InvestorsHub Logo
Followers 5
Posts 2784
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Thursday, 04/30/2020 6:33:16 PM

Thursday, April 30, 2020 6:33:16 PM

Post# of 249148
Spear-phishing campaign compromises executives at 150+ companies

https://www.zdnet.com/article/spear-phishing-campaign-compromises-executives-at-150-companies/?ftag=COS-05-10aaa0g&taid=5eab205606bb9b00014032bb&utm_campaign=trueAnthem%3A+Trending+Content&utm_medium=trueAnthem&utm_source=twitter

PerSwaysion group appears to be formed of members based in Nigeria and South Africa.

A cybercrime group operating since mid-2019 has breached the email accounts of high-ranking executives at more than 150 companies, cyber-security firm Group-IB reported today.

The group, codenamed PerSwaysion, appears to have targeted the financial sector primarily, which accounted for more than half of its victims; although, victims have been recorded at companies active across other verticals as well.

PerSwaysion operations were not sophisticated, but have been extremely successful, nonetheless. Group-IB says the hackers didn't use vulnerabilities or malware in their attacks but instead relied on a classic spear-phishing technique.

They sent boobytrapped emails to executives at targeted companies in the hope of tricking high-ranking executives into entering Office 365 credentials on fake login pages.

Group-IB said PerSwaysion's entire scheme could be narrowed down to a simple three-step process:
1.Victims receive an email containing a clean PDF file as an email attachment. If victims open the file, they'd be asked to click a link to view the actual content.
2.The link would redirect users to a Microsoft Sway (newsletter service) page, where a similar file would ask the victim to click on another link.
3.This last link redirects the executive to a page mimicking the Microsoft Outlook login page, where hackers would collect the victim's credentials

PerSwaysion operators acted fast from the moment of a successful phish and usually accessed hacked email accounts within a day.

"After the credentials are sent to their [command and control servers], the PerSwaysion operators log into the compromised email accounts. They dump email data via API and establish the owner's high-level business connections," Group-IB said.

"Finally, they generate new phishing PDF files with current victim's full name, email address, company legal name. These PDF files are sent to a selection of new people who tend to be outside of the victim's organization and hold significant positions."

Group-IB said that once PerSwaysion operators sent out a new spear-phishing campaign from a compromised account, they also typically deleted impersonating emails from the outbox folder to avoid detection.

For the time being, Group-IB has been unable to determine what hackers have been doing after gaining access to these email accounts.

Hackers could be selling access to other cybercrime groups; they could be sitting, wating, and stealing intellectual property; or they could be preparing to launch a wire payment hijack (BEC scam) at a later date.

Group-IB said that based on current evidence, the PerSwaysion group appears to be formed of members based in Nigeria and South Africa, are using a phishing toolkit developed by a Vietnamese programmer, and the group's leader appears to be a suspect going by the name of "Sam."

The cyber-security firm launched today a website where executives can check if their email addresses have been acquired and targeted by the group in the past.
==================================================================
If only high ranking executives knew about Wave VSC 2.0 and Wave solutions (and bought Wave solutions), their organizations would be much better protected and could avoid situations like those with the 150+ companies in this article!!!
=================================================================
https://www.wavesys.com/

https://www.wavesys.com/products/wave-virtual-smart-card

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Excerpts:

Key Features:

Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies





















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.