<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fraud Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/fraud/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/fraud/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 27 May 2021 14:43:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Fraud Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/fraud/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 080 Romance Scams</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-080-romance-scams/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 May 2021 01:15:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dating Apps]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Romance]]></category>
		<category><![CDATA[Romance Fraud]]></category>
		<category><![CDATA[Romance Scams]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2531</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 80. This week we&#8217;re going to talk about Romance Scams. How do Romance Scams start? Romance scams usually will start on online dating platforms or it could be social media or other kind of messaging sites, where a stranger will connect with their victim. They&#8217;ll establish a kind of a relationship&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-080-romance-scams/">#WeekendWisdom 080 Romance Scams</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 80. This week we&#8217;re going to talk about Romance Scams.<span id="more-2531"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2531-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4</a></video></div>
<h3>How do Romance Scams start?</h3>
<p>Romance scams usually will start on online dating platforms or it could be social media or other kind of messaging sites, where a stranger will connect with their victim. They&#8217;ll establish a kind of a relationship with that person. Usually fairly quickly they will try to move off those online platforms and move over to communicating solely through email.</p>
<h3>What do they do then?</h3>
<p>They will spend a lot of time developing a relationship with their victim, including getting romantic and telling them they love them and such like. The reason they spend so much time at this is because they make a lot of money from it.</p>
<h3>How would you know it is a scam?</h3>
<p>The way you know it&#8217;s going to be a romance scam is they try to get you to wire them money for various reasons:</p>
<ul>
<li>They may be trying to plan a trip to come and visit you.</li>
<li>They might have got mugged and they suddenly need some money.</li>
<li>Over a period time they might have a &#8220;sick relative&#8221; that needs medical attention and they need money.</li>
</ul>
<p>But they always want you to wire them money.</p>
<h3>Bottom line:</h3>
<p>So the thing here is folks &#8230; if somebody you have <span style="color: #ff0000;"><em><span style="text-decoration: underline;"><strong>never met</strong></span></em></span> wants you to <span style="color: #ff0000;"><em><span style="text-decoration: underline;"><strong>wire</strong></span></em></span> them money, don&#8217;t do it, it is a <span style="text-decoration: underline; color: #ff0000;"><strong>scam</strong></span>. Trust me on this. It is absolutely always a scam.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-080-romance-scams/">#WeekendWisdom 080 Romance Scams</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-080-lo.mp4" length="29619774" type="video/mp4" />

			</item>
		<item>
		<title>Vulnerable Shopping Carts lead to Credit Card breaches</title>
		<link>https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 21 Sep 2018 10:49:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Magecart]]></category>
		<category><![CDATA[Plugins]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1402</guid>

					<description><![CDATA[<p>You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more. If you operate some kind of&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1403" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg" alt="Vulnerable Shopping Carts" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/09/shopping-thief-2.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />You may have heard about the <a href="https://www.rte.ie/news/2018/0627/973682-ticket-master-data/">Ticketmaster data breach</a> earlier this summer. You probably also have heard about the <a href="https://www.theguardian.com/business/2018/sep/07/british-airways-data-breach-what-to-do-if-you-have-been-affected">British Airways data breach</a> at the start of this month. A new breach at another large online marketplace using the same technique shows that vulnerable shopping carts are being exploited more and more.<span id="more-1402"></span> If you operate some kind of eCommerce site, where you have a checkout that collects credit card details for orders, then you need to check if you have been potentially compromised.</p>
<h3>What caused these vulnerable shopping carts?</h3>
<p>Basically the bad guys are sneaking in via plugins to the websites. It was very similar to how crypto-currency mining code <a href="https://www.l2cybersecurity.com/websites-compromised-generate-money/">infiltrated UK government websites</a> earlier this year. In the case of the vulnerable shopping carts of Newegg, they plugged their nasty code into the &#8220;Feedify&#8221; plugin. This plugin is used to gather feedback from customers.</p>
<p>So when a customer browsed to the Newegg site, the webserver loads up the website. It then goes and brings in the code from the plugins. The Feedify plugin that was compromised gets loaded and the malicious code starts monitoring. It&#8217;s waiting for credit card information to be typed in. Once it gets that, it sends it off to the evil doers, a hacking group called <a href="https://www.riskiq.com/blog/labs/magecart-british-airways-breach/">Magecart</a>. This code was used to compromise the &#8220;Inbenta&#8221; customer service plugin with Ticketmaster and the &#8220;Modernizr&#8221; plugin for BA.</p>
<h3>So how can I protect my website from this?</h3>
<p>Well, you&#8217;ll need your web-person to do a couple of things.</p>
<ol>
<li>Define a Content Security Policy (CSP) for your website</li>
<li>Set-up Sub Resource Integrity (SRI) verification of your website plug-ins</li>
</ol>
<p>CSP will basically state the trusted locations that your website can load plugins from, so make sure these are set for your own site and that of your payment provider.</p>
<p>SRI is where you generate a &#8220;hash&#8221; (a unique code based on the content of an item) for your plugins when you create the site. When the plugin gets loaded by the browser of a customer, the plugin gets re-hashed and if the value does not match the original hash, then it has been altered.</p>
<p>You can get more details on CSP and SRI from <a href="https://scotthelme.co.uk/hardening-payment-forms-with-csp/">Scott Helme&#8217;s blog</a>.</p>
<p>In the meantime, #LetsBeCarefulOutThere.</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/vulnerable-shopping-carts-lead-to-credit-card-breaches/">Vulnerable Shopping Carts lead to Credit Card breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Posh POS was Compromised</title>
		<link>https://www.l2cybersecurity.com/posh-pos-was-compromised/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 04 Apr 2018 10:58:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1292</guid>

					<description><![CDATA[<p>A headline worthy of The Register and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &#38; Taylor. These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this in a post on their site on the 1st April.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1293" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg" alt="POS compromised" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/POS-hacked.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />A headline worthy of <a href="https://www.theregister.co.uk/2018/04/02/hacks_fifth_avenue_crooks_slurp_card_numbers_from_luxury_chain/">The Register</a> and I&#8217;m surprised they didn&#8217;t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &amp; Taylor. <span id="more-1292"></span>These are all shops under the Hudson&#8217;s Bay Company (HBC) group and they confirmed this <a href="http://investor.hbc.com/releasedetail.cfm?ReleaseID=1062423">in a post on their site</a> on the 1st April. But it was no April Fool joke.</p>
<p>Basically the evil doers implanted malicious software on the Point of Sale (POS) terminals in the upmarket stores in the USA. For nearly a year (between May 2017 to March 2018) this malware was capturing customers credit/debit card details and passing this back to the bad guys. The crooks claimed to have gathered up to 5 million cards as a result of this hack and they have been selling off batches of them on the internet.</p>
<p>We are quite familiar with Chip &amp; PIN usage in Ireland as we have had it for quite some time. This does offer a great deal of protection as your card information is stored in an encrypted form on the chip. However in the US, they are only at the early stages of rolling out Chip &amp; PIN, so most people are still swiping their cards at the terminals. The magnetic stripes that are swiped do not have the data encrypted, and so the information can be accessed and passed on quite easily.</p>
<p>It&#8217;s not been revealed how the malicious software got onto their POS terminals, but it seems that the POS was compromised at all of their bricks and mortar stores in the US. Their online store was not affected.</p>
<p>Credit Card issuers are usually fairly good at detecting fraud by knowing their customers usual buying habits. So if somebody who usually spends €20-€50 on shopping items, suddenly attempts to buy high-end phones, tablets or televisions this should trigger an alert. However for the customers of Saks or Lord &amp; Taylor, such behaviour is much less likely to trigger an alert. So the crooks might be able to make away with a lot of goodies as a result.</p>
<p>The parent group, HBC, needs to put in place better segmentation and monitoring on their network, so if one store gets compromised, the malicious software cannot find it&#8217;s way easily to another store. They should also apply Commandments 1 (<a href="https://www.l2cybersecurity.com/use-automatic-updates/">automatic updates</a>), 2 (<a href="https://www.l2cybersecurity.com/use-anti-virus/">anti-virus</a>), 3 (<a href="https://www.l2cybersecurity.com/have-a-firewall-in-place/">firewall</a>) and 9 (<a href="https://www.l2cybersecurity.com/ix-never-insert-a-strange-usb-memory-stick/">control use of USB sticks</a>) to their POS network.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/posh-pos-was-compromised/">Posh POS was Compromised</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sneaky Tax Refund e-mails</title>
		<link>https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 09:55:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1139</guid>

					<description><![CDATA[<p>Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before. It is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1141" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg" alt="Tax refund scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.<span id="more-1139"></span></p>
<p>It is tax season in the US at the moment and there are a lot of scams going on, which the <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">IRS do warn people about</a>. This one caught my attention because it was a simple attempt to steal e-mail account credentials. Apparently there have been some changes made to the US tax code, which people are aware of but may not fully understand them, which may be enough to cause somebody to fall for this scam.</p>
<p>What happens is the victim receives an e-mail with the subject of &#8220;Federal Tax Refund Information&#8221;.</p>
<p>This e-mail then says &#8220;Good afternoon, I have a very important information for you concerning the Federal Tax Refund which I know that it will help you. Kindly check the attached file to view the details.&#8221; For those of you unfamiliar with <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, you might be tempted to open the attachment.</p>
<p>The PDF that is attached, when opened, simply contains what looks like a link to a Google Drive document.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1142 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png" alt="Tax refund scam google drive link" width="639" height="564" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png 639w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40-300x265.png 300w" sizes="auto, (max-width: 639px) 100vw, 639px" /></p>
<p>Which of course you want to look at because, money! There is also a sense of urgency introduced by saying the tax refund document is only stored for 14 days. While this is a fairly lengthy period by phishing standards, it still sows a sense of haste.</p>
<p>Clicking on the link, brings you to a website that looks an awful lot like a Google Docs sign-in page which, if you are not paying attention, might cause you to give away your Gmail account name and password. I refer, of course, to not paying attention in regards to the address of the sign-in page, which is circled in <span style="color: #ff0000;">red</span>:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1143 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png" alt="Tax refund scam google drive sign-in" width="616" height="536" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png 616w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54-300x261.png 300w" sizes="auto, (max-width: 616px) 100vw, 616px" /></p>
<p>That is not &#8220;https://accounts.google.com&#8221; which would be what you are would normally expect. Of course if a genuine account and password is provided, then the evil doers will now take full control over the e-mail account and use it for nefarious purposes, UNLESS of course you had followed <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">Commandment 7</a> and used two-factor authentication. If you had, you could then laugh at the bad guys attempting to login as you and failing because of this brilliant protection mechanism.</p>
<p>Then you calmly go ahead and change that password in ALL accounts that you used it in, because it&#8217;s now compromised.</p>
<p>While this has been relating to the US tax season, expect similar carry-on during October in Ireland.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Dodgy e-mail that looks legit.</title>
		<link>https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 10:45:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=984</guid>

					<description><![CDATA[<p>I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like last weeks story, this message looked kinda plausible.It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-985" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg" alt="Dodgy e-mail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/crash1_20110628102439_640_480.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />I received a dodgy e-mail on my personal account yesterday. I&#8217;m surprised the GMail spam filters didn&#8217;t catch it and flag it for me. Like <a href="https://www.l2cybersecurity.com/double-check-security/">last weeks story</a>, this message looked kinda plausible.<span id="more-984"></span>It was a typical UPS delivery notification scam, which the evil doers spew out tens of thousands of and expect at least one person to be waiting on a delivery to fall for it.</p>
<p>Here is the offending dodgy e-mail:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-986" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg" alt="" width="516" height="352" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1.jpg 516w, https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-1-300x205.jpg 300w" sizes="auto, (max-width: 516px) 100vw, 516px" /></p>
<p>To me, there are a number of obvious indicators that this is a dodgy e-mail:</p>
<ol>
<li>The sending address (the bit after &#8220;UPS View&#8221;) was not a UPS address.</li>
<li>The two links in the e-mail did not go to a UPS website.</li>
<li>Most obviously &#8230; I wasn&#8217;t expecting a delivery!</li>
</ol>
<p>So lets take them one at a time:</p>
<ul>
<li>Some e-mail clients don&#8217;t actually show you the whole e-mail address of the sender. They just show the <em><strong>Display Name</strong></em>, which in this case is &#8220;UPS View&#8221;. So if you were using such a client, then it would appear to be a legitimate UPS e-mail address. However in my case, there was this @aol.com e-mail address, which is not associated with UPS.</li>
<li>When you see a link in an e-mail or website, you can hover the mouse over it. Somewhere towards the bottom of your browser window, you should be able to see where the link is going to take you. In this e-mail&#8217;s case it was going here, which is not a UPS site:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-991" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/11/UPS-Spam-2.jpg" alt="" width="252" height="19" /></p>
<ul>
<li>In my case I wasn&#8217;t expecting any delivery. But what if I was? What if I was an under pressure procurement clerk in a large organisation? I&#8217;d be getting deliveries on a regular basis. I&#8217;d be very inclined to click on those links.</li>
</ul>
<p><span style="text-decoration: underline; color: #ff0000;"><strong>Please note</strong></span> I carried out the following action on a sacrificial machine, so please do not be tempted to ever click on links to see what happens next. It could end very badly for you.</p>
<p>So what would have happened if I did click on the link? A word document, with a name that started &#8220;Tracking-3154631&#8230;&#8221; was downloaded. This document, if opened, would persuade me to click on &#8220;Enable Editing&#8221; and then click on &#8220;Enable Content&#8221;. Once I had taken those actions, macros (a set of instructions for a computer) in the word document would have downloaded a really nasty piece of software. Then all of my files would have been scrambled and I would be presented with a ransom demand to get my data back.</p>
<p>If I was that under pressure procurement clerk, it would not have stopped at just the files on my computer, but any files that I could access on the company&#8217;s network. That could be very, very disruptive to the organisation.</p>
<p>Out of curiosity, I checked the website (the bit before the &#8220;/UPS/16-Nov&#8230;.&#8221;) that hosted that document. It appears to be a legitimate business website. However, they&#8217;ve probably been hacked by the bad guys, who are now using their site to host their malicious downloads.</p>
<p>UPS offer advice on <a href="https://www.ups.com/us/en/about/news/fraud-alert.page">fraudulent e-mails</a>.</p>
<p>As usual, we&#8217;ve even got a <a href="https://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">commandment</a> that covers dodgy e-mails too. So have a read to see what you can do to protect yourself.</p>
<p>The post <a href="https://www.l2cybersecurity.com/dodgy-e-mail-looks-legit/">Dodgy e-mail that looks legit.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phone scams &#8211; some current examples</title>
		<link>https://www.l2cybersecurity.com/phone-scams-current-examples/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 19 Jun 2017 15:54:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=758</guid>

					<description><![CDATA[<p>In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite. The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-759" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg" alt="Phone scams" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite.</p>
<p><span id="more-758"></span></p>
<p>The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It was a UK number +44-141-846-1617. I didn&#8217;t answer and let it go to voicemail, which a minute or so later showed that I had a message. When I finished speaking with my client I dialed 171 and listened to it.</p>
<p>There was silence for a long time and then &#8220;Hi. A free Euromillions Lottery ticket is waiting for you at the upcoming 45 million Euro jackpot draw. To redeem, press 1.&#8221;. This was repeated until the voicemail cut out. Here is a recording:</p>
<audio class="wp-audio-shortcode" id="audio-758-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3">https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3</a></audio>
<p>There was probably some sort of auto-dialler that was cycling through a set of numbers and playing the message at them. Presumably if somebody pressed 1, they would be connected to an &#8220;agent&#8221; who would kick off the <em>sales-pitch</em>, with &#8220;Oh good news, you have won a thousand Euro in a special draw, just give me all of your bank account details and PIN number and we can transfer that money for you.&#8221; and then proceed to empty your account. <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>There were some reports in <a href="http://www.independent.ie/irish-news/news/garda-warning-over-lotto-scam-offering-free-play-in-the-euromillions-draw-35725526.html">May</a> about these calls coming from an Irish number, but this week it was a UK number.</p>
<p>The second of the phone scams came yesterday and was the old SMS text message with a link to a photo (apparently), and here is said offender:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-761 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png" alt="scam text" width="300" height="190" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-768x486.png 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-1024x648.png 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39.png 1079w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>It would be so easy to click on that link, but as I am a firm believer in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, I resisted the temptation to click and instead fired up a sacrificial machine and typed the link into that instead <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="15" height="15" />.  After a moment of the web address changing in the browser (also known as a redirect) I was presented with, what appears to be, the start of a movie trailer and then this message:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-762 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png" alt="" width="504" height="276" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png 504w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax-300x164.png 300w" sizes="auto, (max-width: 504px) 100vw, 504px" /></p>
<p>So like a good sucker, I clicked on OK and was presented with:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-763 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png" alt="" width="708" height="397" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png 708w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2-300x168.png 300w" sizes="auto, (max-width: 708px) 100vw, 708px" /></p>
<p>Anybody who read last week&#8217;s <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">post</a>, will know that these kind of sign-ups, will usually mean entering a credit card number somewhere, which will then be milked dry by the evil doers. I traced the original link to a company based in the Seychelles, so at least the money would be going somewhere nice <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f92/1/28/1f911.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f37/1/28/1f47a.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>So, please don&#8217;t fall for these phone scams. There are many others, so if in doubt, just remember &#8220;If it sounds too good to be true, then it probably is.&#8221; and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> for unsolicited e-mails, texts or social media messages with links.</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3" length="107847" type="audio/mpeg" />

			</item>
		<item>
		<title>How a typo can cause you problems.</title>
		<link>https://www.l2cybersecurity.com/typo-can-cause-problems/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 13 Jun 2017 14:55:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Adobe Flash Player]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Flash Player]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Typo]]></category>
		<category><![CDATA[Typosquatting]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=747</guid>

					<description><![CDATA[<p>Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;Typosquatting&#8220;. Essentially this is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-748" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg" alt="Typo squatting" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;<a href="https://en.wikipedia.org/wiki/Typosquatting">Typosquatting</a>&#8220;.</p>
<p><span id="more-747"></span></p>
<p>Essentially this is where the bad guys have a web page at an address that is very very very close to the spelling of a popular or well known webpage and they count on you having a typo and either missing a letter (e.g. instgram.com) or hitting an adjoining letter (e.g. facebooo.com) in error.</p>
<p><span style="text-decoration: underline;"><strong>Don&#8217;t try this on your desktop/laptop/tablet/phone</strong></span>. I have a separate, sacrificial machine which I can use for such things.</p>
<p>I tried to access www.instgram.com (missing the &#8220;a&#8221; in the middle) and received the following page:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-750" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg" alt="instgram.com 1" width="572" height="201" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg 572w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1-300x105.jpg 300w" sizes="auto, (max-width: 572px) 100vw, 572px" /></p>
<p>Notice the address where it is going to (circled in yellow) &#8211; that is not an Instagram address, but some sort of ad/advertising address.</p>
<p>When I clicked to continue, I got:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-749" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg" alt="instgram 2" width="765" height="472" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2-300x185.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>I didn&#8217;t continue any further, as I googled gr8musik.com and the results indicated it was a scam site, which if you registered with it, would take money from your credit card, even though you were supposed to be in some kind of a free trial period.</p>
<p>Similarly, I tried www.facebooo.com (an &#8220;o&#8221; instead of the &#8220;k&#8221;) and got the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-751" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg" alt="facebooo 1" width="798" height="409" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg 798w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-300x154.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-768x394.jpg 768w" sizes="auto, (max-width: 798px) 100vw, 798px" /></p>
<p>This was just some kind of survey. But you never know what you will get. A subsequent attempt to go to www.instgram.com brought me to the survey, followed by the survey (again), followed by a sign-up form for mcplayz.com (identical to the above gr8musik.com). So these crooks are randomly sending you to different pages trying to compromise you in someway.</p>
<p>According to this <a href="https://isc.sans.edu/diary/Deceptive+Advertisements%3A+What+they+do+and+where+they+come+from/22494">post</a>, the victim&#8217;s typo sent him to a &#8220;Technical Support&#8221; page, where he was advised that his PC was locked and he needed to telephone for support. If he did this, the scammers at the other end of the line would have talked him through giving them remote access to the PC and then they would have totally locked him out and looked for his credit card details to &#8220;fix&#8221; the problem.</p>
<p>Some pages reached by a typo try to apparently show you a video, but then indicates there is a problem and that you need to download a specific video player to watch it. For example, the following headline is tempting you to watch the video to get your hands on software worth $7,000.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-753" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg" alt="video player not" width="765" height="462" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer-300x181.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>These will typically download what is referred to as adware, and if you read our last week&#8217;s <a href="http://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">post</a> about the Fireball adware, you can see  how insidious that adware can be. Adware will take control of your browser and fire ads at you while you are trying to use the internet. It might also re-direct your searches to odd search engines, which will likely attempt to track you and violate your personal privacy on the internet.</p>
<p>So just be careful when typing addresses. Better still use bookmarks.</p>
<p>If you do inadvertently get taken to some page that you never intended to go to, just close the browser immediately by way of the <strong>X</strong> in the top right-hand corner of the window. You might get warnings about losing data, just ignore them and close that browser. It would do no harm to run a spyware check on your PC at this point, in case any adware did manage to sneak in without your knowledge or permission. There are free tools from <a href="https://www.malwarebytes.com/">Malwarebytes</a> or <a href="https://www.safer-networking.org/">Safer Networking</a> that can do this for you, but you might want to also talk to some real life technical support (a techy friend or the IT team in your place of employment) about it and have them give your PC a once over.</p>
<p>Whatever you do, don&#8217;t continue to engage with a website that you weren&#8217;t intending to visit and stay safe.</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Evil e-mail has your name and address!</title>
		<link>https://www.l2cybersecurity.com/evil-e-mail-knows-you/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 30 Mar 2017 15:52:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=602</guid>

					<description><![CDATA[<p>Reports today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://nakedsecurity.sophos.com/2017/03/30/the-scam-that-knows-your-name-and-home-address-heres-what-to-do/">Reports</a> today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll bet if you got this e-mail, it would get your attention pretty fast.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-604 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png" alt="" width="400" height="209" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21.png 640w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-605 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png" alt="" width="401" height="243" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p><span id="more-602"></span></p>
<p>Even though it is written in the scam-iest possible language with the bad spelling and poor English, because it is addressed direct to you, you are going to sit up and take notice. So much so, that you might be very tempted to open the attachment to see what other information this person has on you. You should know me by now &#8211; Just DON&#8217;T open the attachment on an e-mail from a stranger &#8211; delete the damned thing, as set out in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>If you did open it, it will ask for the password, which is specified in the evil e-mail:</p>
<p><img loading="lazy" decoding="async" class="wp-image-606 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png" alt="evil e-mail asks for password" width="401" height="238" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password.png 637w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>And after you enter that, it will want you to disable all of the security protections in Microsoft Word, so it can attempt to do it&#8217;s nasty work on your desktop/laptop:</p>
<p><img loading="lazy" decoding="async" class="wp-image-607 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png" alt="evil e-mail asks to disable security" width="400" height="346" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected.png 636w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>If you follow through and do what it asks you to do, you wont see any further information about you, you will see an &#8220;alternative fact&#8221; &#8211; It will tell you the file is corrupted and can&#8217;t be opened:</p>
<p><img loading="lazy" decoding="async" class="wp-image-608 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png" alt="evil e-mail shows corrupted message" width="401" height="234" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>In fact this is a sign that the evil e-mail has done it&#8217;s worst and may be scrambling your files and locking you out of them. The payload can vary, depending on what the evil doers decide they want to achieve. Trust me on this, it will not be anything in your best interests.</p>
<p>So please, JUST DON&#8217;T do anything with the e-mail! Delete the damned thing and go on with your life.</p>
<p>The fact that they have your name and address, while concerning is maybe not terribly surprising. After all in 2016, there was <em><strong>at least</strong></em> <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2016-1-6-billion-records-leaked/">3.1 billion records reported</a> as being leaked in various data breaches. So it is possible that your name, address and e-mail have made it into the hands of the criminals who are now trying to exploit the data in this nasty phishing scam.</p>
<p>Delete the e-mail and move on.</p>
<p>And let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scary new way to have your GMail password and account stolen.</title>
		<link>https://www.l2cybersecurity.com/gmail-password-stolen/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 18 Jan 2017 11:43:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=467</guid>

					<description><![CDATA[<p>This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ? So what happens is you receive an e-mail from somebody you know, who also had a GMail (note the emphasis on had).  This e-mail will have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" title="GMail password" src="https://1.bp.blogspot.com/-7Vym9Gnn-zQ/WH9LZ13c8oI/AAAAAAAABFg/zZCh8CPJptAEG0tnmvSbwKCYH18Fu5n0QCLcB/s320/download.png" alt="Scary new way to have your GMail password and account stolen" width="316" height="159" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what happens is you receive an e-mail from somebody you know, who also <b><i>had</i></b> a GMail (note the emphasis on had). </span></p>
</div>
<p><span id="more-467"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This e-mail will have a subject line of a previous e-mail conversation that you have had with that person and also, what appears to be an, attachment that had been attached in an earlier e-mail in that conversation. So far this e-mail is looking <u data-blogger-escaped-style="font-weight: bold;">EXTREMELY</u> legitimate.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That attachment, is actually an image in the e-mail with a link embedded in it and if you click on it, it will take you to, what appears to be, the GMail log-in screen, as follows:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s1600/gmail-data-URI-sign-in-page.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s320/gmail-data-URI-sign-in-page.png" width="275" height="320" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Being asked to log-in like this would certainly trigger an alert in my mind that something was up. I would immediately check to see where this password page has come from, so I would look up at the address bar of the browser. This is what you would see:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" width="526" height="49" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;"> So that looks OK doesn&#8217;t it? <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> (nice and secure site) <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">accounts.google.com</span> (legitimate address) and the e-mail came from somebody I know, from an e-mail conversation I have had with them, that had an attachment, which was here again in this new e-mail. <b>All very believable! </b>So let me enter my GMail ID and password and &#8230; you&#8217;ve now given the hackers your credentials.</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Within minutes, they will have taken over your GMail account and will be sending this nasty surprise e-mail to your friends, family and colleagues.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So how do I know it&#8217;s not a legitimate GMail login screen? Let&#8217;s take another look at that address bar:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" width="528" height="52" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That first part of the address (highlighted) looks <i data-blogger-escaped-style="font-weight: bold;">a bit odd</i>, don&#8217;t you think? It is very odd. It actually has a verrrrrrrrry long string of text, which stretches off beyond the end of what you can see in the address bar that executes a script, which brings up that log-in page.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Also, if you know your secure websites, you know that where there is proper <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> there is also a green padlock symbol like this:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><a href="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s1600/Capture.PNG" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s320/Capture.PNG" width="320" height="35" border="0" /></a></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That gives a high degree of confidence that the site is legitimate and properly secure.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Here&#8217;s the best possible protection for your GMail password</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve said this numerous times. I tell everyone I know, that they must set this up to protect their accounts. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">It is known by many names &#8211; Two factor authentication or Two step verification or Login approvals.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve a whole <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, so please have a read and please implement it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This protection, won&#8217;t prevent you falling for the scam outlined above. What it will do is prevent the bad guys from accessing your account, even though they have your GMail ID and GMail Password, they won&#8217;t have your smart phone and as such won&#8217;t be able to sign in as you.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Please implement Two factor authentication on all your on-line accounts. It really gives you the best possible protection.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">h/t to the folks over on <a href="https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/">WordFence</a> for the details on this.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Could the attempted theft of €4.3m from Meath County Council happen to your business?</title>
		<link>https://www.l2cybersecurity.com/meath-county-council-scammed/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 22 Dec 2016 09:23:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=471</guid>

					<description><![CDATA[<p>As was widely reported at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really. This attempted theft was facilitated by the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://4.bp.blogspot.com/-jkJnX039VCQ/WFq2YmKI0-I/AAAAAAAAA7U/12qdIiN6IHMdFP8yCP-LDHp6C8PmnL1ygCLcB/s1600/MeathCoCo.jpg" alt="Meath County Council" width="180" height="180" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As was widely <a href="https://www.irishtimes.com/news/ireland/irish-news/meath-county-council-confirms-attempted-cyber-attack-1.2910180">reported</a> at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This attempted theft was facilitated by the use of technology, but not necessarily the abuse of it. They&#8217;re no longer commenting about it now while the matter is investigated, so we&#8217;ll need to await the outcome of that before we know for sure.</span></p>
</div>
<p><span id="more-471"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">However this sort of theft is incredibly common and is known variously as CEO fraud or Business Email Compromise (BEC). Basically what the bad guys do, is send an e-mail or even a text message that appears to come from the CEO, the MD, the Head Honcho, the Big Boss. This e-mail/text is sent to somebody in the finance department and it instructs them to urgently transfer or wire funds to some account that is outside of the EU area. If the transfer was within the EU area, it can be recalled under SEPA regulations, but outside of the area the money can be a taken and never seen again. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If, in your business, you have a finance function (however big or small) that has a single person who is able to initiate a transfer of funds in any amount, on their own, then you could easily fall victim to this type of fraud. The thieves will have done research on your organisation and will know who is involved in the various departments and how you operate. This enables them to make their e-mail/text much more believable.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The FBI in the US have <a href="https://www.fbi.gov/contact-us/field-offices/phoenix/news/press-releases/fbi-warns-of-dramatic-increase-in-business-e-mail-scams">reported</a> that this fraud has occurred in 80 countries. From October 2013 to February 2016, there have been over 17,600 victims with total losses amounting to over $2.3 billion &#8211; that&#8217;s an average of just over $130,000 from each victim. This whole area is increasing rapidly and this will happen more and more.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what can you do to prevent it happening to you?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well quite simply, have the banking set-up, such that at least two signatories are required for every transaction, no matter the size. Then follow this up with a strict policy on how money transfers can be requested &#8211; particularly where the target account is new. If you are simply transferring to a known, established account (belonging to a vendor you deal with for example), then this should be OK (as long as there is a supporting invoice of course). However, if an e-mail requests the transfer of funds to an unknown account, then certain due diligence should kick in. For example, the CEO/MD/Whatever should be contacted by phone and additional verification sought. If the CEO cannot be contacted, then there should be no further action taken until they are reached. Very importantly, the CEO needs to acknowledge this policy and never subvert it, no matter what.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As mentioned earlier, the thieves will have done their homework on the company. The true story I tell during the <a href="http://www.l2cybersecurity.com/#ourservices">Internet Security Awareness and Safety Training</a> is about the finance director of a company receiving an e-mail from his boss asking him to urgently transfer funds to a client account in order to secure a new contract. As it&#8217;s for a new contract, it&#8217;s to go to a new account. Also the amount of the funds is just within the Finance Directors approval range for a solo authorisation. The CEO concludes the e-mail saying that he is just getting onto a long haul flight, so he will now be incommunicado for several hours.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The CEO was indeed travelling long haul that day, which the Finance Director knew, so it all looked fine, so he sets up the transfer on the system and is about to process it when a niggle hits him. There was just something that wasn&#8217;t quite right, so he chanced calling the CEO, who answered from the departure lounge at the airport. Of course there had been no e-mail sent by the CEO &#8211; it was all a hoax. But if the Finance Director didn&#8217;t have that niggle to call, the money was gone, never to be seen again.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So put a strong policy in place and make sure your staff are instructed in it and are never criticised for adhering to the policy. This last part if critical, because if they do get criticised, then the policy won&#8217;t get enforced and the risk of theft will become greater.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
