Google Ads Abused to Deliver Malware

Cybercriminals are using malicious Google Ads to deliver the ZLoader banking Trojan, ZDNet reports. Researchers at Microsoft stated on Twitter that attackers are purchasing Google Ads that point to compromised websites, then redirect the user to a malicious website that delivers the malware. The criminals use the ads to target people who search Google for certain keywords.

“While analyzing ZLoader campaigns in early September, we observed a notable shift in delivery method: from the traditional email campaigns to the abuse of online ad platforms,” Microsoft said. “Attackers purchased ads pointing to websites that host malware posing as legitimate installers.”

The attackers also registered a phony company to cryptographically sign the malware files, making them more likely to appear benign to antivirus products.

“In addition to creating malicious installers, this shift in delivery method required to register a fraudulent company so they can sign the malicious files,” Microsoft said. “These files purport to install legitimate apps but instead deliver ZLoader, which provides access to an affected device.”

ZLoader is a remote access Trojan that serves as an initial foothold for additional malware, including ransomware.

“The operators of this campaign can then sell this access to other attackers, who can use it for their own objectives, such as deploying Cobalt Strike or even ransomware,” Microsoft said.

ZDNet notes that the US Cybersecurity and Infrastructure Security Agency (CISA) warned last week that ZLoader is being used to distribute Conti ransomware.

“[CISA] and the Federal Bureau of Investigation (FBI) have observed the increased use of Conti ransomware in more than 400 attacks on U.S. and international organizations,” CISA stated. “In typical Conti ransomware attacks, malicious cyber actors steal files, encrypt servers and workstations, and demand a ransom payment.”

New-school security awareness training can give your employees a healthy sense of suspicion so they can avoid falling for these types of attacks.

READ MORE

Newest iPhone Launch is Now a Scammer’s Advantage

Scammers are taking advantage of the launch of iPhone 13, according to researchers at Zscaler. The launch event was streamed live last week on Apple’s official YouTube channel, and scammers set up phony channels that impersonated Apple’s broadcast. One of these fraudulent channels had 1.3 million subscribers and over 16,000 live viewers, which added legitimacy to the scam. The channel had a link to a phishing page, stating, “Special Event for you taking place NOW: www.2021apple[.]org.”

The link leads to a convincingly spoofed version of Apple’s website, with a page that says, “Hurry, and take part in our giveaway of 1,000 BTC! Apple have allocated a total of 1,000 BTC to be given away. Learn how to participate, and don’t miss out on your chance to get some!”

If the user clicks the button to participate, they’ll be asked to send between 0.1 BTC and 20 BTC to a Bitcoin address in order to receive double in return. The site says that 819 BTC have already been given away, which adds urgency to the scam. Zscaler notes that this scam alone was very successful before it was taken down.

“This wallet has received 1.48299884 bitcoins till now (worth around $69K),” the researchers write. “Currently, the site is taken down, and we believe it to be a short-lived attack. The huge sum collected in the bitcoin wallet in such a short period of time shows a sophisticated and highly successful attempt by the scammers. Scammers are becoming smart and observant, and whenever such hyped events happen, they try to take advantage of this to target mass audiences. Stay away from such unofficial giveaways and do not fall for such hype-driven scams.”

New-school security awareness training can enable your employees to avoid falling for these types of social engineering scams.

READ MORE

Executives: Ransomware is the Greatest Threat Concern, But Few are Actually Prepared

new poll from Deloitte shows organizations are all too aware of the problem of ransomware, but aren’t ready to respond to the specific ransomware scenario given that the attackers have the upper hand.

This is a serious problem.

If you’ve been reading my blogs, I’ve repeatedly made it known that ransomware is dangerous, pervasive, and costly. But this new data from Deloitte makes it clear that a material number of organizations are going to realize one click too late that they have no real ability to respond to a ransomware attack.

According to the Deloitte data:

  • 87% of organizations expect the number of cyberattacks targeting their organization to increase over the next 12 months
  • 65% of execs feel ransomware is the greatest threat concern in the next 12 months
  • 54% have incident response plans, but nothing specifically for ransomware
  • Only 33% of organizations have simulated an attack, testing response plans

According to Kieran Norton, Deloitte Risk & Financial Advisory’s infrastructure security solution leader and principal in Deloitte’s press release, “Strong executive and board level oversight of and support for the cyber risk management program is a critical part of event preparedness. Leaders at the highest levels need to understand the crucial role they play in prevention — by providing oversight, governance and tone from the top — as well as direct support for attack response.”

The fact that half have an IR plan and only a third of organizations ever simulate an attack, you better have a strong preventative security posture – one that includes Security Awareness Training – to stop an attack. Otherwise, you’re going to feel the pain of having no plan or idea of how to respond.

READ MORE

Social Media Quizzes May Be Data Scrapers Building Victim Profiles

The seemingly benign quizzes asking personal details take advantage of individuals’ willingness to share and could be used to establish passwords, password hints, and more.

We’ve all seen them – quizzes on Facebook asking everything from which Harry Potter character are you, to what state were you born in, to what was your first pet’s name. It seems that none of the people answering these questions saw the scene in the movie “Now You See Me” where the main characters tricked Arthur Tressler into divulging personal information to be used later against him.

According to security vendor Avast, the new wave of social media quizzes may very well be intent on doing the same thing. “They’re meant to seem so light and fluffy that anyone looking for a boredom-killer might be amused by them. And that’s the point. The creators of these quizzes want them to appear meaningless and harmless. They want everyone to engage whimsically with them. Because in truth, many are phishing attempts at your personal data.”

Because of the seemingly innocent (and entertaining) nature of the quizzes, threat actors using such tactics can easily capture information that is often used as the source of passwords or password reset questions.

Security Awareness Training will help keep employees vigilant against such social engineering tactics, helping to minimize your organization’s threat surface and keep attacks from being successful.

READ MORE

Over $100,000,000 Lost to Romance Scams in Seven Months

People in the US lost $133,400,000 to romance scams between January 1st and July 31st of 2021, according to the FBI. The average amount lost was in the tens of thousands of dollars. The scammers trick the victims into thinking they’re investing in cryptocurrencies.

“The scammer’s initial contact is typically made via dating apps and other social media sites,” the FBI says. “The scammer gains the confidence and trust of the victim—through establishing an online relationship—and then claims to have knowledge of cryptocurrency investment or trading opportunities that will result in substantial profits. The scammer directs the victim to a fraudulent website or application for an investment opportunity. After the victim has invested an initial amount on the platform and sees an alleged profit, the scammers allow the victim to withdraw a small amount of money, further gaining the victim’s trust.”

The FBI explains that once the scammer has a victim on the hook, they’ll keep coming up with more reasons for the victim to send them money.

“After the successful withdrawal, the scammer instructs the victim to invest larger amounts of money and often expresses the need to ‘act fast,’” the Bureau says. “When the victim is ready to withdraw funds again, the scammers create reasons why this cannot happen. The victim is informed additional taxes or fees need paid, or the minimum account balance has not been met to allow a withdrawal. This entices the victim to provide additional funds. Sometimes, a ‘customer service group’ gets involved, which is also part of the scam. Victims are not able to withdraw any money, and the scammers most often stop communicating with the victim after they cease to send additional funds.”

The FBI offers the following advice to help people avoid falling for these scams:

  • “Never send money, trade, or invest per the advice of someone you have solely met online.
  • “Do not disclose your current financial status to unknown and untrusted individuals.
  • “Do not provide your banking information, Social Security Number, copies of your identification or passport, or any other sensitive information to anyone online or to a site you do not know is legitimate.
  • “If an online investment or trading site is promoting unbelievable profits, it is most likely that—unbelievable.
  • “Be cautious of individuals who claim to have exclusive investment opportunities and urge you to act fast.”

New-school security awareness training can help your employees recognize social engineering tactics.

The FBI has the story.

READ MORE

Probability of Experiencing a Vendor Email Compromise Attack Increases 96%

Vendor Email Compromise requires first taking control of a strategic email account within the victim organizations. According to new data, cybercriminals are getting really good at this.

Vendor Email Compromise – an attack where an email account is actually taken over rather than simply spoofed as seen in business email compromise attacks – can have a far greater impact on the organization. Emails coming from a threat actor-controlled legitimate email account are much harder – if not impossible – to discern as being malicious in nature.

According to new data in Abnormal Security’s Q3 2021 Email Threat Report, email account takeovers are rising in both number and success rates:

  • The chance of experiencing a VEC attack has risen 96% over the last 12 months
  • Mid-sized companies are 43% likely to have at least one account takeover per quarter
  • Enterprises with 50K+ employees are 60% likely to be a victim of account takeover
  • The C-Suite is the most targeted group, at three times than VPs – the next targeted group
  • 14% of account takeovers occur at department head levels within organizations
  • The average request in a VEC attack is $183,000, with the highest documented being $1.6 million

With the potential for VEC attacks to cost organization’s millions annually, it’s first imperative to protect email accounts from the possibility of account takeover using multi-factor authentication and zero trust solutions that scrutinize requests to access email. It’s equally important to educate users involved with the organization’s finances using Security Awareness Training to maintain a sense of vigilance – even when a request comes from a legitimate source. It’s necessary to validate any unexpected requests using a separate communication medium to ensure the person believed to be asking is actually doing so.

READ MORE

Enterprise Organizations Have as Much as an 85% Chance of Receiving a BEC Attack Every Week

Business Email Compromise is a multi-billion dollar business, representing 43% of all cybercrime last year. Despite it being dwarfed in the news by ransomware, it represents a growing threat.

We’ve seen recent rises in BEC activity – along with a number of other cyberattacks – in both frequency and cost. But BEC tends to get lost in the shuffle; particularly when ransomware news has ransoms in the millions of dollars and seems to happen every day. But BEC is just as impactful a cyberattack and, from the latest data, seems to be happening quite frequently.

Keep in mind that most BEC attacks are limited in scope to the one and only CFO in your organization or a small group of individuals in the finance department. The good news is as the organization grows, the number of BEC attacks won’t necessarily increase. The bad news is that threat actors only need to focus on a few people to be successful.

In addition to enterprises having a high probability of attack, according to Abnormal Security’s Q3 2021 Email Threat Report, businesses of every size are at risk:

  • Small organizations under 500 employees have a 42% probability of receiving a BEC attack each week
  • Mid-sized organizations, a 60-70% chance

Part of this growth is the expansion in operational methods used by cybercriminal groups seen on the dark web. Posts on cybercrime forums have been spotted that attempt to recruit or outsource functions related to BEC scams – particularly those looking for native-English speakers to help improve the credibility and efficacy of social engineering elements in BEC attacks.

Because BEC relies pretty heavily on social engineering and spoofing companies, domains, and/or an individual, putting employees through Security Awareness Training is an effective way to minimize the threat surface of phishing attacks and stop BEC attacks before they have an opportunity to make an organization a victim.

READ MORE

U.S. Cyber Command General Promises ‘Surge’ To Fight Ransomware Attacks

The Hill reported 9/14/2021: “Gen. Paul Nakasone, the head of U.S. Cyber Command and director of the National Security Agency (NSA), is working to “surge” efforts to respond to the mounting ransomware attacks on critical U.S. organizations.

“Even six months ago, we probably would have said, ‘Ransomware, that’s criminal activity,’ ” Nakasone said as part of an interview with The Associated Press published Tuesday. “But if it has an impact on a nation, like we’ve seen, then it becomes a national security issue. If it’s a national security issue, then certainly we’re going to surge toward it.”

Nakasone told The Associated Press that there was “an intense focus” on the part of government specialists to tackle cybersecurity threats and to “impose costs when necessary,” including through publicly calling out countries behind major cyberattacks.

His comments came on the heels of months of attacks on both U.S. government groups and private industry.

These have included those linked to foreign governments, such as the SolarWinds hack, which allowed Russian-government linked hackers to compromise nine federal agencies and 100 private sector groups for much of 2020. President Biden imposed sanctions on Russia in connection with the attack in April.

The incidents have also included major ransomware attacks on companies including Colonial Pipeline, which provides 45 percent of the East Coast’s fuel supply, and on meat producer JBS USA, both of which were linked to Russian-based cyber criminal groups. Full article continued at The Hill:

https://thehill.com/policy/cybersecurity/572203-general-promises-surge-in-effect-to-fight-ransomware-attacks

READ MORE

Ransomware Resurrection? REvil Servers Come Back Online

After months of what was thought to be the retirement of the REvil ransomware gang, REvil-related systems and Tor sites popped up on the Dark Web last week.

We thought we had seen the last of REvil – one of the most prolific and impactful pieces of ransomware to date. Its ransomware-as-a-service model made it a popular variant used in some of the most well-known attacks this year, taking in tens of millions of dollars in the process. It was thought that REvil had become Darkside and then BlackMatter (which may still be true), but last week’s development may change that.

According to Bleeping Computer, on September 7, both the Tor payment/negotiation site and REvil’s Tor ‘Happy Blog’ data leak site suddenly came back online. The negotiation site did not seem to be functional and the data leak site hadn’t been updated since July 28th.

This may be a mishap due to booting up old systems that are to be repurposed. But even so, it’s a reminder that some of the greatest minds in ransomware can easily “re-band” as easily as they can disband, putting organizations like yours further at risk.

Security Awareness Training plays a major role in the protection against ransomware attacks. Affiliates for REvil and other RaaS variants still need a way to gain entrance into an organization. Phishing is one of the most used initial attack vectors. By implementing Security Awareness Training, organizations can teach users to participate in the organization’s security stance, being continually vigilant against any email or web content that may seem suspicious, helping to minimize the likelihood of engagement with malicious links or attachments.

READ MORE

Blame it on the Lizard Brain

People need to work to overcome their inherent biases in order to avoid falling for social engineering attacks, according to Heidi Mitchell at the Wall Street Journal.

“Criminals lure smart people into their traps by taking advantage of the unconscious, automatic processes that act as shortcuts to make our decision-making more efficient,” Mitchell explains. “These cognitive biases—arising from what’s often referred to as our ‘lizard brains’—can cause us to misinterpret information and make snap judgments that may be irrational or inaccurate.”

Professor Cleotilde “Coty” Gonzalez from Carnegie Mellon University told the Journal that criminals take advantage of human psychology to make their attacks more effective, explaining that “if something is presented as a loss, we are more willing to take a risk [to avoid it]; if it’s presented as a gain, we are OK with taking a safe option.”

As a result, people are more likely to fall for a scam that tells them they’re going to lose money, as opposed to one that offers to give them money.

Mitchell adds, “Or a scammer might send a message to your work email, claiming that there is a problem with an account at one of your corporate suppliers, and warning that your shipment—one that your boss is counting on—will be delayed unless you verify your account information in a link provided by them. The fake link leads to a fake website that looks like the real thing. By playing on your fear of losing access to your account, the scammer gets your credentials.”

Scammers also take advantage of authority bias and urgency bias to compel their victims to act. Authority bias can be seen in business email compromise (BEC) attacks, in which an attacker impersonates a person of authority within an organization and sends a request to a lower-level employee. Urgency bias is often tied into these attacks, and involves making the victim believe they must act quickly to fulfill a request.

New-school security awareness training can give your employees a healthy sense of suspicion so they can spot red flags associated with social engineering attacks.

READ MORE