Tuesday morning was an exciting one for the security team. Over 900 inboxes received the following email.
I am delighted to report that a huge number of you were superheros and forwarded the email to firstname.lastname@example.org. Thanks to you we were able to block the target page and limit any damage. Even though so many of you spotted the email as a phish right away, with the high number of recipients Marketing and Communications made the unusual decision to issue a campus wide alert.
While we were investigating the incident, we discovered that the attacker spent a lot of time viewing our Payroll webpage. There is an excellent chance that the attacker will use this information in the near future to create another phishing email.
We are asking everyone across campus to keep an eye out for payroll or HR related phishing emails in the next little while. If you receive an email that appears to come from HR or Payroll, please check the email address for accuracy. If it is correct, please call the sender to confirm that they actually sent the email.
Should you find the email to be malicious, do what your colleagues did this morning and forward the email to email@example.com. You too can be a superhero!
For a while now, I have been warning about clicking on links in emails from organizations that you know. Instead, I have encouraged all of you to visit the organizations website directly using a bookmark. A report of a new phishing campaign targeting Stripe users shows why this advice is so important to take.
This campaign involves an email that tells the intended victim that there is something wrong with their account details. They are asked to login to their Stripe account to update them and given a handy button that appears to take them to the Strip login page. The page is of course a spoof and although it looks exactly like the real one, all credentials entered are collected by the thieves.
The fraudulent page is set up so that once you have entered your credentials in the fake login page, they use them to log you into your actual account. From your point of view, nothing is amiss. They now have your login credentials, you are non the wiser and they have hours if not days to withdraw funds before you even notice.
Although this campaign is targeting Stripe users at the moment, the same tactic is used to target all sorts of users. This is a gentle reminder to not click on links in emails from organizations that you know, but to use a bookmark instead. If you don’t have the site bookmarked you can use a search results, however proceed with caution as more and more fraudulent sites are appearing there.
Those clever cybercriminals have come up with another tactic to get you to click on something you shouldn’t. Introducing the “I found an ID pass”, phishing email.
What makes this email so diabolical, is it has no sense of urgency. In fact it asks nothing of you at all. It simply lets you know that a pass was found and it is being mailed. It’s calm, indifferent manner lull’s you into thinking the email is harmless. It counts on the reader being so curious that they throw caution to the wind and click on the link to see whose ID was found. Quite ingenious really.
If you receive an email of this sort, delete it and wait for the mail to arrive.
One sure fire way to avoid becoming a victim of a cyberattack is to call the email sender to verify that they in fact sent the email. That is a message that I preach over and over again all over campus. I am happy to report that my message is being heard and acted upon…sort of.
Here is the email that one of our staff received in their inbox.
The staff member knows the sender and aside from the poor grammar, the email is spot on. The attachment was indeed a Sharepoint document, so she opened it. However when she found nothing but a greeting link to another document she paused. She knew that email addresses could be spoofed and realized she should confirm the legitimacy of the email. So she sent this email.
She correctly did not reply to the original email. But created a new one and sent it using an email address in her contact list. This is the reply that she received.
Before she could check the invoice, she received this email.
The sender’s email account had been hacked! It didn’t occur to our staff member that if someone else was using her colleague’s email address, it wouldn’t be her colleague who responded . She gets an A for verifying the legitimacy of the email. But she gets a F for talking to the hacker.
The lesson has been learned. When confirming email legitimacy, use the darn phone. A 30 second phone call can save you from a world of hurt.
The tools that cybersecurity professionals use are getting more and more sophisticated. They can now identify a known malicious link or attachment and strip it from the email so it never arrives in your inbox. To get around that limitation, hackers are hiding their malicious links and attachments in legitimate documents. This latest attack is a perfect example of that tactic.
This one is scary in it’s precision. It was sent to only two email addresses. Both recipients have higher level network and financial access. The email looks like this
It looks innocent enough. In fact, if you check the link it goes to a Microsoft site. Clicking the link takes you here.
This is a legitimate OneNote notebook. The icons however are just pictures, not clickable links and the links below them are flagged as malicious. Had the user clicked on the link, their login credentials would have been quietly harvested.
In this type of attack, the hacker often shares or pretends to share a document with you. The email usually asks for your input and is purposely vague and low key. Should you open one of these documents and find only links to another document, close the document and contact the IT Service desk. Your quick action could save your data.
When a Manitoba man tried to etransfer his contractor, the money ended up in a criminals account instead. When he discovered the fraud, he thought he was protected. However, he was shocked when his bank informed him that he was to blame and he wouldn’t be compensated for the loss. The reason? The answer to the security question he chose could be found on Facebook. As far as the bank was concerned, he had not taken adequate steps to secure the etransfer and therefore they were not liable for the loss.
How did his etransfer get intercepted and deposited into a criminal’s account instead of his contractor’s? The contractor’s email had been compromised without his knowledge. Once the fraudsters had access to his email, they simply waited until an email with an etransfer link showed up in the inbox and clicked on it. The story would have ended there if the answer to the security question had been more challenging. Unfortunately, the man chose to use the name of the contractor’s wife. A quick check on Facebook gave the answer to the criminals who swiftly moved the money into their account.
After months of battling with the bank and with the help of the RCMP, the man eventually recovered his money. However he was one of the lucky ones. Most victims never see their money again.
How do you prevent this from happening to you? First, when sending an etransfer choose to send it by phone instead of email. Unencrypted text messages can be intercepted but it requires a lot more effort than stealing someone’s email . Second, make sure the answer to your security question isn’t easy to guess or find. Our man from Manitoba would have avoided months of aggravation if he had told the contractor that the answer to the security question was Saskatchewan and not the actual name of his wife. Lastly make sure you use a security question. Removing that step makes life easier for people, but it leaves them exposed to possible fraud.
A couple of extremely well done phishing emails that appears to come from Chase Bank and Amazon have appeared in Mount Royal inboxes. Interestingly enough, both come from the same email. Here is what they look like:
Criminals are getting better and better at creating emails that trick us into clicking. Remember, if you receive an email from an organization that you know, visit their website using a bookmark or search result and login to your account. You should be able to read any notifications from there. If not, you will be able to find official contact information so you can inquire about the legitimacy of the email that you received. If you find one of these nasty things in your inbox, delete it.
This week the campus community is finding a particularly clever phishing email in their spam folders. It looks like this:
This is the third time our illustrious leader has been impersonated. Although this email is mostly landing in spam folders, I thought I should bring it to your attention in case it sneaks into an inbox or two.
Your on-the-ball colleague caught this one because they checked the sender’s email address. This is a gentle reminder to follow their lead. With all emails that ask you to take some sort of action, whether it is opening an attachment, clicking on a link or providing information, always check the sending email address BEFORE you read the email. If the email address is wrong, it is less likely your emotions will be triggered and rational thought will be by passed.
If this darling arrives in your spam folder or inbox, it can safely be deleted.
Classes have begun and the hackers are betting that employees across campus will be ordering supplies. They have begun sending out fake order confirmations from Staples. These emails are extremely well done. Take a look.
I especially like the note at the bottom that specifically asks you to reply to the email. Just in case you are suspicious, they have given you some lovely directions that will put you in touch with them. Very clever.
The only real tell, unless you are super familiar with the email that Staples uses for order confirmations, is the View here button URL that takes you to chainetwork.club. Definitely not Staples.
As with all other emails that come from organizations that you are familiar with, visit their website directly to check orders, confirmations and payments. Do not use links in emails even if they look as legitimate as this one.
FireEye has identified a new phishing campaign targeting oil, gas and energy companies as well as utilities and government organizations. The rather clever criminal contacts victims through LinkedIn claiming to be a researcher at the University of Cambridge. Once contact is made, the victim is offered a job and asked to provide a resume. As part of the application process, they are also asked to go to cam-research-ac.com to download and fill out a document. Of course once they do, malware is loaded onto their computer.
What makes this campaign so concerning is the assumed legitimacy that comes with using LinkedIn to communicate with potential victims. People tend to trust the platform and therefore trust those that use it to communicate. Unfortunately, this trust is misplaced.
When you are contacted by someone you don’t know on any social media platform, treat that communication with the same skepticism as you do with any email message. Just because they say they are from a trusted organization, does not mean they are. Before you engage in conversation, call their organization and confirm that they are in fact employed there. A little homework can save a lot of headache.