Heads-up to all Netflix subscribers! You may be receiving a fake email stating that your Netflix account has been suspended, and it looks just like the real thing. They are trying to get your login information and your credit card data.
Don’t fall for this type of scam. If you want to change the settings of subscription services like this, never click on links in any email and just type the name of the site in your browser or use a bookmark that you set.
Whatever email about Netflix you see in the coming weeks… THINK BEFORE YOU CLICK.
This scam was detected on Sunday and is shown to be targeting around 110 million Netflix subscribers. The email subject line is: “Your suspension notification” and in the body of the email there is a link taking you to the fake Netflix site. This site then asks for your log-in and credit card information.
This scam is well designed and resembles the real Netflix site even down to popular Netflix shows such as “The Crown” appearing on the homepage.
Cyber attacks are becoming more and more sophisticated with cyber criminals being well equipped to imitate real company websites. For the safety of your company it is important to test your employees to see if they fall victim to phishing and ransomware attacks. Take the first step and find out how many of your employees are Phish-prone with the free KnowBe4 phishing test – https://www.knowbe4.com/phishing-security-test-offer
In ongoing consultations with clients,
large companies named targeted attacks and hacking as two of their biggest
security challenges since they can seriously impact the continuity of business
activities in an organization.
Attackers have many means to infiltrate
companies. However, many attacks, don’t require a very high level of
technological sophistication. Instead, techniques like targeted social
engineering, i.e. spear
phishing, or the use of known vulnerabilities for which,
patches may have been issued but businesses have not yet deployed, can lead to
damaged reputation, revenue and data breaches.
On the other hand, high levels of sophistication can also be utilized as is in
the case of a Zero Day attack. Chief
among these was Stuxnet,
a recorded attack where malicious code successfully deployed four zero-day
vulnerabilities to impede a uranium enrichment program in Iran, and which,
according to media, was a state-sponsored attack.
There are many reasons why organizations
become repeat targets. Their bank accounts contain more resources than those of
an average person or small business and they also have considerable amounts of
interesting data that can be monetized. Attacks targeting companies can also be
used as a form of competition. Most often, this concerns data hunting,
i.e. obtaining interesting information or intellectual property. These attacks
can be accompanied by blackmail. For example, a client database is stolen from
a company and is later approached by the perpetrators and asked, “what they are
going to do about their loss”.
Different ways to monetize attacks bring
Organizations often find it difficult to admit they have been breached by these types of attacks. Consequently, this may give other companies the false impression that such attacks happen only occasionally. A typical example of targeted attacks, common in recent years, are DDoS as a Service – attacks, which are sponsored by one company to attack the website of another, with the effect of disrupting business and directing customers away from the targeted company and (possibly) towards the attacker’s “employer”. These are criminal tactics, and the attackers know very well which business areas to target for maximum gain.
There are of course other approaches. Take the example of the British National Health Service, which has become a frequent target of ransomware attacks. Digitization of health services has resulted in a situation where the malicious encryption of medical data may lead to a halt in medical interventions and surgeries. Under such conditions, targeted organizations are often more inclined to pay a ransom for the “hijacked” patient data.
In Kenya attackers have been known to target their attacks to banks and financial institutions, with figures of Ksh400 million being reported stolen from an unnamed local bank and Ksh29 million from National Bank of Kenya in 2018 alone.
Innovative approaches to old tricks
In many rural areas worldwide, one quick glance at powerlines will reveal how
easy it is to make illegal connections to the power grid. As of late,
cyberattackers have followed a similar model, focusing their resources on
illegally mining various cryptocurrencies, which have proven to be
highly popular in the public’s imagination.
A more complex example was a targeted attack meant to infect StatCounter,
which provides a service very similar to
Google Analytics and uses a special script legitimately placed on websites to
obtain data about website visitors. In this case, attackers successfully
breached StatCounter and subsequently gained access to the service’s end users
The problem came to light when visitors navigated to the now compromised websites
which contained the infected scrip, and who’s devices then began covertly
mining bitcoins for the attackers. During the second stage, the attackers proceeded
to steal bitcoins directly from infected devices when they attempted to
access a popular cryptocurrency exchange. To get an idea of the scale of such
an operation, StatCounter can be found on more than two million websites.
Such an attack means that system resources of
infected devices at the company legitimately using the service are additionally
tasked to mine. This may not concern only computers, but also mobile
devices and especially servers. The subsequent cryptomining accelerates wear
and tear on devices and also increases electricity bills. In addition, we
should not forget that malicious cryptomining code is usually capable of uploading
other types of malicious script onto the network.
Investigations may take months and are
looking for a needle in a haystack
When a large company falls victim to such
an attack, it is necessary to carry out a complicated investigation of what
happened and how the company has been affected. Research
shows that it takes about 150-200 days for companies to find out
they’ve been infected. Further investigation regarding the method by which the
company was infected and where the malicious code originated may take even longer.
Facing such substantial risks, large companies should leverage solutions like ESET Dynamic Threat Defense to detect new, never before seen threats.
To find out more about ESET Dynamic Threat Defense or to request a free in-house cyber security training session for your organisation, please sign up below.
Ransomware is by far the biggest threat among Enterprises. So what is Ransomware? It is a malicious code that blocks or encrypts the contents of a device and demands a ransom to restore access to the data.
According to research done by ESET, Companies named ransomware their number one concern.
In response to customer needs and concerns, ESET integrated Ransomware Shield into its security solutions. ESET has long been providing its customers with very good behavior-based malware detection and also with Host-based Intrusion Prevention System (HIPS) that allows users to set custom rules for the protection against ransomware. However, should something slip past the 11 other security layers, Ransomware Shield will be automatically activated.
While ransomware infection often starts with clicking a suspicious link or a fictitious invoice, ESET found that email remains the most common distribution method.
these scenarios, enter ESET Dynamic Threat Defense (EDTD). EDTD provides
another layer of security for ESET products like Mail Security and Endpoint
products. It utilizes a cloud-based sandboxing technology and multiple machine
learning models to detect new, never before seen type of threats. In result,
attachments that were classified as malicious are stripped off the email and
the recipient gets information about the detection.
To learn more about how ESET can protect your business, and to book a FREE in houseCybersecurity Training Session for your employees, please sign up below.