowing the attacker to gain full control of the system. It has also been used to download a cryptocurrency miner onto the infected device.

As part of the malware’s infection chain, two Linux vulnerabilities are exploited for privilege escalation: CVE-2021-3493 and CVE-2021-4034.

CVE-2021-4034 is named PwnKit and it impacts Polkit’s Pkexec, a SUID-root program found in all Linux distributions. CISA warned about this vulnerability being exploited in attacks in June. Cisco mentioned exploitation in a recent report describing a Chinese attack framework and its associated RAT, which targets Windows, Linux, and macOS systems.

The news reports published when Shikitega’s existence came to light focused on the malware itself and did not highlight the fact that this appeared to be the first known instance of CVE-2021-3493 being exploited for malicious purposes.

Technical details and proof-of-concept (PoC) exploits for this vulnerability are publicly available.

CISA has now added the flaw to its Known Exploited Vulnerabilities Catalog and has instructed federal agencies to patch their systems until November 10. While federal agencies are required by a binding operational directive to fix these flaws, CISA strongly urges all organizations to prioritize patching for vulnerabilities listed in its catalog.

In addition, CISA has added a recent Zimbra vulnerability to the catalog. The security hole was only patched after exploitation began.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies’ Data Leak

0
microsoft

Microsoft this week confirmed that it inadvertently exposed information related to thousands of customers following a security lapse that left an endpoint publicly accessible over the internet sans any authentication.

“This misconfiguration resulted in the potential for unauthenticated access to some business transaction data corresponding to interactions between Microsoft and prospective customers, such as the planning or potential implementation and provisioning of Microsoft services,” Microsoft said in an alert.

The misconfiguration of the Azure Blob Storage was spotted on September 24, 2022, by cybersecurity company SOCRadar, which termed the leak BlueBleed. Microsoft said it’s in the process of directly notifying impacted customers, reports thehackernews.

The Windows makers did not disclose the scale of the data leak, but according to SOCRadar, it affects more than 65,000 entities in 111 countries. The exposure amounts to 2.4 terabytes of data that consists of invoices, product orders, signed customer documents, partner ecosystem details, among others.

“The exposed data include files dated from 2017 to August 2022,” SOCRadar said.

Microsoft, however, has disputed the extent of the issue, stating the data included names, email addresses, email content, company name, and phone numbers, and attached files relating to business “between a customer and Microsoft or an authorized Microsoft partner.”

It also claimed in its disclosure that the threat intel company “greatly exaggerated” the scope of the problem as the data set contains “duplicate information, with multiple references to the same emails, projects, and users.”

On top of that, Redmond expressed its disappointment over SOCRadar’s decision to release a public search tool that it said exposes customers to unnecessary security risks.

SOCRadar, in a follow-up post on Thursday, likened the BlueBleed search engine to data breach notification service “Have I Been Pwned,” enabling organizations to search if their data was exposed in a cloud data leak.

The cybersecurity vendor also said it has temporarily suspended any BlueBleed queries as of October 19, 2022, following Microsoft’s request.

“Microsoft being unable (read: refusing) to tell customers what data was taken and apparently not notifying regulators – a legal requirement – has the hallmarks of a major botched response,” security researcher Kevin Beaumont tweeted. “I hope it isn’t.”

Beaumont further said the Microsoft bucket “has been publicly indexed for months” by services like Grayhat Warfare and that “it’s even in search engines.”

There is no evidence that the information was improperly accessed by threat actors prior to the disclosure, but such leaks could be exploited for malicious purposes such as extortion, social engineering attacks, or a quick profit.

“While some of the data that may have been accessed seems trivial, if SOCRadar is correct in what was exposed, it could include some sensitive information about the infrastructure and network configuration of potential customers,” Erich Kron, security awareness advocate at KnowBe4, told The Hacker News in an email.

“This information could be valuable to potential attackers who may be looking for vulnerabilities within one of these organizations’ networks.”

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Avast Cyber Awareness Quiz

0

Avast has launched a Cyber Awareness Quiz website to mark 2022’s Cyber Awareness Month.

Take the cyber awareness quiz and learn how you can navigate discussions with your family around the complexities of technology and digital threats. Our goal is to help you, the “sandwich generation,” keep both ageing parents and young children safe online.

See more at https://avastcyberquiz.com/

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

35+ Actionable Tips: Cybersecurity Awareness Month 2022

0

Table of Contents

Best practices for defeating most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete

Cybersecurity Awareness Month, which was previously known as National Cybersecurity Awareness Month, is in its 19th year. Launched under the guidance of the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA), it aims to help Americans stay safe and secure online. This year’s campaign theme – See Yourself in Cyber – is focused on the “people” equation of cybersecurity, while promoting how to recognize and report phishing, the use of strong passwords, password managers and multi-factor authentication, and applying software updates. While these tactics are certainly a great place to start, organizations need to go beyond these fundamental steps to strengthen their cyber resilience.

The last year has proven to be a game-changing year for cybersecurity: Cyber breaches are bigger and worse than ever. Hardly a week goes by without headlines about some new devastating cyberattack. In fact, the Federal Bureau of Investigation’s Internet Crime Report (PDF), saw a 7 percent increase in complaints, resulting in losses of nearly $6.9 billion. The surge in cyberattacks directly correlates to the broadened attack surface – specifically, the sudden shift to hybrid working. Cyber adversaries capitalized on the rapidly changing environment by intensifying their attacks and targeting the weakest link in the attack chain – the remote worker. Furthermore, professional hackers, cybercriminal syndicates, and nation-states are exploiting the supply chain, increasing their blast radius and overall damages.

Implementing an effective enterprise security strategy requires an understanding of hackers’ tactics, techniques, and procedures (so-called TTPs). In this context, it is vital for security practitioners to review the entire cyberattack lifecycle to gain a full grasp of the areas that need to be addressed as part of an in-depth cyber defense approach.

Here are five best practices for defeating against most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete. 

1) Put your Trust in Zero Trust

Zero Trust means trusting no one – not even known users, applications, or devices – until they have been verified and validated. Zero Trust principles help enterprises enforce dynamic, contextual network access policies to grant access for people, devices, or applications. This entails analyzing device postures, application health, network connection security, as well as user activity to subsequently enforce pre-defined policies at the endpoint rather than via a centralized proxy. 

For most organizations, the path to Zero Trust should start with identity paired with endpoint resilience to create a more secure work-from-anywhere user population. Applying Zero Trust principles can help companies avoid becoming the next breach headline, including the brand damage, customer loss, and value degradation that typically comes with it.

2) Focus on What Matters Most

Gartner estimates that global spending on cybersecurity will hit almost $173 billion annually in 2022, yet the breaches keep on coming. That’s probably because a large chunk of that money is being funneled toward solutions that don’t address modern security problems and cover the ever-growing attack surface of modern enterprises. Hackers, for their part, are taking advantage of the fact that organizations and their workforce are relying on mobile devices, home computers, and laptops to connect to company networks to conduct business. In turn, these endpoint devices become the natural point of entry for many attacks. In fact, a recent Ponemon Institute survey revealed that 68 percent of organizations suffered a successful endpoint attack within the last 12 months.

Understanding not just the tail end of the cyberattack kill chain, but also focusing on initial attack vectors like endpoints provides a roadmap for aligning preventive measures with today’s threats. It is vital to maintain granular visibility and control over access points to prevent and remediate vulnerabilities that can and often will surface on them. In today’s work-from-anywhere era, assuring endpoint resilience is a vital element of a successful in-depth cyber defense strategy.

3) Secure your Network Access

In today’s perimeter-less environment, security practitioners can no longer assume implicit trust among applications, users, devices, services, and networks. In fact, 51 percent of organizations have seen evidence of compromised endpoints being used to access company data via the corporate network. That’s why many organizations have started to embrace a Zero Trust approach and are considering augmenting their conventional network access security concepts such as virtual private networks (VPNs) and demilitarized zones (DMZs) with Zero Trust Network Access (ZTNA) solutions. 

ZTNA solutions create an identity- and context-based, logical access boundary around an application or a set of applications. Access is granted to users based on a broad set of factors, for instance, the device being used, as well as other attributes such as the device posture (e.g., if anti-malware is present and functioning), time/date of the access request, and geolocation. Upon assessing the contextual attributes, ZTNA then dynamically offers the appropriate level of access at that specific time. Since risk levels of users, devices, and applications are constantly changing, access decisions are made for each individual access request.

4) Balance your Security Investments

It’s a fact that we can never eliminate cyber risk entirely, but we can manage it more effectively with “Left and Right of Boom” processes and procedures, creating a winning strategy by splitting an organization’s cybersecurity investments between strategic preparedness, prevention, and incident response. Finding the right balance has become essential in determining an organization’s ability to anticipate, withstand, recover from, and adapt to attacks, or compromises on cyber resources. Gartner, in its “Maverick Research: You Will be Hacked, So Embrace the Breach” report is emphasizing that “to make a real difference to the impact of cybersecurity incidents, cybersecurity priorities must shift from defensive strategies to the management of disruption through resilience.”

5) Become Cyber Resilient

More and more security professionals acknowledge that modern enterprise infrastructures are made up of large and complex entities, and therefore will always have flaws and weaknesses that adversaries will be able to exploit. In this context, they propagate the concept of cyber resilience to ensure that an adverse cyber event (intentional or unintentional, i.e., due to failed software updates) does not negatively impact the confidentiality, integrity, and availability of an organization’s business operations.

Like Zero Trust, cyber resilience offers a blueprint to strengthen an organization’s security posture in today’s dynamic threatscape, establish security controls that require cyber adversaries to spend more time figuring out how to bypass them (which they often are unwilling to do, because time is money), and the means to recover from cyberattacks quickly and efficiently.

6. Slow down.

We’re all busy. But slowing down before you open an email, or thinking twice before you click on a link, could be the difference between a close call and a massive data breach. We sat down with KnowBe4’s Roger Grimes, who shared some great insights for spotting and preventing phishing and social engineering attacks — and his interview is a great resource to share with employees for Cybersecurity Awareness Month. Check out our interview on the psychology of social engineering.

7. Make cybersecurity accessible.

As we mentioned above, cybersecurity is everyone’s job. Are your teams equipped with simple tools and a clear understanding of their role in protecting data? Our Empowered Employee Report contains tips for selecting easy-to-use data protection tools, as well as our recommendations for getting teams invested in security — conversation starters, communication advice, and more.

8. Secure your cloud-hosted data.

Did you know that you can shield your cloud-hosted data from third parties — including the cloud providers themselves? Virtru data protection makes this possible: As an example, we are a Google-recommended key management partner for Google Workspace Client-Side Encryption. Check out our blog post on 5 myths surrounding cloud migration, and how you can ensure total privacy and control of your data in the cloud.

9. Unusual requests are red flags.

Even if an email appears to come from someone you know and trust, be cautious of any message that asks you to do something that could put you or your organization at risk — even if it appears to come from your boss or an executive. Phishing attacks now commonly use industry-specific terms, jargon, and client scenarios to foster a false sense of trust. As they learn, hacking groups can make these emails look increasingly realistic. Learn more in our blog post on social engineering.

10. Focus on the most impactful priorities.

“Everyone is seeing threats like bubbles in a glass of champagne, and they’re not being told, ‘Two of those bubbles matter more than all the other bubbles.’ Because of that, they’re not focusing correctly,” says KnowBe4’s Roger Grimes, author of A Data-Driven Computer Defense. Those two most important “bubbles” have been the same for 30 years, he says: social engineering and unpatched software. Discover more insights on how to effectively prioritize your security efforts in our Empowered Employee report.

11. Assess data protection across departments.

Whether you’re a global manufacturer, a small retail shop, a healthcare provider, a school, or a nonprofit organization, you have sensitive information that hackers can profit from, and that data can be found across every corner of your business. Every department needs data protection. Have conversations with team members across every department to get a sense of the kinds of sensitive information they’re handling, and whether it’s being protected: Employee and customer information, proprietary strategic data, financial records, PHI, PII, and more. You might be surprised by how much data you uncover.

12. Construct a safety net for human error.

We’re all human. We’ve all made mistakes around cybersecurity. The question is — when mistakes happen, what tools do you have to mitigate or prevent damage? Virtru helps you implement two valuable safety nets for human error: Data Loss Prevention rules that automatically encrypt certain types of data by default, and a “Revoke” feature, which lets you revoke access to shared data at any time — even if that data has already been shared and accessed outside your network. This helps you take immediate action to mitigate your risk.

13. Revisit your breach prevention plan.

With ransomware attacks and data breaches on the rise, it’s important to ensure your breach prevention and response plan is up to date, and that everyone understands their role in preventing and responding to an incident. When evaluating your breach prevention plan, ask yourself: Are we just protecting our systems and networks, or are we protecting the data itself, everywhere it travels?

14. Examine how you manage and share customer data.

Most companies have some kind of Customer Relationship Management (CRM) software to maintain client data. This information is often sensitive in nature, containing personally identifiable information (PII) and credit card/billing information. Ensure the data flowing through those platforms remains secure. For more on how to protect customer data, listen to our recent webinar on adding a layer of encryption to your SaaS applications.

15. Build trust with a commitment to security.

Trust can be your competitive advantage. In a world where so many companies take a lax approach to protecting their users’ privacy, you can build stronger relationships by demonstrating a commitment to security — for your customers, employees, and partners. Cybersecurity Awareness Month presents a great opportunity to communicate this with your audience, as well. Discover six ways to protect customer data and win trust.

16. Bridge the gap between work and home.

By highlighting the risks of ransomware to employees’ personal as well as professional lives, security teams can convey the consequences of cyber attacks in a more tangible way. When individuals understand the potential personal impacts of a data breach — such as the compromise of their own personal accounts — they’ll start to take security more seriously. Our Empowered Employee Report includes conversation starters and tips for connecting with employees.

17. A Zero Trust strategy creates maximum confidence.

Zero Trust treats every user and every system with equal caution. Everyone is on the same playing field, and it frees up your organization to create and collaborate with greater confidence that their data remains safe. Check out our tips for explaining Zero Trust to employees during Cybersecurity Awareness Month.

18. Know who holds the keys to your data.

For strong security, you’ll want to manage your own encryption keys — or select a trusted partner who can manage them for you, separately from your data. Check out our encryption key management guide for details on how to evaluate the right key management framework for your organization.

19. Highlight your organization’s security heroes.

Have an IT team of rock stars? What about colleagues who do a great job of encouraging strong security behavior among their peers? Celebrate these employees and give them some well-deserved recognition. This can go a long way to cultivate openness and engagement around cybersecurity. Download our Empowered Employee Report for more tips for fostering an engaged culture.

20. Calculate how much data is leaving your organization.

Data flows in and out of organizations at high velocity. It’s important to understand just how much data is being shared externally so you can effectively protect it. Use the Virtru Data Sharing Calculator to understand your potential risk for a breach — and learn how you can mitigate the impact.

21. Find your cybersecurity advocates.

You know those colleagues who are always the early adopters of new technology? How about those who are passionate about blockchain, or ethical AI? These can be your most powerful cybersecurity advocates. Harness the passion and interest of these individuals to help your organization adopt a consistent, strong security mindset — one of continuous learning and knowledge sharing. After all, data security is everyone’s responsibility.

22. Start an insider threat prevention program.

Most companies face far more danger from lack of attention or training by insiders than from actual malice, but it’s still crucial to understand the security risks both pose. Fostering a collaborative culture of security will earn employee buy-in, and provide better results (and morale) than a top down “everyone’s a suspect” approach. Check out our Guide to Creating an Insider Threat Program for tips on how to cultivate engagement.

23. Make it easy to collaborate securely.

For your teams to actually use your security tools, they have to be easy to use. In a Virtru case study, Chartered Management Institute’s Information Security Manager, Leroy Cunningham, said it well: “It’s great having all the bells and whistles, but if your end users don’t know how to use it, they won’t use it, and it’s as simple as that. I like how clean and simple Virtru’s product is, it’s a simple toggle switch to turn it on or off, and it gives us more autonomy.” Read our Chartered Management Institute (CMI) case study to see how they used Virtru to help break down data silos.

24. Approach security conversations with positivity.

There’s enough messaging around fear, uncertainty, and doubt in the cybersecurity world. We’ve found it’s far more effective to empower teams with simple tools, clear education, and positive messaging that gives them the confidence to do their jobs while protecting data. Page 3 of our Empowered Employee report contains several tips to evaluate the way you position your security messages to teams.

25. Examine your supply chain connections.

Whether it’s third-party software or hardware throughout the enterprise supply chain ecosystem, even “trusted” networks quickly become a risk in the absence of data access controls. Here are some of the supply chain risks to be aware of, and why data-centric access controls can help you mitigate those risks.

26. Connect with the “why.”

For schools, it’s protecting students’ safety and privacy. For healthcare providers, it’s safeguarding patients’ well-being. For companies, it’s protecting confidentiality and maintaining trust. Whatever your “Why” is, it’s vital to make that a central part of your story for the importance of protecting data.

Our “Why” — helping create a world where your data remains under your control, everywhere, without limiting your ability to innovate, share, and collaborate.

27. Don’t overlook data flowing through SaaS apps.

The average enterprise has over 500 applications, and every app amplifies your risk. Determine which of those applications transmit sensitive data (e.g., customer records, employee PII, data for analytics), and evaluate whether that data is being protected everywhere it’s shared.

28. Make it simple for distributed teams to share information.

More teams than ever are moving to a remote-first or hybrid environment. These distributed teams need sophisticated tools to collaborate and share information quickly  — with both internal and external partners. Virtru’s Secure Share encrypted file-sharing platform makes it simple for teams to send and receive information with external partners (like clients, business partners, board members, and others) with the confidence that it’s always protected. 

29. Secure data management makes a strong first impression.

The competition for top talent is high — and it’s important for companies to make a strong first impression on prospective new hires, both during the interview process and during onboarding. Show that you take security seriously and are committed to protecting their private data.

30. Make sure you’re protecting employees’ COVID-19 vaccine and test results.

Many HR teams are still collecting and managing COVID-19 vaccine and test data. That information can remain on file, but it may also need to be communicated to managers and team leaders. If that information needs to be shared via email or other collaboration flows, it’s essential that those messages are secured with end-to-end data protection. Our blog post provides some recommendations for securing employees’ private COVID-19 vaccination and test data.

31. Continue the cybersecurity conversation year-round, not just during Cybersecurity Awareness Month.

The key to engaging your employees around cybersecurity is to make security a habit, an everyday part of your organization’s life. Just like any other habit, it’s about small, continuous shifts that add up to a big impact.

32. Ditch your reused passwords.

Data breaches often leak user credentials, including passwords. This can be hugely damaging for people who reuse the same passwords across accounts — and each additional account amplifies your risk. Protect yourself by using a password manager to create complex, unique passwords for each account. This might be a weekend project for some, but it’s absolutely worth the effort, and a great way to start off Cybersecurity Awareness Month. For more security tips, check out our Empowered Employee Report.

33. Check your security settings.

A staggering amount of information is sent via email every second, so it’s essential that all that data is properly secured. For practical ways to get started, check out our guide for 5 steps to secure your data in Gmail.

34. Apply multi-factor authentication.

It may add an extra step to your login process, but it’s well worth the extra 2 seconds. This way, if someone gets a hold of your password, they won’t be able to access your accounts without access to your phone or other verification information. Check out other best practices for email security.

35. Understand end-to-end encryption and how to use it.

End-to-end encryption ensures your data remains safe from the moment it’s created, to the moment it’s shared. Check out our blog for the answer to the question, “What is end-to-end encryption?”

36. Add end-to-end encryption to your email.

Email encryption doesn’t have to be cumbersome. In fact, it can be an easy, natural part of users’ workflows check out this guide for more information.

This article was curated from a number of other useful cyber awareness month resources.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

British Company Kingfisher Insurance Confirms LockBit Attack

0
databreach

Earlier this week, Kingfisher’s name appeared on the LockBit ransomware group’s leak site alongside claims of 1.4TB of the company`s data having been stolen, including personal details of employees and customers.

The company acknowledged the attack on its IT systems but claims threat actors couldn`t have stolen as much data as they claimed.

More on the Matter

On Monday, claims about a breach targeting the servers of the British Kingfisher Insurance company have surfaced on LockBit’s leak site. According to the ransomware gang, the dataset includes personal data of employees and customers as well as contacts and corporate mail archives belonging to Kingfisher, as well as well as one of the company’s vehicle insurance brands, First Insurance.

The threat actors posted several email addresses that appear to belong to Kingfisher Insurance staff, as well as passwords to several management system accounts, such as Workday and Access.

Cybernews describes Kingsfisher as a UK insurance company owning several prominent UK-based insurance brands, such as Classic Insurance Services, ClubCare Insurance, Cork Bays & Fisher, First Insurance to name a few.

The British company’s IT team reportedly took to blocking all external access and affected servers were brought offline as soon as the cyberattack became known, but the investigation concluded that business operations have not been impacted.

It is impossible for the criminal group behind this incident to have taken 1.4TB of data from the servers they indicate.

Source

LockBit as a Threat

A report by threat intelligence firm Digital Shadows shows that in the second quarter of 2022, LockBit was the most active group in the cybercrime underworld holding a record for the highest number of victims in a quarter, specifically 231 victims.

LockBit has been a constant threat since 2019, working as a ransomware-as-a-service (RaaS) by recruiting threat actors to breach networks and encrypt devices, while also releasing a second and even a third generation of malware.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Ransom Cartel Linked To Colonial Pipeline Attacker REvil

0

Lesser of two REvils? There’s a relationship, say infosec bods, but not enough to say one evolved into the other.

It has been almost a year since the ransomware gang Ransom Cartel was first detected and the crew over that time has racked up a steady drumbeat of victims in such countries as the United States and France and from a broad array of industry sectors.

Analysts at MalwareHunterTeam believe the group has been active since December 2021 and threat researchers with Palo Alto Networks’ Unit 42 group first saw Ransom Cartel in action a month later. During most of 2022, defenders have been digging into the origins of the group. Now Unit 42 says Ransom Cartel shares some similarities with the notorious REvil ransomware-as-a-service (RaaS) gang.

However, does that mean REvil, which went dark just months before Ransom Cartel came to the surface, morphed into the new group and is just continuing with its nefarious ways under a new name?

The researchers aren’t making that leap, but they believe that at one time those cybercriminals behind Ransom Cartel had made contact with their REvil counterparts, maybe as affiliates or in some other position.

“Based on the fact that the Ransom Cartel operators clearly have access to the original REvil ransomware source code, yet likely do not possess the obfuscation engine used to encrypt strings and hide API calls, we speculate that the operators of Ransom Cartel had a relationship with the REvil group at one point, before starting their own operation,” Unit 42 researchers Amer Elsad and Daniel Bunce write in a recent report.

There has been on-again, off-again talk about the return of REvil. The speculation about Ransom Cartel and its possible links to the Russia-based group – also known as Sodinokibi – illustrates again the fluid nature of the cybercrime world and the constantly evolving rise and fall of the criminal gangs. None of this surprises Andrew Barratt, vice president at Coalfire, a cybersecurity advisory firm.

“There is so much ‘crime-as-a-service,'” Barratt told The Register. “They could be a customer (REvil was originally pitched as ransomware-as-a-service). It could also be a simple supplier relationship in place, but just a copycat given the success REvil had.”

That said, “it’s vitally important to track movements [of the cybercriminals and their groups] as we may see changes in the artifacts (files, locations, hashes, etc.) that give us indicators of compromise, or indicators of activity,” he said.

“These are the very things defenders or forensic investigators need to be on top of and a shared awareness equals a greater defense over all.”

REvil began operations in 2019 and became a major player in the ransomware field, hitting among others JBS Foods and Kaseya. It also drew attention from the US government, which leaned on Russian officials to do more to shut down cybercrime groups that Moscow had been shielding for years. The pressure helped lead to REvil essentially shutting its doors in late 2021 and the arrests in January of 14 suspected members by Russian officials.

However, REvil’s influence remains, as demonstrated by the apparent ties linking Ransom Cartel to it.

“At this time, we believe that Ransom Cartel operators had access to earlier versions of REvil ransomware source code, but not some of the most recent developments,” Elsad and Bunce wrote. “This suggests there was a relationship between the groups at some point, though it may not have been recent.”

Some of those crossovers include similarities in the ransom notes from each group – though those would be fairly simple to copy. Both use double-extortion methods – as do a growing number of groups. Ransom Cartel not only threatens to post the stolen data to its leak site if the demanded ransom isn’t paid, but also to send the data to the victim’s partners, competitors, and media.

Other similarities with REvil include the method both use to generate session secrets, “indicating a direct overlap between the REvil source code and the latest Ransom Cartel samples,” the researchers wrote. The data encryption scheme used by Ransom Cartel also is identical to those found in REvil samples, according to Unit 42.

There also are differences, including in how the encrypted data is stored. In addition, REvil would heavily obfuscate its ransomware – using such methods as string encryption and API hashing – while Ransom Cartel does essentially no obfuscation beyond the configuration.

“It is possible that the Ransom Cartel group is an offshoot of the original REvil threat actor group, where the individuals only possess the original source code of the REvil ransomware encryptor/decryptor, but do not have access to the obfuscation engine,” the Unit 42 researchers wrote.

In addition, Ransom Cartel uses DonPAPI to locate and retrieve credentials protected by Windows Data Protection API (DPAPI) in a technique known as “DPAPI dumping.” The researchers wrote the tool had not been seen in previous incidents.

DonPAPI searches systems for files known to be protected by DPAPI, such as Wi-Fi keys, Remote Desktop Protocol (RDP) passwords, and credentials saved in web browsers. The tool also has ways to avoid detection by antivirus and endpoint detection and response (EDR) software.

“To compromise Linux ESXi devices, Ransom Cartel uses DonPAPI to harvest credentials stored in web browsers used to authenticate to the vCenter web interface,” the researchers wrote.

There may not be anything conclusive yet about where the Ransom Cartel cybercriminals came from, but the search for answers is important.

“While there are a lot of advanced persistent threat (APT) groups in play, they have the same limitations on talent that legitimate businesses have,” Mike Parkin, senior technical engineer at cybersecurity firm Vulcan Cyber, told The Register. “By tracking the groups over time, and looking for signatures in their techniques, it’s possible to identify who the players are and, perhaps, give law enforcement the knowledge they need to act.” ®

Editor’s note: This article was revised after publication to remove our assertion that REvil was behind the Colonial Pipeline intrusion; that was attributed to another gang, DarkSide, which does have close links to REvil. We are happy to clarify the situation.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Cyberattack disrupts Bulgarian government websites over ‘betrayal to Russia’

0

Pro-Russian hackers were behind a “large-scale” cyberattack on Bulgarian government websites on Saturday, according to Bulgaria’s Prosecutor-General Ivan Geshev. 

The distributed denial-of-service (DDoS) attack briefly took down the websites of the presidential administration, the Defense Ministry, the Interior Ministry, the Justice Ministry, and the Constitutional Court. 

After access was restored, the sites were running slower than usual, according to the local Bulgarian online publication Dnevnik.

The pro-Russian hacking group Killnet claimed responsibility for the attack, saying it was a punishment “for betrayal to Russia and the supply of weapons to Ukraine.” 

“The government of Bulgaria is sentenced to network collapse and shame,” Killnet wrote on its official group on Telegram.

The attack is just the latest in a string of high-profile Killnet DDoS campaigns, which knock websites offline by flooding them with junk traffic. The attacks have made websites temporarily unavailable, but have not done serious damage. 

The group’s main goal, according to experts, is to attract the attention of the media and undermine confidence in state institutions.

Killnet has been active since the start of the Russian invasion of Ukraine. It previously targeted dozens of government networks across Europe in countries including Romania, Italy, Lithuania, Norway, Poland, Finland, and Latvia.

Although the attack did not have serious consequences and no sensitive data was leaked, it provoked a strong reaction from Bulgarian government officials. Geshev called it “a serious problem” and “an attack on the Bulgarian state.”

Hacker allegedly identified

Bulgarian Deputy Chief Prosecutor Borislav Sarafov said that the country’s cybersecurity agency has identified the name and the address of one of the hackers who carried out the attack. According to an investigation, the hacker is based in the Russian city of Magnitogorsk.

Bulgaria intends to request the extradition of this hacker from Russia, according to Sarafov, but the chance that the Kremlin will cooperate is very low, he said.

Killnet is most likely controlled by Russian intelligence agencies, according to Yavor Kolev, a Bulgarian cybersecurity expert.

“In a totalitarian state, such a group cannot act independently. It performs the tasks assigned to it,” he said.

Killnet usually attacks countries that actively support Ukraine. Bulgaria, however, has historically close ties to Russia and doesn’t support Ukraine’s attempts to become a member of NATO.

During the war, Bulgaria has provided asylum to Ukrainian refugees, sent humanitarian aid to Ukraine, and repaired Ukraine’s heavy weapons. 

Contrary to Killnet’s claims, Bulgaria refused to send its own weaponry to the Ukrainian army, citing a need for its own defense.

One of the reasons for Killnet’s attack, according to Kolev, could be Bulgaria’s active involvement in the political arena. “Killnet has attacked more than 50 countries,” he said. “Bulgaria’s turn has come.”

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

German Cybersecurity Chief Sacked Over Alleged Russia Ties

0
CyberSecurity

Germany’s cybersecurity chief was sacked on Tuesday after a TV satire show accused him of having ties to Russian intelligence services, with the country on high alert over potential sabotage activities by Moscow.

Arne Schoenbohm, head of the Federal Cyber Security Authority (BSI), had been at the centre of intense speculation since the popular show accused him in early October of contacts with Russia.

He has now been relieved of his duties “with immediate effect”, an interior ministry spokesman told AFP on Tuesday, citing “the allegations revealed and widely discussed in the media” as one of the reasons behind the move.

The allegations “have permanently damaged the necessary public trust” in Schoenbohm as head of the authority, the spokesman said. 

“This is all the more true in the current crisis situation regarding Russian hybrid warfare,” he added.

Schoenbohm was accused in the satire show on broadcaster ZDF of contacts with Russian secret services through an association he co-founded in 2012 known as the Cyber Security Council Germany.

One member of that association, Berlin cybersecurity company Protelion, reportedly operated under the name “Infotecs GmbH” until the end of March. 

The report said this was a subsidiary of Russian cybersecurity company OAO Infotecs, founded by a former employee of the Russian KGB intelligence service.

According to other German media reports, Schoenbohm had maintained contact with the Cyber Security Council Germany until recently and the interior ministry had on August 24 approved a request for him to give a speech to the association.

The interior ministry spokesman on Tuesday said all allegations against Schoenbohm would be “thoroughly and emphatically examined and subjected to a detailed evaluation”. 

– ‘Great annoyance’ –

The cybersecurity chief would be “presumed innocent” in the meantime, he said.

The Handelsblatt daily had reported that there was “great annoyance” within the government over the allegations.

A planned joint appearance by Schoenbohm and Interior Minister Nancy Faeser to present a cybersecurity report was cancelled last week. 

Schoenbohm told Spiegel on Tuesday that as he had not heard back over the allegations, he had himself sought disciplinary proceedings to clarify the issue.

He added that he did not know “what the ministry has checked and what are the concrete allegations against me.” 

Germany has in recent years repeatedly accused Russia of online espionage attempts.

The most high-profile incident blamed on Russian hackers to date was a cyberattack in 2015 that paralysed the computer network of the lower house of parliament, the Bundestag, forcing the entire institution offline for days while it was fixed.

Russia denies being behind such actions.

Tensions between Russia and Germany have only intensified since Moscow’s invasion of Ukraine.

The BSI has warned that companies, individuals and critical infrastructure are at risk of being hit by Russian cyberattacks.

Last week, the rail network in the north of the country was temporarily paralysed by what operator Deutsche Bahn called “sabotage”, with some officials pointing the finger at Russia.

Important communications cables were cut at two sites, forcing rail services to be halted for three hours and causing travel chaos for thousands of passengers.

Moscow is also suspected of being behind explosions last month that set off leaks in the Nord Stream 1 and 2 gas pipelines, which connect Russia to Germany.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

source

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

UK anti-fraud efforts have failed and need ‘wholesale change,’ lawmakers say

0

The British government’s response to fraud needs “a wholesale change in philosophy and practice,” according to the House of Commons Justice Committee.

In a report published Tuesday, the committee detailed how law enforcement agencies and other stakeholders have structurally failed to stop digital crimes and lack adequate resources to address the issue.

Despite a commitment to make the U.K. “the safest place in the world to live and work online” the government has presided over a 25% annual increase in reported fraud cases, more than half of which are driven by cybercrime.

There were almost 900,000 incidents reported to police and other monitoring organizations between September 2020 and 2021 — incidents that caused not only “financial losses but emotional and psychological distress” — and testimony to the Justice Committee repeatedly warned that the true figure was likely much higher.

Its report published on Tuesday highlights a number of failings regarding the resources the government has committed to tackling these issues. It particularly criticized Action Fraud, the national reporting center for fraud and cybercrime, which it said “has proven itself unfit for purpose.”

Action Fraud is set to be replaced in 2024 with a new reporting service underpinned by technology that will allow greater analysis of the volume of crimes reported — something the current service doesn’t provide.

The committee noted that only 2% of police funding is dedicated to combating fraud despite it accounting for 40% of reported crime. The report said that out of the 20,000 new police officers the government was elected on a pledge to hire, only 380 will be deployed in response to fraud.

Following a rapid reversal in current Prime Minister Liz Truss’ economic policy, it is not clear whether the government will continue to fund the hiring of all 20,000 of the new officers. It has warned that “difficult decisions” will have to be made on spending due to the state of the British economy.

According to the Justice Committee report, fraud is estimated to “cost society at least £4.7 billion each year” (about $5.3 billion) and yet it warned that less than 8% of reported crimes are investigated, finding that “the level of focus from policing is inadequate to deal with the scale, complexity and evolving nature of fraud.”

The committee’s chair, Sir Bob Neill MP, said: “People are losing their life savings and suffering lasting emotional and psychological harm. But the level of concern from law enforcement falls short of what is required.”

Compounding the lack of investigation of fraud crimes “there is also a lack of prosecution,” according to the committee. The report noted that the Office for National Statistics estimates there are 4.6 million fraud offenses committed each year, “but in the year ending September 2021 just 7,609 defendants were prosecuted for fraud and forgery as the principal offense”.

The inquiry also received testimony about “significant delays in hearing fraud cases, problems with the application of disclosure rules in cases with large amounts of digital material and the importance of early engagement between all bodies involved in order to conclude cases in a timely manner” — amid a growing backlog in cases at British courts which has similarly been attributed to a cut in government funding.

The committee warned that “a key barrier” to greater engagement between the police, prosecution and defense “has been the lack of legal aid funding” which the government has recently committed to providing, although again this may be in question ahead of the Halloween financial statement.

The volume of fraud cases originating from foreign jurisdictions, however, means there is a low prospect of conviction in many cases. “There is simply not the capacity within the criminal justice system to tackle the millions of fraud crimes taking place each year,” the report warned.

Mark Steward of the U.K.’s Financial Conduct Authority testified: “For all the will in the world, with the most efficient volume-oriented prosecution programme, you will not be able to capture all of what is happening on the internet.”

In its evidence to the inquiry, the Association of Police and Crime Commissioners warned “we are not going to arrest our way out of this” and said “the best way to tackle fraud is to prevent victimization.”

The committee made 43 recommendations, including a specific minister for fraud and economic crime, as well as increasing funding and police resourcing, and said it particularly welcomed obligations being introduced in the Online Safety Bill on technology companies to prevent frauds being perpetrated on their platforms.

“Overall, a wholesale change in philosophy and practice is needed to the way in which we fight fraud — one that takes it more seriously, gives it greater priority and resourcing, is more proactive in prevention, more aggressive in investigation, prosecution and conviction, and much more focused on its impact upon victims,” the committee wrote.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose