This week had several interesting news articles, including
the discovery of new malware, a new phishing scheme, and a data breach at
Verizon Enterprise.
1. Krebs on Security, "Crooks Steal, Sell Verizon Enterprise Customer Data."
Last week, Krebs on Security
reported that Verizon Enterprise customer contact data appeared for sale in an
unnamed cyber-crime forum. The seller claims to have information for 1.5
million of their customers and is offering to sell it as a whole or in pieces.
While it appears only contact data was stolen, Krebs warns
that such data will likely be used for phishing attacks, and could lead to further
breaches or theft. It is also worth noting that a majority of Fortune 500 companies
use Verizon Enterprise’s services, and may very well be prime targets for these
sorts of scams.
This is particularly interesting as Verizon Enterprise is
often an advisor to other businesses when data breaches occur. They research
breaches and even provide a major report on their findings each year, and
provide warnings on how such attacks take place, but unfortunately were not
aware of the vulnerability in their website that allowed for this breach.
2. We Live Security, "ESET discovers new USB-based data stealing malware."
Last week, ESET’s researchers discovered a new form of
malware on a USB drive that has many unusual characteristics. It seems the malware,
currently dubbed, “USB Thief,” has been designed not to replicate or spread. This certainly is unusual for malware,
as many will try and spread to steal or damage data across multiple computers,
trying to get a larger effect. But USB Thief is believed to be designed for
targeted attacks, and as such will not replicate or do anything to draw further
attention to it. This makes it especially stealthy, and very hard to detect.
ESET’s team highly recommends training all levels of staff
in security practices, as it often seems to be a human tendency to be willing
to insert any USB thumb drive into their systems to check what’s on it. If a
drive has this special malware on it, such actions could result in lost data.
ESET’s full article gives a rundown of how it works in plain English, and
offers a detailed analysis of the malware on a separate page.
CSO Online reported yesterday a new phishing scam taking
place in Pennsylvania, issuing fake tickets to drivers via email. The thing
that adds believability to the phishing scam is the use of personal
information, and especially details gathered from phone location data.
The emails include considerable detail on vehicle speed,
route, time, and even the driver’s first and last name, in attempt to collect a
fake fine for driving over the speed limit. The data is so precise that it has
to be gathered from a GPS, and traffic and mobility applications on phones are
the likely suspect.
This just shows one way that cyber-criminals can use data
that seems to be low in value to create a campaign with more credibility.
Simply adding a few details to a scam gives it much more credibility and often
makes phishing attempts more successful.
That’s all for this week, check back next Tuesday for
further news from across the web, all here at Astria Horizon. If you want more
information on how Astria Business Solutions can assist you in your Information
Security goals, visit our website at AstriaBiz.com
No comments:
Post a Comment