InvestorsHub Logo
Followers 5
Posts 2766
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Monday, 02/04/2019 4:17:47 PM

Monday, February 04, 2019 4:17:47 PM

Post# of 249117
This password-stealing phishing attack comes disguised as a fake meeting request from the boss

https://www.zdnet.com/article/this-password-stealing-phishing-attack-comes-disguised-as-a-fake-meeting-request-from-the-boss/

Called to a meeting with the CEO? Don't be so sure.

A widespread phishing campaign is targeting executives across a number of industries with messages asking to reschedule a board meeting in an effort to steal logins and passwords.

Spotted by researchers at security firm GreatHorn, the phishing messages spoof the name and email address of the CEO of the company being targeted and uses a subject line including the company name and a note about the meeting to gain the attention of potential victims. Users are more likely to fall for attacks they believe to come from their boss.

The contents of the phishing email is simple: it says a board meeting has been rescheduled and asks users to take part in a poll to choose a new date.

If users click the link, they're taken to a webpage which appears to be a login page for Microsoft Outlook and Office 365, but this is in fact a phishing site — any information entered into it will go directly into the hands of the attackers.

The attack is slightly different if the email is viewed on a mobile device — the display name is changed to 'Note to Self' but the contents of the message stays the same.

With the phishing email targeting high-level executives like CFOs, CTOs and SVPs, a successful attack could provide attackers with access to highly sensitive data across the corporate network — and the compromised accounts could also be used to help conduct further malicious campaigns.

The fake meeting phishing attack appears to be prolific — researchers at GreatHorn say it was found targeting one in seven of the firm's customers. In each case, the attackers were eliminated before damage could be done.

It's believed that the campaign is still active and that the phishing URL claiming to be windows related — is still up.

Users are therefore warned to be aware of the campaign and to be suspicious of any emails containing a subject line following a pattern of: New message: [Company Name] February in-person Board Mtg scheduling (2/24/19 update)
=================================================================
The article presents a great reason to put into action Steven Sprague's known devices tweet on Twitter!- 'Time to upgrade Cyber policy "Only known devices connected to sensitive networks and data"'



Wave VSC 2.0 and Wave ERAS could accomplish SKS's tweet for critical industries very effectively, and prevent problems that are evident in this article! Additionally, Wave SED management could give critical industries much better cybersecurity. Wave is uniquely qualified to bring these solutions to organizations to make for a brighter cyber future.
=================================================================
https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/virtual-smart-card-2.0-from-wave

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
================================================================
https://www.wavesys.com/products/wave-endpoint-monitor





















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.