Sunteți pe pagina 1din 6

iM Secure, iM Aware News

Spam, Scams & Hacking You


on Social Media

Security Awareness is an essential part of achieving


WorleyParsons goal of achieving zero harm to our people,
assets and the environment. Please remember to always
practice Security Awareness within the boundaries of the
WorleyParsons Code of Conduct, OneWay Framework
and Documented iM Policies and Procedures.

To report a Security Incident:


http://support.worleyparsons.com

Just One Click


While the interconnection of
technology has made it simple for
us to keep in touch with family and
friends, and promote our personal
and professional brands, it has also
made it simple for criminal hackers
to infiltrate our lives. Think about
all of the information you store
and share with each network you
join.
Due to the control (or lack
thereof) offered to us over our
security settings, criminals know
they have a revolving door to access
our sensitive data. The bigger the
network, the bigger the target and
ultimately the bigger the payoff.
Facebook, the worlds current
largest social network (with over
1.59 billion global users), has been,
and continues to be, the source of
scams and phishing attacks. A post
as simple as share to win! leads to
hundreds of thousands of people
being duped, all because they
didnt bother to check the validity
of the post or the person posting it.
While a sharing scam is
mostly harmless (similar to an
old-fashioned chain email), it
reveals the gullible nature of many
users, which can lead to malware
infection or identity theft. We must
always verify the source and think
before we click.
One of the most common
attacks across all social media
networks comes via imposters. A
scammer creates a profile of YOU,
or of someone you know, and
sends friend requests, with the

From the
Trenches
A real story from one of our colleagues

goal of gaining access to private


information. Impersonators not
only have access to all of your
friends and familys accounts,
they may use that access to send
requests for money or create more
fraudulent accounts. They can also
post links to fake content that,
when clicked, takes your followers
to malware-ridden websites, or
installs a Trojan, giving the criminal
access to your entire computer. (If
you think this has happened to
you, report it to the social network
in question ASAP!)
This is especially true of Chinabased QQ, an instant messaging
service with the third most users
of all social media networks. A
criminal hacker gets access to the
users account via malware and
uses it to send money requests
to all of that users contacts. Even
worse, QQ is a target for scamming
rings that use Trojan viruses to
gain access to an account. These
hacked accounts are then sold on
the black market to other criminals
who use the account to gain access
to sensitive information via the
users chat records and emails. All
it takes is one click for your data to
be compromised.

My grandma joined Facebook a


few years ago like many older folks.
But, like many non-tech-savvy
folks, she didnt know how to use
it and didnt post much content
(rarely changes her profile picture).
One day, I got a friend request from
her. I thought it odd and was pretty
sure we were already friends,
but figured she had accidentally
unfriended me somehow. So
I accepted the friend request
without bothering to look at the
profile (after all, it had her exact
name and current profile picture).
A few days later, I got a message
from my mom saying that it was
an imposter account and had been
reported as such to Facebook. I
felt like an idiot! By allowing this
imposter into my circle, he or she
had unbridled access to all of my
friends and family, including phone
numbers (which should never be
put on a social network), emails
and photos.

#dislike
WANT TO KNOW MORE
ABOUT FACEBOOK SCAMS?
Check out this article: facecrooks.
com/Scam-Watch/Top-TenFacebook-Scams-to-Avoid.html

SCAMS
According to Wikipedia, LinkedIn is a businessoriented social networking service mainly used for
professional networking. Unfortunately, the model by
which users are connectedaccepting requests from
total strangersperpetually breeds spam.
Bogus recruiting accounts attempt to build a network
map by sending requests to business professionals,
which in turn makes the bogus account look legit.
Victims are conned into giving up personal details,
such as email addresses, which the criminals use to
launch phishing campaigns and steer the users to
websites built around malware.
We need to be cautious when accepting invitations
from strangers. And especially cautious when clicking
the LinkedIn invite button in your email. When you
get a notification that Claire, the alleged Director
of Operations for Walmart, wants to add you to
her network, dont just automatically click accept.
Investigate Claire. Why would an executive of a major
corporation want to add YOU to her network? How
many connections does she have? The lower the
number, the more likely the account is fake. Do a
reverse image search. Who is Claire? If the account
is fake, the profile image will be used for multiple
accounts. A simple Google search of the persons name
is always a good starting point before adding someone
you dont know to your network.
And always, always, always add users via the
website. Never click the request directly from your
email. Sending bogus LinkedIn requests is standard
operating procedure for phishing emails.

ransomware case file


The Cause: Ransomware is a form of malware that
encrypts your data and restricts your access to the data
until you pay the requested bounty.
The Case: Hollywood Presbyterian Medical Center
was taken offline when criminal hackers infiltrated the
network and shut down basic operations, such as CT
scans, lab work and pertinent documentation, by using
ransomware. The facility was down for more than a week
and had to divert several patients to other hospitals.

Its a Spammers World...


and were just living in it.

The biggest security hole in social media is its


connection to your personal email. Just like with
the LinkedIn example, where bogus accounts are
sending out network requests, every social media
app sends email notifications of posts, likes, friend
requests, etc. If were not careful, those email
notifications could lead to phishing and malware.
For that reason, its important to verify the validity
of the link by doing a mouseover, hovering the
cursor over the link before actually clicking on
it. Otherwise, login to your social media account
instead. Its all too easy for a criminal hacker to
send spam email posing as a link from a popular
social network.

Macros still pose a threat!


If you receive an Office document,
and are notified that it contains a
macro, be sure to verify the sender
before enabling it. Know and follow
company policy concerning macros
and if you want more info, visit
http://bit.ly/1MyH9b0 and check
your specific software version for
assistance.

The Cost: In the end, HPMC determined the best way


to restore operations was to pay the ransom and obtain
the decryption key. The bounty was approximately
$17,000 in the form of Bitcoins.
What to do if this happens to you: At work, take no
further actions, and immediately notify your incident
response team, or appropriate management.

Text Message Scams


The rise of unsolicited text
messages is bringing on
another form of scamming
that puts your personally
identifiable information (PII)
at risk. Usually, its a bogus
message, such as your bank
claiming your account is
locked and you need to call
a certain number and give
certain credentials. Or its a
link to claim a prize youve
supposedly wonclicking
the link installs malware
on your phone that gives
criminal hackers access to
your PII. To avoid being
scammed, simply think
before you click, and check
out the Federal Trade
Commissions list of how
to protect your personal
information.

Keeping Kids Safe


on Social Media + 10 Tips for Parents
Smart, secure networking starts

at home and it starts early. At some

point, our children will reach the


age where theyre old enough to

develop an online presence. Its


up to us as parents to educate

them about the dangers associated

with these networks, and how


important it is to protect that

1.

Dont assume your child


knows more than you about
navigating technology.

2.

Make sure your kids know what


is and is not appropriate to
post.

3.

Dont post personal financial


information such as credit
and debit card numbers, bank
statements and pay checks
on social media.

4.

Dont post other personal, nonfinancial information on social


media, such as a new drivers
license.

5.

Dont post information about


the place you work.

6.

Dont post your social plans


and vacation details.

7.

Dont let your kids check-in


everywhere they go.

8.

Know with whom your kids are


connecting.

9.

Monitor your kids credit


reports.

online presence.

In order to do that, we need to


educate ourselves on every social

media network our children are


joining. That means joining the

network and boning up on how

information is shared, so that we


can teach them how to protect their

email spoofers

are getting smarter

accounts in addition to teaching


them why what they share matters.

We dont necessarily want to

Even the most security aware


folks can get spoofed when
scammers are good at what they
do. The email was surprisingly
well written without the spelling
and grammar errors I have come
to expect from fake emails. That
says it all; scammers are getting
better at getting clicks. Which
means we need to get better at
vetting. Think before you click,
and when in doubt delete! Read
the whole story by visting the link
below.

scare our children, but making

blog.thesecurityawarenesscompany.
com/scam-alert-help-i-had-aneaster-disaster-in-the-philippines/

blog.thesecurityawarenesscompany.
com/conversation-starters-for-kidsreceiving-tech-gifts/

them aware of the dangers ahead


is part of our jobs as parents.
For that reason, showing them

examples of how their shared


information can be used against
them, and introducing them to

concepts like cyber bullying and

stalking, can be a fantastic way to

educate them. If they are aware of


the consequences, they will make
smarter choices.

No idea where to begin? Try


these conversation starters:

10.

Be actively involved in your


childs online life.

PHISHING IN ACTION
An information security professional shared this example of a real phishing
email that came through her inbox. It made her pause because it looked so
legitimate. Read through her notes about the thought process she used to
figure out if it was real or not.
Inconsistencies in the links! Service@paypal.com was just the
display name. Service@pp.com was the actual email URL.

They used my actual name, not something generic like


customer so I had to really think about this.

Link inconsistencies!
When I hovered over Click here to login, this
very long URL appeared. Clearly, this is not a real
PayPal address. (And it had my email address
in the url, so it probably contained a script to
capture the associated login information!)

The day before receiving this message, I had


just set up a new bank account on my PayPal
account and sent money to a friend, so its not
unreasonable to believe that some recent account
activity may have triggered their security alarms.

While this email looks really good no obvious


spelling or grammar issues, it includes the PayPal
logo, it used my actual name theres still some
odd formatting that I know the PayPal design
team would never let go out to a customer.

I opened a browser and logged in the way I usually do WITHOUT clicking on any of the links in the email and upon entering
my account, lo and behold, there were NO account notifications, nothing indicating that my account was limited. That confirmed
my suspicions that this was a phishing email. As you can see, they can be very convincing!

HEADLINE NEWS
Massive Government Data Breach
Exposes Every Filipino Voters PII

Y!

Yahoo Security @YahooSecurity Mar18


Yahoo kills password authentication with
their new account key http://bit.ly/265SiGA

GSO

Get Safe Online @GetSafeOnline Mar 21


Incidents of online ticket fraud rose by 55%,
costs UK public 5.2m http://bit.ly/1XHesZy

Microsoft MMPC @msftmmpc Mar 22


Microsoft releases new Office feature to
combat macro malware http://bit.ly/1SjUkLK

The personally identifiable information (PII) of 55 million

Filipino voters could have been exposed in a March 27th

data breach of the Philippine Commission on Elections


(COMELEC). This could be the worst government data breach

anywhere, ever. Supposedly, its purpose was to convince the

commission to implement stronger voting security for their


upcoming elections.

COMELEC seems to be brushing off the incident, but

according to Trend Micro, the amount of PII that was exposed


is alarming: 15.8 million fingerprint records, 1.3 million

overseas Filipino voter passport numbers, a list of officials


that have admin accounts, and more.

Trend Micro warns Filipinos that they could now be targeted

by criminals. For more information on the breach, visit their


blog: http://bit.ly/1VCIBup.

Many of Worlds Most Powerful People


Exposed by Panama Papers Leak

E
IBT

The Panama Papers leak has been dubbed the biggest

ESET @ESET Mar 23


Self-protecting USB steals data via
undetectable trojan http://bit.ly/1Ry3tgF

Intl. Business Times @IBTimes Mar 23


Hackers breached water treatment plant &
successfully changed levels of chemicals in
water http://bit.ly/1SfJp5Y

ever of its kind, overshadowing the Wikileaks and Edward


Snowden scandals with 2.6 terabytes of incriminating data
made public. Law firm Mossak Fonesca was exposed as

helping several power players worldwide protect and hide

their millions, and a cascade of resignations has followed. To

Cloudmark @Cloudmark Mar 31


55+ companies have fallen victim to W-2
spear phishing attacks http://bit.ly/22AlalS

read the details of this unfolding story and to stay up-to-date,


visit the ICIJ: https://panamapapers.icij.org/.

From a security standpoint, this leak more than likely arose

from an insider threat (though still unconfirmed). This is a

WP

common cause of breaches and, in this case, very difficult to

Washington Post @washingtonpost Apr 12


FBI paid hackers to crack into iPhone; will
they tell Apple how? http://wapo.st/1VkMpl7

confirm. Its unclear where to draw the line between legitimate

whistleblowing and criminal theft of information. And who

should be prosecuted: the law firm for failing to protect its


clienteles confidential data, the whistleblower who has access

to that data, or the heads of state who were engaging in illegal


and seedy business? Only time will tell!

IBM

IBM @IBM Apr 14


Hybrid malware GozNym used in attacks
against 24 US & Canadian banks to steal
millions http://ibm.co/1qU7JSg

S-ar putea să vă placă și