The cable TV channel H2 is running a mini-series on the human mind - Your Bleeped Up Brain. The series is truly fascinating. While we think our heads contain a highly precise computer, it turns out that the ball of matter inside our heads is good at navigating life, but not very good at discerning fine details out of a complex environment. For those us of in the cybersecurity world, the last episode - Deception - is particularly interesting. In Deception, the show presents several examples of how the brain takes incomplete or inaccurate information and completes the story to [...]
Eric Fiterman of Rogue Networks/Methodvue demonstrates how to construct a malicious email that effectively impersonates President Obama. Using malware delivered in an attachment, Fiterman takes control of the recipient’s computer. Watch as he steals passwords, searches for files and even takes a picture of his victim using the computer’s camera. What permits Fiterman to infiltrate this computer? The recipient can't distinguish a real email from the President from a fake email from the President. People need to know if an email is really from the President. They need to know if an email is really from a co-worker. SP Guard from Iconix [...]
The Associated Press reports that the FBI failed to warn government officials who were being targeted by Russian spearphishing attacks. One wonders what such a warning would say. The FBI could revise the common warning, "Don't open suspicious emails." to "You are the target of an attack, don't open suspicious emails from Russians." Of course, a hallmark of Russian attacks is that they are well-crafted to be non-suspicious. Such warnings offer little assistance in actually performing the task of spotting deceptive Russian emails. SP Guard helps users avoid deceptive emails.
New research from Google, U.C. Berkeley and International Computer Science Institute made this stunning finding: We find victims of phishing are 400x more likely to be successfully hijacked compared to a random Google user. In comparison, this rate falls to 10x for data breach victims and roughly 40x for keylogger victims. This just examined one problem -- stolen credentials. Now consider how this applies to installing ransomware and malware, abuse of native processes, human misdirection of files (such as sending payroll tax returns in response to phishing) and the Business Email Compromise. Interestingly, the researchers do not ask why phishing [...]
On October 16, 2017, the Department of Homeland Security issued Binding Operational Directive BOD-18-01 directing federal agencies to adopt new cybersecurity measures. One of these measures, DMARC, is intended to fight phishing. It is good to see the government addressing spearphishing. However, this measure will quickly prove to be ineffective against spearphishing attacks. Why? Because, as the DMARC specification tells us, …DMARC can only be used to combat specific forms of exact-domain spoofing directly… DMARC does not attempt to solve all problems with spoofed or otherwise fraudulent email. In particular, it does not address the use of visually similar domain names ("cousin [...]
As we noted yesterday, Jimmy Kimmell poked fun at the President's Homeland Security Advisor for opening and responding to a spam email. But is it really so unusual to interact with spam? Today we filed our annual insurance audit. Where's my important confirmation from the insurance company? Or, there it is -- in my spam folder! Luckily, I use SP Guard. I have no concerns about this being a dangerous email because SP Guard identifies it as a real email from Hartford Insurance.
As reported by CNN and others, a UK prankster was able to trick Tom Bossert, the White House DHS Advisor, and Anthony Scaramucci, the then White House Communications Director. The prankster sent Bossert an email pretending to be Jared Kushner. The prank email to Scaramucci pretended to be from former Chief of Staff Reince Priebus. This is from the Kushner-Bossert email thread: Jimmy Kimmel, the ABC TV late night host, noted that the email said, "SUSPECTED_SPAM," yet Bossert took the bait. Bossert's actions show the deceptive power of a well-crafted email. The prankster used facts that he discovered about Bossert [...]
The Hacker News is reporting on a spearphishing attack that has compromised over 1 million people. How could this happen? Over one million users use the popular chrome extension "Web Developer." The bad guys spearphished the developer of "Web Developer" and then used the access they gained from spearphishing to modify "Web Developer" and push the modified code to over 1 million users. The malicious version of "Web Developer" turned the victim's web browser into an advertising nightmare by injecting ads on web pages. It took several hours for the real developer of "Web Developer" to correct the problem and issue [...]
Marcus Hutchins is the 23 year old cybersecurity researcher who is credited with finding the killswitch to the WannaCry ransomware attack. Marcus Hutchins He was arrested yesterday (August 2, 2017) at the airport when he was preparing to leave the U.S. after attending the DefCon hacking conference in Las Vegas. His arrest is reported on Motherboard. The July 11, 2017, Indictment alleges that Hutchins was involved with the Kronos banking trojan. Of course, Kronos malware can only do evil if it is installed on the target systems. Like so much malicious software, Kronos is installed through phishing email [...]
The New York Daily News is reporting that Acting State Supreme Court Justice Lori Sattler was the victim of an email scam while trying to sell her apartment and buy another. Justice Sattler The press report says that a person posing as the Justice's lawyer sent her an email with payment instructions. Believing the email came from her lawyer, the justice wired $1,057,500 to the account specified in the email. The money was then transferred to Commerce Bank of China. The Justice was the victim of a crime of deception perpetrated using email. This crime relied on the fact that [...]
The Intercept_ is reporting about Russian hacking of the presidential election, citing a document that may have been obtained from the NSA. This graphic provides an overview of the Russian cyberattack methodology: This graphic reveals the true nature of a spearphishing cyberattack - the target of these attacks is human cognition, computers are merely the means to convey the deception. How do you defend human cognition against deception? With a tool that reveals the deception. That is what SP Guard does.
Cyberspace around the world has fallen victim to a massive ransomware attack. How could such a thing happen? New Scientist sums it up: The first computers were infected by people unwittingly clicking links in phishing emails. But from each patient zero the software then spread through computer networks by itself. Once installed on a machine, the malware encrypted all of the files it could find, locking them away from users. SP Guard helps protect against ransomware by unmasking phishing emails. With SP Guard, users can spot and report attack emails instead of becoming victims.