Tuesday, April 21, 2020

Social Engineering Attack - Types - Phishing Attack

What is Phishing attack?

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
  
How it Works?
An attacker will send email or sms and once you receive a malicious email/sms, it will then make you to click on a malicious link inside it, which can lead to the installation of malware, which will make your system freeze and ask for ransom  as part of attack or  reveal sensitive information which can use in future.

Types of Phishing Attacks?

Email phishing scams
An attacker sending out thousands of fraudulent messages to multiple users, it will be a spoofed message often contains delicate mistakes that expose its true identity. These can include spelling mistakes or changes to domain names etc. Users should be vigilant to analyze that why he receiving such emails and think before clicking on an embedded link inside the message.
Scammers use email or text messages to trick you into giving them your personal information. But there are several things you can do to protect yourself which are mentioned below.
Spear phishing
Spear phishing targets a specific person or enterprise, as opposed to random application users. It’s a more in-depth version of phishing that requires special knowledge about an organization, including its power structure.
How to Protect from the Attack?
Phishing attack protection requires steps be taken by both users and enterprises.
·         Do not respond to unknown or unsolicited calls/emails/messages. In case of suspicion, call your bank directly on their published number on their official website.
·         Do not provide banking information to anyone even if the caller claims to be from the bank.
·         Review your bank account and credit card statements at regular intervals for any suspicious transactions.
·         Use security filters of social media applications to safeguard your profile and ensure that no one accesses your details.
·         Do not download unknown apps and if you do so, do not allow them access to your contacts, photos, and any other access which it may ask for.
·         Confirming your whereabouts on social media can tipoff fraudsters about your location, which may be used to harm you financially while you are away.

·         Always remember that your bank NEVER asks for your personal or banking credentials through web links, SMS, email, phone calls etc.

Monday, April 20, 2020

Phishing Attack - Fake Online Meeting Invites

What is Fake meeting Invites attack?

These days where technology is growing and easy to reachable,  where most multinationals and local company employees are attending meetings online and even in education sector institutes are offering online training courses and webinars. 

On one hand where technology is growing, the frequencies of cyber attacks are also increasing. In fake meeting invite attack scammers are taking benefit of it by sending fake meeting invites.


How it works?

The scammers are sending convincing-looking email invites with meeting numbers, passwords, and times plus a “Join Meeting” button.
When users click the button, the user will re-direct to a scam site instead, that installs malicious plugin/software in the device which can execute multiple things like execute commands, take over webcams, delete files, enable Remote Desktops, log keystrokes, and steal passwords etc.

How to prevent from such type of attacks

  •      Verify all Web Ex invites you should receive and make sure they were sent legitimately. DO NOT blindly click the “Join Meeting” button!
  •      Verify the sender by checking their email address.
  •      Check the link before you click. The link should not redirect you to some fake website.
  •      Prefer to use or click on "Https://" links.
  •      Be careful before disclosing personal information.





Telecom SIM Swap Fraud


What is this Fraud?

A type of identity theft where fraudster manages to  obtain personal banking details and victim’s mobile number using various social engineering tools.



How it works?

Fraudster approaches a telecom service provider posing as their customer to obtain duplicate SIM cards of their intended victims’ existing mobile numbers, allegedly by using forged identities and/or fake POA.



Safeguards against this fraud.

  •      If your mobile phone doesn’t have a network, do not assume it to be a network outage and immediately check with your service provider.
  •      If your service provider confirms no network outage and/or issuance of replacement SIM card, register a complaint with the service provider and check your bank account immediately.
  •      Regularly check your bank statements and transaction history for any irregularities.
  •      Never reveal answers to your “security questions” to anyone.
  •      Do not keep personal details such as your phone number, date of birth etc. visible to all on social media platforms.
  •      Do not respond to unsolicited calls or text messages asking for your sensitive information.


Maze Ransomware Attack - Cognizant Technology Solutions (CTS)



Recently a US based IT service provider “Cognizant Technology Solutions (CTS)” become a victim of “MAZE” ransom ware attack .
What
The anonymous hackers group behind “Maze ransom ware” attacked the company systems causing disruptions to its clients.  If we talk about Maze Ransomware, it was discovered in 2019 and gained notoriety.
How
In general, Ransom ware is a type of malicious program used by hackers to take control of files in an infected system and then demand hefty payments to recover them. 

Safeguards
Tips to prevent potential ransomware attack.
  1. Keep your computer patched and up-t-date.
  2. Use an antivirus. Keep it update and perform regular scan.
  3. Keep Windows firewall enable.
  4. Don't click on links.
  5. Practice safe browsing habits.
  6. Regular back up your files. In case of any loss, the data can be restore from backup location. 

References