What do we do with all this data? Companies still can’t turn data into revenue.

Businesses across the globe may have embraced big-data strategies but more than half are struggling to keep up with the volume, variety, and velocity of data, according to new surveys highlighting just how much poor data management is costing.

Fully 15 per cent of 2100 surveyed IT decision makers said they aren’t coping well with the explosion of data and a further 45 per cent said they were coping but were having “some issues”, Cloudera’s new Enterprise Data Maturity Research Report found.

Similar proportions reported issues around the rest of the ‘5 Vs’ of data – variety, veracity, velocity, and value of data – with 90 per cent of respondents admitting that their organisation would be generating more revenues if it could figure out how to manage data more effectively.

Just half of respondents said their organisation has had an enterprise data strategy in place for more than a year, with a third saying they had implemented such a strategy in the past year and 14 per cent still working on a strategy.

Although sectors such as financial services, retail, and telecommunications had become “extremely data savvy”, Cloudera vice president and managing director for Australia & New Zealand Robert Yue said, Australian organisations were behind global benchmarks when it came to turning data strategies into measurable business outcomes.

“The challenge now,” Yue said, “is how to do more with data as we focus our sights on the anticipated economic upswing of 2022 despite the continued challenges of COVID-19.”

“We’re seeing a significant behavioural shift related to the broader industry trend that ‘every company is a software company’,” he continued, noting moves such as Commonwealth Bank of Australia’s investments in AI firm H2O.ai and property-tech startup Own Home.

“Many of our customers are finding innovative ways to overcome pain points like speed, to anticipate and stay ahead of their own customer needs.”

Fully 79 per cent of respondents admitted that they have not yet centralised and integrated their big-data infrastructure across the organisation – compared with 65 per cent globally – and 71 per cent said they have not yet “democratised” their systems by providing access to analytics tools to all employees.

Better data means better business

Despite pandemic-era pressures to increase digital transformation and improve the use of data, many companies still aren’t good enough at collecting and analysing their data.

Fully 87 per cent of respondents to Experian’s latest Global Data Management Research Report said they had become more reliant on quality data and insights, with 83 per cent flagging the importance of AI-driven ‘DataOps’ strategies to integrate data into everyday decision-making.

Although widespread access to good-quality data is closely linked to better decision-making, 72 per cent of respondents said they have so much data that it’s hard to see where better data management can add the most value.

“The last year has tested every industry, with a new requirement for business models to be agile and change in line with their customers’ rapidly shifting demands,” said Andrew Abraham, Experian’s global managing director for data quality.

“Businesses who have improved their data quality were not just better equipped for this but exceeded their performance expectations.”

That said, many companies are struggling to get the skills they need to actually improve data quality – with 84 per cent admitting that skills deficiencies are hampering organisational agility and flexibility.

“Business experiences with data accuracy, and issues around how data is managed, remain and are unlikely to improve,” Abraham said, “unless businesses upskill current employees and continue to work with wider industry and government on addressing the data skills gap.”

Democratisation of data was a critical way of closing this gap by leaning on cleaner, more-accessible data to help every employee get the insights they need.

Making this happen is still proving challenging, however: more than a third of respondents to a recent InterSystems study said they weren’t satisfied with their current data management technology stack, and 55 per cent said they would prioritise technologies for building data-driven organisations this year.

Companies like Allianz Australia, Cloudera’s Yue said, are addressing this deficiency by focusing on building internal culture and “empowering their people to become data champions.”

“This, in turn, supports their customers through access to new levels of actionable data and information about their portfolio. They are a great example of an organisation getting it right.”

READ MORE

Email-Based Vishing Attacks Skyrocket 554% as Phishing, Social Media, and Malware Attacks Are All on the Rise

New analysis of attacks in 2021 show massive increases across the board, painting a very concerning picture for this year around cyberattacks of all types.

Mid-year reports of cyberthreats are informative but are temporal in nature, and still require that organizations take a look at longer data trends to understand where to place their focus, efforts, and budget. New data from security vendor PhishLabs in their Quarterly Threat Trends & Intelligence Report, covering all of 2021 provides a better sense of what 2021’s state of cyberattacks looked like, and unveils that the increases in efforts by cybercriminals that we saw throughout the year looks like they’re here to stay for the time-being.

According to the report:

  • Phishing attacks grew 28%
  • Social Media-based threats grew by 103%
  • Attacks with malware nearly tripled
  • Vishing attacks (like the Amazon attack I’ve covered previously) that begin with a phishing email jumped 554%
  • 52% of phishing attacks focused on credential theft
  • 38% of phishing attacks are response-based (e.g., job scams, tech support, BEC)
  • Only 10% focused on malware delivery

The overarching theme here is email is the delivery mechanism of choice – because it works. So, it’s imperative that organizations put layered security measures in place to specifically stop email-based attacks – keeping in mind that with only 10% of attacks focused on malware delivery (and a portion of those using malicious links instead of attachments), some percentage of malicious phishing emails will make their way to the user’s Inbox. This means the user must also participate in your organization’s security strategy, interacting with emails with a sense of vigilance and scrutiny should an email seem unexpected, suspicious, out of the norm, etc. This can be taught, via Security Awareness Training, where users see themselves as a part of the organization’s layered security, helping to stop attacks before they do damage.

READ MORE

Medical devices under hack threat IoT vulnerability lets criminals control and disable.

Businesses are already ducking and covering as the invasion of Ukraine drives a surge of cybercriminal attacks, but the publication of yet another severe security vulnerability has given malicious actors new ways to attack medical and other devices anywhere in the world.

The vulnerabilities – which were revealed and documented by security firm Forescout and have collectively been dubbed Access:7 – are found in a library called PTC Axeda, and its companion Axeda Desktop Server application.

Axeda is used by many Internet of Things (IoT) manufacturers to enable the remote management of devices – but its poorly-designed authentication, including use of hardcoded credentials and unauthenticated services, means that attackers can easily access and control connected devices.

Six other vulnerabilities enable cybercriminals to access devices, reconfigure them, control them remotely, disconnect them, and more.

That’s a major problem for the healthcare environments that make up around 55 per cent of Axeda’s user base – where the software powers systems administering life-sustaining medical care including imaging, laboratory, ventilation, infusion, ventilation, implantables, and surgery.

Over 150 potentially affected devices, from over 100 vendors, have already been identified – from vendors like Abbott, Acuo, Carestream, GE HealthcareVarian, and Bayer – and Axeda is also used in ATMs, industrial, and other settings.

PTC paid $235m for Axeda back in 2018, integrating the remote management tool into its broader ThingWorx IoT platform and then ending support for Axeda at the end of 2020.

With so many installed devices still so easily exploitable, the vulnerabilities were given CVSS scores as high as 9.8 out of 10 – motivating the US Cybersecurity & Infrastructure Security Agency (CISA) to publish an Industrial Control System (ICS) Advisory warning of the low-complexity attack.

Affected devices should, CISA advised, be disconnected from the Internet, isolated from business networks, and patched with the latest software versions.

New fears in a climate of unrest

Coming on the heels of high-risk vulnerabilities like the SolarWinds hack and recent Log4j disaster, yet another critical weakness would be a concern even in normal times – but as nation-states and rogue security experts fight an escalating proxy war online, companies running affected devices must be aware of the risks of collateral damage even here in Australia.

Chinese cybercriminals, in particular, have been observed quickly taking advantage of new vulnerabilities to attack targets.

A Chinese government-aligned APT group called TA416, security firm Proofpoint recently warned, has been targeting phishing campaigns against European diplomatic, refugee and other targets for several years – with increasing frequency before and during the current conflict.

Each new vulnerability provides another arrow in the quiver of nation-state groups and cybercriminal gangs, which regularly mobilise to exploit new vulnerabilities before businesses can patch them.

Aubrey Perin, lead nation-state threat intelligence analyst with Qualys, noting that China tapped the recent Log4j vulnerability within “mere hours following CISA’s advisory” to compromise government systems in two US states.

With recent analyses suggesting that 30 per cent of Log4j systems still yet to be patched, Perin said, “organisations that continue to leave this flaw unaddressed are hitting the snooze button when it comes to the wake-up calls that China and other adversaries are delivering.”

The increasing cybercrime threat is, he added, “a critical point for inflection and a reminder that… while all eyes have been diverted to Russia and Ukraine, there are still other threats that are present and must be closely watched.”

READ MORE

A New Phishing Attack Warns About A Suspicious Russian Login

The human cost of war is horrific. All Knowsters are shocked and saddened by the all-out Russia-Ukraine land war. However, we are also inspired by the Ukrainian people for their bravery, resistance and resilience. As we all know, the price of freedom is eternal vigilance combined with the willingness to fight back.

I have spoken about Putin here many times, and I’m encouraged to see a robust global coordination to tackle this outrage. Planet Earth is an “anarchy of nations” – conflicting ideologies battle each other, and geopolitical risk can quickly become a high-priority security threat.

And then there are the low-lifes that exploit tragedies like this.

Researchers at Malwarebytes warn that a phishing campaign is informing users that someone logged into their account from an IP address in Moscow. The email contains a button to report the issue, which “opens a fresh email with a pre-filled message to be sent to a specific email account.” If a user sends this email, the attacker will reply and attempt to rope them further into the scam.

The researchers note that while the timing may be coincidental, users will probably be more inclined to respond to the emails given the current situation with Russia and Ukraine.

“We have to be very clear here that anybody could have put this mail together, and may well not have anything to do with Russia directly,” the researchers write. “This is the kind of thing anyone anywhere can piece together in ten minutes flat, and mails of this nature have been bouncing around for years. But, given current world events, seeing ‘unusual sign-in activity from Russia’ is going to make most people do a double, and it’s perfect spam bait material for that very reason.”

Malwarebytes explains that this is a common but effective technique used in phishing attacks.

“Trying to panic people into hitting a button or click a link is an ancient social engineering tactic, but it sticks around because it works,” they write. “We’ve likely all received a ‘bank details invalid,’ or ‘mysterious payment rejected’ message at one point or another.”

“Depending on personal circumstance and/or what’s happening in the world at any given moment, one person’s ‘big deal’ is another one’s ‘oh no, my stuff,’” the researchers write. “That’s all it may take for some folks to lose their login, and this mail is perhaps more salient than most for the time being.”

Note how topical scams can be. Criminals and spymasters watch the news and cut their phishbait to fit current events. New-school security awareness training enables your employees a healthy sense of skepticism so they can avoid falling for social engineering attacks.

Blog post with links:
https://blog.knowbe4.com/phishing-emails-warn-of-a-suspicious-login-from-russia

[Live Demo] Ridiculously Easy Security Awareness Training and Phishing

Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.

Join us TOMORROW, Wednesday, March 9 @ 2:00 PM (ET), for a live demo of how KnowBe4 introduces a new-school approach to security awareness training and simulated phishing.

Get a look TWO NEW FEATURES and see how easy it is to train and phish your users.

  • NEW! Security Culture Benchmarking feature let’s you compare your organization’s security culture with your peers
  • NEW! AI-Driven training recommendations for your end users in their own UI
  • Brandable Content feature gives you the option to add branded custom content to select training modules
  • Did You Know? You can upload your own SCORM training modules into your account for home workers
  • Active Directory Integration to easily upload user data, eliminating the need to manually manage user changes

Find out how 40,000+ organizations have mobilized their end-users as their human firewall.

Date/Time: TOMORROW, Wednesday, March 9 @ 2:00 PM (ET)

Save My Spot!
https://event.on24.com/wcc/r/3595260/AB844B61AF2ACF64E2BAF26C17366F79?partnerref=CHN2

Russia Could ‘Absolutely’ Lash Out at US Through Cyber, Lawmaker Warns

NextGov reports: Chairman Sen. Mark Warner, D-Va, gives an opening statement as FireEye CEO Kevin Mandia, SolarWinds CEO Sudhakar Ramakrishna and Microsoft President Brad Smith testify at a Senate Intelligence Committee hearing on Capitol Hill on February 23, 2021.

“Russia is expected to increase its cyber attacks as it continues a military assault on Ukraine, and one lawmaker warns that the U.S. should be prepared for future high level digital attacks.”

Speaking live to The Washington Post on Monday, Senator Mark Warner, D-Va. spoke about Russia’s cyber attacks on Ukraine’s networks and the spread of disinformation as part of the country’s offensive strategy.

“Do I expect Russia to up its game on cyber? Absolutely,” Warner said. “I do think we need to be prepared for high level––his A-Team––attacks against the West whether they start with nations in NATO [North Atlantic Treaty Organization] that have weaker cyber controls or whether they go straight against the United States, Britain, France, Germany.”

Warner hypothesized that Russian President Vladimir Putin did not prioritize launching cyberattacks against Ukraine’s infrastructure, and that the U.S. and other NATO allies should brace for major cyber hacks.

“When a top tier nation uses their top talent to attack in the cyber domain, chances are we will not be 100% effective at keeping the adversary out,” he said. Warner praised Cybersecurity and Infrastructure Security Agency Director Jen Easterly for strengthening protocols and being alert against cyberattacks and ransomware.”

“I think we will probably see that in the coming days and weeks as Putin tries to lash out against these crippling level of sanctions we put on him,” Warner added.

CONTINUED:
https://blog.knowbe4.com/russia-could-absolutely-lash-out-at-us-through-cyber-lawmaker-warns

See How You Can Get Audits Done in Half the Time, Half the Cost and Half the Stress

You told us you have challenging compliance requirements, not enough time to get audits done, and keeping up with risk assessments and third-party vendor risk is a continuous problem.

KCM GRC is a SaaS-based platform that includes Compliance, Risk, Policy and Vendor Risk Management modules. KCM was developed to save you the maximum amount of time getting GRC done.

Join us TOMORROW, Wednesday, March 9 @ 1:00 PM (ET), for a 30-minute live product demonstration of KnowBe4’s KCM GRC platform. Plus, get a look at new compliance management features we’ve added to make managing your compliance projects even easier!

  • NEW! Control guidance feature provides in-platform suggestions to help you create controls to meet your requirements for frameworks such as CMMC, GDPR, HIPAA, NIST, PCI, SSAE 18, and more
  • Vet, manage and monitor your third-party vendors’ security risk requirements
  • Simplify risk management with an intuitive interface and simple workflow based on the well-recognized NIST 800-30
  • Quick implementation with pre-built compliance requirements and policy templates for the most widely used regulations
  • Dashboards with automated reminders to quickly see what tasks have been completed, not met, and are past due

Date/Time: TOMORROW, Wednesday, March 9 @ 1:00 PM (ET)

Save My Spot!
https://event.on24.com/wcc/r/3595214/61CED1FF3E64DEF9BE3F478AE4A71AD2?partnerref=CHN2

Phishing Attacks Impersonating LinkedIn Are up 232% In the Last Month Alone!

During the period the world has dubbed “the great resignation”, phishing scammers are shifting tactics to take advantage of those looking for a new career or place of employment.

When phishing scammers are coming up with a new campaign idea, they want a brand they can impersonate that has a significant reach to improve their chances of a successful attack. With an estimated 67 million monthly active users, LinkedIn is a pretty great choice. According to new data from security vendor Egress, a significant rise in the number of attacks since February 1, 2022, impersonating LinkedIn are being seen.

The attacks use verbiage very familiar to anyone who uses LinkedIn as the subject lines:

  • You appeared in 4 searches this week
  • You appeared in 9 searches this week
  • You have 1 new message
  • Your profile matches this job

The emails come from an unassociated email address, but do leverage LinkedIn branding, logos, colors, etc. The links in these emails connect victims to lookalike websites intent on harvesting the users credentials that can later either be used to impersonate the victim in future attacks on others.

Even at your organization, there are employees that are thinking about leaving. Seeing an enticing “job match” email could be just the thing to catch the interest of an employee. And while the attack above only harvests credentials, we have seen others that end up infecting business endpoints. Security awareness training is the one viable method to significantly reducing the threat surface when it comes to email-borne attacks.

Blog post with links and screenshot:
https://blog.knowbe4.com/phishing-attacks-impersonating-linkedin-are-up-232-in-the-last-month-alone

Cybercrime-as-a-Service: Its Evolution and What You Can Do To Fight Back

The cybercrime market has skyrocketed in a frightening way. With threats such as ransomware to Business Email Compromise (BEC), the stakes are higher than ever for organizations across all industries.

However, just like in traditional business, cybercriminals can have trouble scaling. Enter cybercrime-as-a-service; when cybercriminals borrow from the legitimate business world to develop quickly-scalable strategies to put organizations like yours at risk like never before.

Join Erich Kron, Security Awareness Advocate at KnowBe4, as he explores today’s top attack vectors and the current threat landscape. He’ll explain how they are evolving, and what your organization can do to stay one step ahead.

In this session you will learn:

  • What “as-a-service” means for cybercrime and cyber defense
  • What PhaaS and RaaS are and how they relate to typical cybercrime
  • Why your cyber defense strategy should change
  • Why a strong human firewall is your best last line of defense

Get the details you need to know now to become a better cybersecurity defender and earn CPE credit for attending!

Date/Time: Wednesday, March 16 @ 2:00 PM (ET)

Save My Spot!
https://event.on24.com/wcc/r/3693287/351EDAF9DFA0D0A70177AB81B5E44C88?partnerref=CHN

[World Premiere] KnowBe4’s New Season 4 of Netflix-Style Security Awareness Video Series – ‘The Inside Man’

We’re thrilled to announce the long-awaited fourth season of the award-winning KnowBe4 Original Series – ‘The Inside Man.’ This network-quality video training series entertains and educates with episodes that tie security awareness principles to key cybersecurity best practices.

From social engineering, insider threats and physical security, to phishing, ransomware attacks and deepfakes, ‘The Inside Man’ teaches your users real-world application that makes learning how to make smarter security decisions fun and engaging.

When We Last Left Our Heroes…How will Mark Shepherd and his crew deal with the shadow of his past that returned in the Season 3 finale? Join Mark, now running “Good Shepherd Cybersecurity” alongside best buddy AJ, loyal colleague Fiona and fellow ex-felon Maurice, as they’re brought in to handle a devastating ransomware attack by a mysterious hacker group, “The 404.” The attack brought an international energy company to its knees; will Mark and his team have the skills to clean up the mess?

Simultaneously a global influencer falls prey to a deepfake. Season 4 sees Mark and the crew tackling twin threats. He looks like a hero, but in ‘The Inside Man,’ nothing is ever that straightforward.

READ MORE

By the Way, There’s No Draft – Smishing Campaign Alert

Scammers are sending phony text messages (aka Smishing or SMS Phishing) informing people in the US that they’ve been drafted by the US Army, according to Army Times.

“The false message, claiming to be the ‘United States Official Army Draft,’ informs recipients that they’ve ‘been marked eligible’ after attempts to reach them via mail,” Army Times says.

The messages tell recipients that they could face prison if they don’t respond to the message. Interestingly, while the scammers are likely attempting to exploit fears surrounding the war in Ukraine, the messages say the recipients will be deployed to Iran.

“Recipients of the fake notice are threatened with jail time if they don’t call the phone number associated with the text, which references Iran rather than Ukraine,” Army Times says. “Military Times was unable to find a match for the new message among draft scam screenshots from 2020, though, suggesting that the message may have been sent recently despite the error.”

US Army Recruiting Command (USAREC) said in a press release that similar text messages were sent in 2020 during a period of high tensions with Iran.

“Fraudulent messages about a purported military draft are once again circulating among members of the public,” USAREC said. “The messages, which are similar to those circulated two years ago, have been sent to various members of the public over the past week. These messages are false and were not initiated by the U.S. Army Recruiting Command.”

Army Recruiting Command added that in any case, a new draft would have to pass Congress before being enacted.

“The decision to enact a draft is not made at or by the U.S. Army,” USAREC said. “The Selective Service System, a separate agency outside of the Department of Defense, is the organization that manages registration for the Selective Service. In order to enact a draft, Congress would need to pass legislation authorizing it, and the resulting bill would then need to be signed by the president. A draft has not been in effect since 1973, and the U.S. military remains an all-volunteer force. While all males aged 18 through 25 are still required to register for Selective Service, doing so does not enlist them in the military.”

So, really, there’s been no draft since Richard Nixon was President of the United States. New-school security awareness training can enable your employees to see through these types of scams.

READ MORE

Phishing Attacks Impersonating LinkedIn are up 232% in the Last Month Alone!

During the period the world has dubbed “the great resignation”, phishing scammers are shifting tactics to take advantage of those looking for a new career or place of employment.

When phishing scammers are coming up with a new campaign idea, they want a brand they can impersonate that has a significant reach to improve their chances of a successful attack. With an estimated 67 million monthly active users, LinkedIn is a pretty great choice. According to new data from security vendor Egress, a significant rise in the number of attacks since February 1, 2022 impersonating LinkedIn are being seen.

The attacks use verbiage very familiar to anyone who uses LinkedIn as the subject lines:

  • You appeared in 4 searches this week
  • You appeared in 9 searches this week
  • You have 1 new message
  • Your profile matches this job

The emails come from an unassociated email address, but do leverage LinkedIn branding, logos, colors, etc.:

linkedin_blog002

Source: Egress

The links in these emails connect victims to lookalike websites intent on harvesting the users credentials that can later either be used to impersonate the victim in future attacks on others.

Even at your organization, there are employees that are thinking about leaving. Seeing an enticing “job match” email could be just the thing to catch the interest of an employee. And while the attack above only harvests credentials, we have seen others that end up infecting business endpointsSecurity Awareness Training is the one viable method to significantly reducing the threat surface when it comes to email-borne attacks.

READ MORE

What It’s Like to Be the Face of Romance (Scams)

A real US Army colonel named Daniel Blackmon is being impersonated in hundreds or even thousands of romance scams, according to Haley Britzky at Task & Purpose. The scammers took pictures from Col. Blackmon’s social media pages and used them to craft phony profiles. The real Blackmon, who is happily married and utterly unconnected with the scammers, is aware of these scams and is doing his best to let people know that he won’t message them if he doesn’t know them, and that he won’t ask for money.

“He’s far from the only service member whose likeness is used to scam unsuspecting people — typically women — into believing they’re in a friendship, or even romantic relationship, with the person behind the scam,” Britzky writes. “The top U.S. general in Afghanistan once said officials had uncovered more than 700 fake profiles under his name. And others with high profiles, such as former Defense Secretary Jim Mattis and former Chairman of the Joint Chiefs Joseph Dunford, have reported similar impersonations. Military romance scams are so common in fact that the Army’s Criminal Investigation Division has an entire webpage dedicated to informing people on how to spot them and report them.”

Britzky adds that these scams have warning signs, but people often miss them because emotions are involved.

“In a way, it’s not much different than other popular scams of the past, like the infamous ‘Nigerian prince’ emails asking people for their bank information that still rake in hundreds of thousands of dollars a year, according to ADT Security Services,” Britzky says. “But military romance scams, in particular, expose the knowledge gap between American citizens and their military. Troops deployed overseas, for example, will always have access to their money. And even if for some strange reason they didn’t, would they really be asking a stranger to send them thousands?”

Blackmon said that the best way to combat these scams is to spread awareness about them.

“We’ve just got to do our best to highlight it, and the more you highlight it the less chance they have,” Blackmon said. “And they’ll move on to something else. But it isn’t going to be this one.”

New-school security awareness training can give your employees a healthy sense of suspicion so they can avoid falling for social engineering attacks.

READ MORE

Russia likely using crypto to circumvent sanctions

Harsh economic sanctions were meant to punish Russia for its invasion of Ukraine, but there are already signs that Russia’s government and wealthy oligarchs may be using cryptocurrency to work around Western financial controls.

Backed by tax havens around the world including Switzerland and Monaco, direct sanctions on Russian President Vladimir Putin and the wealthy oligarchs that support him have frozen billions in assets.

Thanks to direct sanctions blocking Russian airlinesgas pipelinesships, and a range of other products, “we are inflicting pain on Russia and supporting the people of Ukraine,” US President Joe Biden said during this week’s State of the Union address – lauding “powerful economic sanctions” that had cut 30 per cent of the ruble’s value, crippled its stock market, and left the economy “reeling”.

Despite his optimism, however, monitoring of cryptocurrency markets suggests that Russian businesses and wealthy individuals are already adapting to the new normal.

The volume of high-value daily cryptocurrency transactions – those worth more than $US100,000 – was worth $22b ($US16b) when Western countries blocked Russia from the global SWIFT payments network on 26 February – and had quadrupled to $88b ($US64b) just two days later.

Yet this rapid growth isn’t the most significant part, said Rance Mashek, president and founder of trading platform iVest+, who noted that the difference between inflow and outflow was just $55m ($US40m).

That means the entities conducting those large transactions are buying and selling almost exactly the same amount of cryptocurrency.

That, in turn, suggests that they aren’t investing in crypto to hold onto it, but are instead using it as a form of currency exchange.

Looking back over the past 90 days of data, Mashek told Information Age, “this is the biggest disparity between large block transactions happening and the lack of inflow and outflow.”

“What do you deduce from that except that it looks like this is transactional? That’s what you can do out there – move out of the ruble into the US dollar or Australian dollar – and do it through Bitcoin.”

SWIFT retribution

The figures are a reminder of the challenges that cryptocurrencies and decentralised finance (DeFi) pose for the world’s governments, which have struggled to keep up with criminals that value cryptocurrency’s anonymity and non-traceability – and exploited DeFi to launder nearly $12b last year alone.

High net-worth criminal ‘whales’, like the Russian oligarchs targeted in the current sanctions, are currently holding more than $34.5b ($US25b) in cryptocurrency, according to a new Chainalysis report that identified 4068 criminal whales – a third of which received 90 per cent or more of their funding from known illicit sources.

Based on the time zones of criminal transactions, Chainalysis concluded, the largest number of cryptocurrency whales were found in the UTC+2UTC+3 and UTC+4 timezones – which correspond to Kyiv, Moscow/St Petersburg, and Dubai, respectively.

“The ability to efficiently track criminal whales and quantify their holdings from one public data set is a major difference between cryptocurrency-based crime and fiat-based crime,” the firm notes.

“In cryptocurrency, transactions are saved on the blockchain for all to see [and] investigation of criminal whales represents a significant opportunity for government agencies.”

While law-enforcement authorities have had some success in tracking down and recovering cryptocurrency ransomware payments, Mashek notes that this was possible because authorities knew where the first payment had come from – giving them somewhere to start following the money trail.

“But if they don’t know what it is,” he said, “how can they follow it?”

Even as one Russian oligarch publicly warned that sanctions won’t stop the conflict, world governments are preparing further measures – but because conventional financial systems are based on transparency and the rule of law, experts warn they can only do so much.

Russia likely anticipated the prospect of sanctions, they say – and if the now global pariah can transact with other rogue nation-states in secret using anonymous and untraceable cryptocurrencies, the result could well be an alternative trade system operating under the noses of global financial authorities.

Just as the COVID-19 pandemic normalised remote working and the use of remote-collaboration tools like Zoom, Mashek believes a surge in use of cryptocurrency – including many legitimate efforts by charities and relief efforts – could normalise its role in international commerce.

If the conflict “lasts for a prolonged period, and [cryptocurrency] starts to become the norm in this environment to get things done, that is just going to put that much more of a stamp of approval” on cryptocurrency, he said, noting that exchange platforms would be tested like never before throughout the conflict.

“The short term is going to prove it or not,” he explained. “If crypto doesn’t hold its security, that’s going to show a vulnerability – but if it does, and it shows that it can handle the increase in flow and that the transactional volume can be supported, that’s going to be pretty strong.”

“Getting that widespread societal adoption might take a while, but so far we have not seen anything that indicates that is a problem.”

READ MORE

Wartime Suffering as Phishbait

It’s easy to forget, when a hybrid war like the one currently raging in Ukraine is occupying so much attention, that ordinary criminal lowlifes continue to seek victims, and the war only gives them another pretext to dangle in front of the unwary.

That’s happening right now. Avast warns that criminals have begun, in their sorry but entirely foreseeable way, to exploit people’s sympathies for those suffering in Ukraine. “As cybercriminals seek to take advantage of the chaos,” the company writes in its blog, “we have tracked in the last 48 hours a number of scammers who are tricking people out of money by pretending they are Ukrainians in desperate need of financial help. In the past, we have seen similar scams for people stuck while traveling or looking for love. Unfortunately, these attackers do not operate ethically and will use any opportunity to get money out of people willing to help others in need. What’s suspicious is the immediate mention of Bitcoin, as well as the usernames that consist only of letters and numbers.”

Other criminals (and here Avast credits their colleagues at ESET) are hawking “UkraineTokens,” whatever those might be. In that scam the crooks are combining sympathy with fashion. It’s easy to imagine the marks thinking, well, we’d like to help, and didn’t we see ads for tokens or something on T.V.? Maybe that’s how things are done nowadays. The UkraineToken scam is fairly easy to see through, since it’s marked with the poor grammar and loose idiomatic control that usually distinguishes fraudulent pitches.

This kind of social engineering hasn’t been confined to any one channel, Avast points out. “There have also been reports of similar scams spreading on TikTok and other social media sites. In general, we strongly advise not to send any money to unknown people directly, especially in any form of cryptocurrency, as it is virtually impossible to deduce if it is a person in need or a scammer.”

If you’re moved to help, Avast advises doing so through well-known, credible, trusted organizations, and doing so through those organization’s official websites, not through links shared in social media.

It’s sad that criminals would seek to take advantage of people’s best impulses during a time of crisis, but such is the criminal world. New-school security awareness training can enable your employees to thwart both sophisticated and rudimentary phishing attacks.

READ MORE

Scammers Will Take Advantage of New IRS Rules

New IRS requirements will soon be used as phishbait, according to Gene Marks, owner of Marks Group PC and a columnist for the Guardian.

“Beginning for the 2022 tax year, if you receive more than $600 in total payments during the course of the year from a payment service like PayPal, Venmo (which is owned by PayPal), Square, Stripe or online sales of your products made through Amazon, Etsy and other marketplaces – regardless of how many customers are paying – that payment service is required to report that amount to the IRS and to you by sending a Form 1099-K – used for reporting payments via these third parties – in early 2023,” Marks explains.

Scammers frequently pose as the IRS, and the new rules give them new material to use in phishing attacks.

“Starting mid-year, I predict, millions of individuals and small businesses will be receiving requests from payment services they used asking to provide or update their personal information – including their social security and tax identification numbers – so that those services can comply with the new 1099 rules,” Marks says. “They’ll come by email mostly, although some will be by text. Unfortunately, a scammer can also send a fake text or email – or millions of fake texts and emails – to small businesses that look genuine but surreptitiously divert you to a fake website that not only collects your most personal data but also can download malware into your network to be used for future attacks and mischief.”

Marks says that people should be on the lookout for phishing attacks that pose as payment providers asking for financial information.

“Take a few minutes to visit every one of your payment service providers’ websites and update your 1099 information,” Marks says. “Train your financial employees that may be receiving email requests to know what to look for. If you’re not sure of a sender, then ignore the email. Report any suspicious requests directly to the payment service provider. If you are submitting information, make sure you’re doing it directly on the payment provider’s website and avoid clicking on any links in an email. Otherwise you’ll be opening yourself up to serious problems. By mid-year I predict you’ll be hearing a lot more about this scam. Start paying attention now.”

As laws and regulations change, their very unfamiliarity can open up new, initially plausible lines of social engineering. New-school security awareness training can prepare your employees for new trends in phishing attacks.

READ MORE