Phishing Campaign Targets TikTok Influencers

Phishing emails are targeting large TikTok accounts with phony copyright warnings or offers for account verification, according to researchers at Abnormal Security.

“An email campaign sent in two rounds on October 2, 2021, and November 1, 2021 to more than 125 individuals and businesses appeared to target large-volume TikTok accounts of all kinds and across disparate locales,” the researchers write. “Among the typical talent agencies and brand-consultant firms we would expect to see, this actor sent messages to social media production studios, influencer management firms, and content producers of all types….From well-known digital media channels to individual actors, models, and magicians, the campaign reached out to content creators worldwide. Several emails were sent to the wrong company of the same name in the same country, and many of the email addresses used appear to have been lifted directly from social media.”

The researchers add that the attackers set a time constraint to ensure that the victim acts quickly, then send a link to trick the user into entering their credentials.

“This campaign indicates that attackers have linked TikTok with the social media giants, including Facebook and Twitter, in the impersonation game,” the researchers write. “In the original phishing email, designed to appear like a copyright violation notice from TikTok, the victim was instructed to respond to the message, lest their account be deleted in 48 hours.”

Abnormal notes that hackers sometimes demand a ransom to return the account to its owner.

“While we were unable to identify the end goal of the campaign, past targeting of social media accounts on other platforms offers several options,” the researchers write. “Social media accounts have become increasingly valuable in recent years, creating the incentive to ransom them back to the original owners for a hefty fee. An underground economy has evolved to offer ban-as-a-service, manipulating abuse reporting mechanisms to harass and censor other users, primarily on Instagram. Sadly, victim accounts in this scenario often end up deleted, especially for those on TikTok.”

New-school security awareness training can enable your employees to recognize social engineering tactics so they can avoid falling for these attacks.

READ MORE

FBI: Cyber Attacks Target Organizations Involved in Mergers and Acquisitions

A new notification from the FBI warns organizations of attacks at the perfect time when organizations are spending money, new people are being introduced, and operations are in flux.

Threat actors like nothing more than a dash of chaos when it comes to timing their attacks. If they can get the social engineering theming just right, that chaos – when added to a sense of urgency – causes individuals to rush and not think actions through properly. This allows cyber attacks to succeed far more often than they should.

According to the FBI notification, the threat actors responsible are very aware of who they are targeting: “During the initial reconnaissance phase, cyber criminals identify non-publicly available information, which they threaten to release or use as leverage during the extortion to entice victims to comply with ransom demands. Impending events that could affect a victim’s stock value, such as announcements, mergers, and acquisitions, encourage ransomware actors to target a network or adjust their timeline for extortion where access is established.”

Judging from the warning put out by the FBI’s Internet Complaint Center (IC3) earlier this month, cybercriminal gangs are using these major financial events as the perfect juncture for ransomware attacks involving extortion. Think about it – let’s take a fictitious public company being bought by a private investment firm. The entire cost of the deal revolves around the stock price. Now, if a ransomware attacker can succeed in stealing data from and encrypting the systems of the public company, having the public find out could cause the stock price to diminish – thus lowering the value of the company and its purchase price.

If your organization is going through a merger or acquisition (or planning to in the future), it’s imperative that you put up the strongest possible defense against ransomware – which includes the use of Security Awareness Training to include users in the defending against such attacks where malicious email content finds its’ way past security solutions and into the user’s Inbox.

READ MORE

Avoid Donating to Charity Scammers During Giving Tuesday 2021

Giving Tuesday is a great way for organizations and people to give back. However, this gives cybercriminals opportunities to take advantage of you with charity scams.

The Federal Trade Commission provided some helpful tips to help you and your users to donate safely this holiday season and all year round:

  1. Do some research online – Start by searching for causes you care about along with phrases like “best charity” or “top rated charity”. When you consider giving to a specific charity, search its name plus “complaint,” “review,” “rating,” or “scam.” You can use resources such as Charity Navigator or CharityWatch to verify your search.
  2. Be careful how you pay – If someone wants donations in cash, by gift card, or by wiring money, don’t do it. That’s a trap for scammers to take your money. Be on the safe side and pay by credit card or check, and keep records of your donations. Before you click on a donation link, check out this FTC article to help you make sure your money is going where you think it is.
  3. Keep scammers’ tricks in mind – Some cybercriminals try to trick you into paying them by thanking you for a donation that you never made, or use a local area code when making a call. Make sure to watch out for red flags such as guaranteeing sweepstakes winnings in exchange for a donation (it’s illegal) or claims that your donation is tax-deductible when it’s not. If you’re feeling rushed or pressured to make a donation, that should also be a red flag that something isn’t quite right.

Every year cybercriminals prove there is no social engineering scheme too low for them to use in their attacks. New-school security awareness training can train your users on how to spot and report any malicious activity.

READ MORE

SEC Warns of Spoofed Emails Impersonating Their Employees

Scammers are impersonating the US Securities and Exchange Commission (SEC) with spoofed phone calls and other communications that attempt to steal money and personal information from victims.

“We are aware that several individuals recently received phone calls or voicemail messages that appeared to be from an SEC phone number,” the SEC said in a statement. “The calls and messages raised purported concerns about unauthorized transactions or other suspicious activity in the recipients’ checking or cryptocurrency accounts. These phone calls and voicemail messages are in no way connected to the SEC. If you receive a communication that appears to be from the SEC, do not provide any personal information unless you have verified that you are dealing with the SEC. The SEC does not seek money from any person or entity as a penalty or disgorgement for alleged wrongdoing outside of its formal Enforcement process.”

The SEC stresses that it won’t ask for money or information via unsolicited messages.

“SEC staff do not make unsolicited communications – including phone calls, voicemail messages, or emails – asking for payments related to enforcement actions, offering to confirm trades, or seeking detailed personal and financial information,” the SEC says. “Be skeptical if you are contacted by someone claiming to be from the SEC and asking about your shareholdings, account numbers, PIN numbers, passwords, or other information that may be used to access your financial accounts. Again, never provide information to someone claiming to be from the SEC until you have verified that the person actually works for the SEC.”

The statement adds that scammers impersonate real employees at the SEC to add legitimacy to their schemes.

“Con artists have used the names of real SEC employees and email messages that falsely appear to be from the SEC to trick victims into sending the fraudsters money,” the SEC says. “Impersonation of U.S. Government agencies and employees (as well as of legitimate financial services entities) is one common feature of advance fee solicitations and other fraudulent schemes. Even where the fraudsters do not request that funds be sent directly to them, they may use personal information they obtain to steal an individual’s identity or misappropriate their financial assets.”

READ MORE

Microsoft Exchange Server Flaws Now Exploited for BEC Attacks

Threat actors are using a couple of dangerous, new tactics to exploit the so-called ProxyShell set of vulnerabilities in on-premises Exchange Servers that Microsoft patched earlier this year — and were the targets of widespread attacks in July.

In multiple recent incident response engagements, Mandiant researchers found attackers had abused ProxyShell to drop Web shells on vulnerable systems in a different — and more difficult to detect — manner than used in previous attacks. In some attacks, threat actors skipped Web shells entirely and instead created their own hidden, privileged mailboxes, giving them the ability to take over accounts and create other problems.

As many as 30,000 Internet-facing Exchange Servers remain vulnerable to these attacks because they have not been patched, Mandiant said. Full article at DarkReading.

READ MORE

Fake Ransomware’ as a Form of Social Engineering

Attackers are exploiting a vulnerability in a WordPress plugin to deface several hundred websites with phony warnings of ransomware, the Record reports. Researchers at Sucuri found that around three hundred WordPress sites displayed the text “SITE ENCRYPTED” followed by “FOR RESTORE SEND 0.1 BITCOIN.” (A Google search for this text shows that many sites are still affected.)

The researchers note that 0.1 Bitcoin is currently worth about $6,000, which is low enough that a small business might consider paying it if they thought their website had been encrypted. The Record says that no one has paid the ransom yet, which is probably due to the fact that the ransom note only appears on a few pages on the website. The attackers used a vulnerability in the legitimate business directory listing plugin Directorist.

“In checking the access logs for the website it was easy enough to determine the IP address responsible,” Sucuri says. Our client was located in the southern United States, however we saw quite a few requests from a foreign IP address which was interacting with the directorist plugin using the plugin editor feature of wp-admin. This suggests that the legitimate plugin was already installed on the website and later tampered with by the attackers.”

In the case that Sucuri examined, the researchers note that the attacker had access to the site’s administrative password.

“Interestingly, the very first request that we saw from the attacker IP address was from the wp-admin panel, suggesting that they had already established administrator access to the website before they began their shenanigans,” the researchers write. “Whether they had brute forced the admin password using another IP address or had acquired the already-compromised login from the black market is anybody’s guess.”

New-school security awareness training can enable your employees to remain level-headed when they encounter social engineering attacks.

READ MORE

Bait Attacks as Reconnaissance

Researchers at Barracuda warn that attackers are sending non-malicious emails as a precursor to targeted phishing attacks.

“Bait attacks are a class of threats where the attackers attempt to gather information they can use to plan future targeted attacks,” the researchers write. “The bait attacks, also known as reconnaissance attacks, are usually emails with very short or even empty content. The goal is to either verify the existence of the victim’s email account by not receiving any ‘undeliverable’ emails or to get the victim involved in a conversation that would potentially lead to malicious money transfers or leaked credentials. Because this class of threats barely contains any text and does not include any phishing links or malicious attachments, it is hard for conventional phishing detectors to defend against these attacks.”

The researchers replied to one of these messages and confirmed that their email address was targeted by a spear phishing attack two days later.

“While it is known that bait attacks usually precede some sort of targeted phishing attack, our research team ran an experiment by replying to one of the bait attacks that landed in one of our employee’s private mailboxes,” the researchers write. “The original attack on August 10, 2021 was an email with a subject line ‘HI’ and an empty body content. As part of the experiment, the Barracuda employee then replied on August 15, 2021 with an email containing, ‘Hi, how may I help you?’ Within 48 hours on August 17, 2021, the employee received a targeted phishing attack. The original email was designed to verify the existence of the mailbox and the willingness of the victim to respond to email messages.”

The researchers note that more than one-third of organizations were targeted by these emails in September 2021.

“While the number of bait attacks is still low overall, they are not unusual,” Barracuda says. “Based on analysis by Barracuda researchers, just over 35% of the 10,500 organizations analyzed were targeted by at least one bait attack in September 2021, with an average of three distinct mailboxes per company receiving one of these messages.”

New-school security awareness training can enable your employees to recognize phishing and other social engineering attacks.

READ MORE

Phishing Emails Use Small Font Size to Bypass Security Filters

Researchers at Avanan have spotted phishing emails that use a font size of one to fool email security scanners. The emails appear to be password expiration notifications from Microsoft 365. The attackers have inserted benign links that are invisible to the human eye, but trick security scanners into viewing the email as a legitimate marketing email.

“In this attack, hackers utilize a number of obfuscation techniques to get a credential harvesting page through to the inbox,” the researchers write. “First, all links are hidden within the CSS. This confuses natural language filters. Natural language filters see random text; human readers see what the attackers want them to see. In addition, hackers put links within the <font> tag, and brought the font size down to one. This breaks semantic analysis, which leads many solutions to treat it as a marketing email, as opposed to phishing. Beyond that, there are invalid parameters, as the ‘Padding Left’ is set to ‘;’ further confusing scanners.”

Avanan concludes that the phishing emails themselves appear suspicious, so a trained user would be able to spot them as malicious. The emails simply state, “Notification for Password 365. Access To Your Email will be Expired.”

“To the end-user, this email looks like a standard request from their IT department,” the researchers write. “The email is designed to fool both Natural Language Processing and human eyes. For a user to spot this attack, they should rely on their phishing training. They should notice the stilted grammar, such as ‘Notification Microsoft 365’ as a red flag. They should also ask their own IT department before resetting any passwords.”

Thus, insecurity by obscurity. Attackers are constantly coming up with new ways to bypass email security filters. New-school security awareness training can give your employees a healthy sense of suspicion so they can avoid falling for social engineering attacks.

READ MORE

“Customer Complaint” May Get Your Attention

spear phishing campaign is sending phony “customer complaints” that contain a link to a malicious website, according to Paul Ducklin at Naked Security. The phishing emails appear to come from a manager at the employee’s company, and ask the recipient about a customer complaint they received. The link in the email purports to lead to a PDF of the complaint on the employee, but leads to a page where the victim is tricked into downloading malware.

Ducklin adds that people are even more likely to click on the link if they work in a high-pressure environment.

“Worse, of course, is that junior staff in commonly outsourced jobs such as first-line support, where time pressure is always high, are the most likely to have been threatened with complaints by aggressive callers determined to get their way,” Ducklin writes. “And, let’s be perfectly honest, if you’ve ever worked in support, you’ll rarely ever have ‘reported yourself to management’ when a caller shouted at you and complained, unless the call was so aggressive or threatening that you wanted to ensure it was placed on the record for your own safety.”

Ducklin notes that in this case the sloppy appearance of the emails could tip off the recipient that the messages are fake.

“Never let yourself be pressured or threatened into acting in haste, because that’s exactly what the crooks are hoping you will do,” Ducklin says. “This scam is full of mistakes (spelling, grammar, incorrect web links, unlikely file downloads, digital signatures that simply don’t look right) that you would expect to notice on a good day, but could easily miss if you are acting in haste. But the signs are all there, even if you aren’t technical yourself, that this email simply doesn’t add up, and is fake.”

New-school security awareness training can enable your employees to recognize red flags associated with social engineering attacks.

READ MORE

Enabling and Securing Remote Workers are Top Concerns as 80% of Organizations Experience Cyberattacks as Often as Once per Hour

Organizations appear to be overconfident in their ability to protect themselves, despite glaring gaps in security, according to new data from cyber protection vendor, Acronis.

New data from Acronis’ Cyber Readiness Report 2021 tells the tale of some very unprepared – and yet still confident – IT organizations. Overall, organizational cybersecurity isn’t a top concern for organizations despite enabling remote workers (57% of organizations) and securing them (50%) are. In addition, 53% of organizations believe they are safe from supply chain attacks because “We only use known, trusted software” – c’mon; even Microsoft has been a victim of the Hafnium attack back in February.

Despite this overconfidence, the report shows how very unprepared the average organization really is:

  • 36% of remote workers have issues using corporate security measures
  • 25% of organizations aren’t using multi-factor authentication at all
  • 71% of organizations are targeted by phishing attacks each month
  • 80% have been the target of cyberattacks in the last year
  • 30% of organizations were attacked at least once a day
  • Only 20% say they haven’t been a target

Of those organizations experiencing attacks, the number one attack type (experienced by 58% of organizations) was phishing attacks. And, given that organizations (according to the report data) were focused on solutions like anti-malware (73%), backup/DR (48%), vulnerability management (45%), and URL filtering (20%), it’s evident that many of these organizations aren’t placing enough emphasis on educating users to stop the attacks that get past these solutions.

It’s only through continual Security Awareness Training that an organization can address the weakest link in their security stance; users. From the report data, it’s evident that attacks are present, phishing remains a favorite attack vector, and remote users aren’t as secure as they need to be. Putting Security Awareness Training in place will assist in strengthening your stance with remote users, regardless of the amount of security tech in place.

READ MORE