Categories
The Week in Breach

The Week in Breach: 17/02/21 – 23/02/21

Kia hits a bump in the road with ransomware, Underwriters Laboratories didn’t check their cyber safety, Simon Fraser University is back for a cyberattack encore.
  United States – Automatic Funds Transfer Services (AFTS)  Exploit:  Ransomware
Automatic Funds Transfer Services (AFTS): Payment Processor  >> Read full details on our blog  
  United States – Kia Motors America Exploit: Ransomware
Kia Motors America: Automotive Manufacturer  >> Read full details on our blog  
  United States – Jones Day Exploit: Ransomware
Jones Day: Law Firm  >> Read full details on our blog  
  United States – Sequoia Capital Exploit: Phishing
Sequoia Capital: Venture Capital Firm  >> Read full details on our blog  
  United States – Underwriters Laboratories Exploit: Ransomware
Underwriters Laboratories: Safety Regulator >> Read full details on our blog  
  Canada – Simon Frazer University Exploit: Hacking
Simon Fraser University: Institution of Higher Learning  >> Read full details on our blog  
  The Netherlands – Dutch Research Council (NWO)  Exploit: Malware
Dutch Research Council: Government Entity  >> Read full details on our blog  
  The Netherlands – Réseaux IP Européens Network Coordination Centre (RIPE NCC)  Exploit: Credential Stuffing
Réseaux IP Européens Network Coordination Centre (RIPE NCC): World Regulatory Body    >> Read full details on our blog  
  France – Beneteau SA  Exploit: Malware
Beneteau SA: Maritime Vessel Builder  >> Read full details on our blog  
Categories
Data Protection

How can you lose Microsoft 365 data? tip 3

How to lose Microsoft 365 data? tip 3: make an employee angry…really really angry.We can help #MSnetUk https://datto-content.amp.vg/web/yc8v57yi7o6s

Categories
Data Protection

Is your business prepared? – Disaster Recovery campaign

Power outage or system failure? These can be hugely damaging to your business. Make sure you’re taking the right steps. We can help #MSnetUk https://datto-content.amp.vg/web/zdrpe03boksk

Categories
Microsoft

How Confident Is Your Business In Recovering From A Breach?

Did you know that 90% of small businesses ignore data protection? Does this shock you as much as it shocks us? But implementing a proper security system is easier than you think. Check out this article to learn more about how you can build a strong defense against cyberattacks. And contact our team to help you level up your cyberattack defense.

Read More…

Categories
Microsoft

Protect against cybersecurity threats with Microsoft 365

We get it. You’re busy. You need to focus on your business and don’t have time to be hindered by cybersecurity threats.

Lucky for you, Microsoft 365 Business provides robust security solutions with comprehensive external threat protection and internal data leak prevention. With our Microsoft 365 Business solutions, you can make sure that nothing stands in the way of your company’s safety.

Check out this infographic for a quick view of industry trends, pain points, proof points, and more on why you should upgrade to Microsoft 365 Business.

View: Protect against cybersecurity threats with Microsoft 365

Categories
Microsoft

Cybersecurity: A Small Business Guide

You already know that small businesses are particularly vulnerable to cyberattacks, but what can you do about it? How familiar are you with the common security pitfalls for small businesses, and do you know how to avoid them? Check out this article for an overview of the most common types of cyberattacks. It also details cybersecurity best practices targeted at protecting small businesses against data breaches.

And if you need help protecting your business and customers, we’re here for you

Read More…

Categories
Cyber Security

Stay Cyber Safe

Here are a few straightforward tips to help reduce your cybersecurity risk, whether you’re online or offline.

1. Always be wary of any unexpected contact. If your bank, or any organisation you have dealings with, gets in touch out of the blue, treat it with caution. If you receive any emails that ask you to confirm personal information, assume it is a scam. Don’t click on any links and don’t provide any of your personal details. Instead, call the company that the communication claims to be from using a recognised telephone number and make sure that you’re dealing directly with them before sharing any of your details or responding to any requests.

2. Safeguard yourself against identity theft by making sure you never give out personal information to an unrecognised party. This can be used to steal your identity and access your accounts, so keep it safe. Don’t confirm any details to cold callers, even if they’re just asking you to verify information they claim to already have on file, and avoid entering your details into any promotional emails.

3. Keep operating systems and virus protection software up-to-date. Don’t ignore software updates on your mobile phone, computer and other devices, as these can often include measures to protect against new kinds of scams, viruses and ransomware.

4. Make sure all your accounts have a strong password using a mixture of letters (lower and upper case), numbers and symbols. Don’t use the same password for multiple accounts and try and get into the habit of changing them regularly as this helps to reduce the risk of a cyber security attack. Ideally use a Password manager, or Complex Passphrase’s instead.

5. Be careful when using public WiFi. Use safe and secure WiFi connections and avoid public WiFi when you can. Your standard 3G or 4G connection will usually be a lot more secure than the one in the coffee shop or restaurant.

By following these simple cybersecurity steps you’ll be going a long way to helping keep your information safe online. An important rule to live by is that prevention is usually better than the cure! So, if you’re unsure about a potential risk, it’s better to proceed with caution rather than potentially put yourself in a compromising position.

Categories
Education

The Money Behind Malware

It’s important to understand the motivation behind the onslaught of malicious code bombarding our firewalls, users, and servers.

We see hundreds of thousands of malicious files every single day and these files aren’t from the world of governments and spies to spark the next cyber war. It’s about money.

We can prepare for this onslaught. But to do so, we need to know how it works

The tools at their disposal

Cybercriminals have a lot of options to make money. Fortunately, there’s a lot of steps to get there, and every step a cybercriminal has to take is a point where we can stop them.

They begin by finding victims. And oh, do they have options for catching unwitting victims. Cybercriminals ensnare victims in a number of ways, including:

  • Spam: The classic. Spam, where it all began, has dropped in volume as defensive options have become better and users more aware, but we still see billions of messages every day – there’s always a chance you’ll click through.
  • Phishing: While spam promotes products and services, phishing is more nefarious email attack, pretending to be a trusted source like your bank to gain access to your personal information.
  • Social media: Users spend countless hours on Facebook and other social media sites, and cybercriminals are using that to their advantage. Messages using similar tactics to trick users into clicking unsafe links are common in social media.
  • Blackhat SEO: Manipulating search engine results, often called Blackhat SEO or SEO poisoning, continues to be a problem. “Poisoned” search results can lead to exploits, malware, and phishing sites.
  • Drive-by downloads: It’s possible to have your operating system, browser, plugins, and applications exposed to exploits looking for vulnerabilities just by visiting an unsafe website. We sees tens of thousands of new URLs every day containing drive-by downloads.
  • Malware: Worms, viruses, and other malware files still serve their masters well. While less common now, opportunistic crooks still exploit malware to infect exposed systems and recruit people’s computing devices for their own purposes.

Money behind the malware

So the cybercriminal has access to your information or computer. What do they do with it, and how do they make money off it?

  • Ransomware: Ransomware has been making more and more headlines in recent months and is considered the number one threat to users right now. A type of malicious software which can block access to your computer, files, or servers until the user or company pays a fee to the cybercriminal, this is a threat that has trapped not just regular end users but multinational corporations, healthcare systems, and more. Ransomware originally came out almost exclusively from Russia, but its grown to plague the internet from all over the world.
  • Selling products: This is an older scam, but criminals still set up a store offering great bargains on products, often to simply steal payment information. Others actually do send sham products to unwitting consumers.
  • Stealing login details: The purpose of phishing spam messages is to convince you they come from someone you know or trust. Criminals use social engineering techniques borrowed from real brands to collect usernames and passwords associated with high-value websites like PayPal, banks, Facebook, Twitter, Yahoo and web-based email services. Phishing emails taking advantage of a user’s lack of awareness of hacking attacks and data breaches.
  • Pay-per-click fraud: After compromising a user’s computer, the criminals can download malware that manipulates Internet traffic. They divert the victim’s clicks to advertisements located on the criminals’ webpages. The criminals make money from ad networks by generating traffic to their customers’ ads.
  • Fake security software: This is an older threat as well, but one users still fall victim to. The user visits a compromised site and is convinced they need to download (and pay for) a (fake) antivirus. Not only do scammers get these users to pay for the original install, they can often convince them to buy extended support and more.
  • Social media spam: It hasn’t gotten easier for spammers. Spam filters get more and more effective with time, and users more savvy about spotting fake names. Criminals have, instead, moved on to abusing social media, where they make use of users’ social circles to spread fraudulent sites—users are far more likely to click through a link if it comes from a friend or family member.
  • Banking malware: Cybercriminals follow the money. There’s an entire industry based on capturing authentication information to access online financial institutions. It’s moved far beyond simple key-logging software to capture usernames and passwords; modern banking Trojans can capture SMS messages and record videos of your screen while you log in. Hundreds of millions of dollars are stolen in this manner.
  • Premium-rate SMS fraud: Instead of attacking your bank account directly, they go after you through social media, asking for your phone number when you fill out a survey—which just entered you into a premium-rate SMS service. These services also tag along with pirated apps on your phone sending SMS messages to premium rate numbers at your expense.

Specialized scammers

With so many tools at their disposal to launch an attack or scam, cybercriminals tend to specialize, so that they’re better prepared to evade our defences and avoid law enforcement. Let’s take a look at some of their roles.

  • Exploit writers specialize in discovering vulnerabilities in software and creating exploit packs—a collection of vulnerabilities packaged together. The exploit writers then sell the exploit pack to less technical criminals, who use it on websites and in email attachments to embed malware on vulnerable computers.
  • Translators are exactly that—they rework the language in spam or social engineering attacks to improve their effectiveness. Poor grammar or spelling in the user’s native language is usually a good indicator of an untrustworthy message, so the better the writing, the more likely the victim.
  • Bot herders infect all of the zombie computers that are used for creating a botnet, which the criminals use for spamming, DDoS attacks, proxying and other cloud computing needs of the criminal underground. Bot herders segregate and sell or lease computers based on geography and type of bot needed by the purchaser.
  • Money mules and mule managers fill an important role in the cybercrime ecosystem: someone needs to walk into banks and transfer funds. Mules assist with the movement of money, and mule managers recruit them, oftentimes through work-from-home scams.
  • Partnyo’rka loosely translates to “partner network” in English. Like legitimate networks, they work to spread the word about—and pay commissions for sales of—scam products.
  • Tool providers write tools to aid in spreading spam and malware, like exploits, toolkits, and more. There’s nothing illegal about writing software, but there is an entire industry based on creating tools for cybercriminals to purchase.
  • Malware writers are exactly that—they’re writing malware for sale to organized cybercriminal operations, rather than distributing their wares directly.

How we win

As long there is money to be made criminals will continue to take advantage of opportunities to pick our pockets. While the battle with cybercriminals can seem daunting, it’s a fight we can win. We only need to break one link in their chain to stop them dead in their tracks.

Some tips to success:

  • Deploy patches quickly
  • Eliminate unnecessary applications
  • Run as a non-privileged user
  • Increase employee awareness
  • Recognize our weak points
  • Reducing the threat surface

All of this can make the job so difficult for the scammers that they will look elsewhere for their victims.

Categories
Apple

How can you lose Microsoft 365 data? tip 2

How to lose Microsoft 365 data? tip 2: over-write data in #O365, it’s not uncommon We can help #MSnetUk https://datto-content.amp.vg/web/99f2ttwi1e4v

Categories
Apple

Can your business afford downtime? – Disaster Recovery campaign

Can your business afford #downtime? #disasters aren’t always what you expect. We can help #MSnetUk https://datto-content.amp.vg/web/dukagfiudvy6v