As we noted yesterday, Jimmy Kimmell poked fun at the President's Homeland Security Advisor for opening and responding to a spam email. But is it really so unusual to interact with spam? Today we filed our annual insurance audit. Where's my important confirmation from the insurance company? Or, there it is -- in my spam folder! Luckily, I use SP Guard. I have no concerns about this being a dangerous email because SP Guard identifies it as a real email from Hartford Insurance.
As reported by CNN and others, a UK prankster was able to trick Tom Bossert, the White House DHS Advisor, and Anthony Scaramucci, the then White House Communications Director. The prankster sent Bossert an email pretending to be Jared Kushner. The prank email to Scaramucci pretended to be from former Chief of Staff Reince Priebus. This is from the Kushner-Bossert email thread: Jimmy Kimmel, the ABC TV late night host, noted that the email said, "SUSPECTED_SPAM," yet Bossert took the bait. Bossert's actions show the deceptive power of a well-crafted email. The prankster used facts that he discovered [...]
The Hacker News is reporting on a spearphishing attack that has compromised over 1 million people. How could this happen? Over one million users use the popular chrome extension "Web Developer." The bad guys spearphished the developer of "Web Developer" and then used the access they gained from spearphishing to modify "Web Developer" and push the modified code to over 1 million users. The malicious version of "Web Developer" turned the victim's web browser into an advertising nightmare by injecting ads on web pages. It took several hours for the real developer of "Web Developer" to correct the problem and issue [...]
Marcus Hutchins is the 23 year old cybersecurity researcher who is credited with finding the killswitch to the WannaCry ransomware attack. Marcus Hutchins He was arrested yesterday (August 2, 2017) at the airport when he was preparing to leave the U.S. after attending the DefCon hacking conference in Las Vegas. His arrest is reported on Motherboard. The July 11, 2017, Indictment alleges that Hutchins was involved with the Kronos banking trojan. Of course, Kronos malware can only do evil if it is installed on the target systems. Like so much malicious software, Kronos is installed through phishing email [...]
The New York Daily News is reporting that Acting State Supreme Court Justice Lori Sattler was the victim of an email scam while trying to sell her apartment and buy another. Justice Sattler The press report says that a person posing as the Justice's lawyer sent her an email with payment instructions. Believing the email came from her lawyer, the justice wired $1,057,500 to the account specified in the email. The money was then transferred to Commerce Bank of China. The Justice was the victim of a crime of deception perpetrated using email. This crime relied on the fact that [...]
The Intercept_ is reporting about Russian hacking of the presidential election, citing a document that may have been obtained from the NSA. This graphic provides an overview of the Russian cyberattack methodology: This graphic reveals the true nature of a spearphishing cyberattack - the target of these attacks is human cognition, computers are merely the means to convey the deception. How do you defend human cognition against deception? With a tool that reveals the deception. That is what SP Guard does.
Cyberspace around the world has fallen victim to a massive ransomware attack. How could such a thing happen? New Scientist sums it up: The first computers were infected by people unwittingly clicking links in phishing emails. But from each patient zero the software then spread through computer networks by itself. Once installed on a machine, the malware encrypted all of the files it could find, locking them away from users. SP Guard helps protect against ransomware by unmasking phishing emails. With SP Guard, users can spot and report attack emails instead of becoming victims.
A large scale phishing attack using a google docs exploit rapidly spread across the internet today. Google Docs Phishing Email You can learn about the data processing aspects of this attack. It has been reported in the The Wall Street Journal, The Verge, The New York Times, and many other sources. What about the human aspects of this problem? Why did people open these emails? Why do people open any emails? Prof. Arun Vishwanath, in Why Do People Get Phished, established that people open emails as a matter of habit which is invoked in response to perceived relevance and [...]
Google and Facebook were victims of a spearphishing scam in which the attacker stole $100 million. Paragraph 6 of the indictment details some of the allegations: ... as part of the scheme, fraudulent phishing emails were sent to employees and agents of the Victim Companies. The emails purported to be from employees and agents of Company‑1 [the real supplier], but in truth and in fact, they were not sent or authorized by employees or agents of Company‑1. The fraudulent emails were sent from email accounts that were designed to create the false appearance that they were sent by employees and agents [...]
According to TAPintoNewark, the online newspaper in Newark, Jersey, someone is shaking down the City of Newark for 24 Bitcoin (about $30,000) in a ransomware attack. How did this happen? TAPintoNewark explains: The RSA-2048 maleware typically infects a user's computer when they are tricked into running an attachment in a spam email. Once the maleware is launched, it encrypts files and requires a "private key" to open them. The private key is only provided after the user pays the ransom. Why would a user open an evil email and then run an evil attachment? Because the email is a carefully crafted work [...]