<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SANS Data Breach Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/sans-data-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/sans-data-breach/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 20 Aug 2020 15:46:08 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>SANS Data Breach Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/sans-data-breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 042 Consent Phishing</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-042-consent-phishing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 20 Aug 2020 23:05:51 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Consent Phishing]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Office 365 Malicious App]]></category>
		<category><![CDATA[Office 365 OAUTH permissions]]></category>
		<category><![CDATA[SANS]]></category>
		<category><![CDATA[SANS Data Breach]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2264</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 42. This week we&#8217;re going to talk about Consent Phishing. What is consent phishing? &#8220;What is consent phishing?&#8221; I hear you ask. It&#8217;s actually even a fairly new term even for me. Earlier this week, SANS the well-respected Cyber Security organisation revealed that they had had a data breach back in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-042-consent-phishing/">#WeekendWisdom 042 Consent Phishing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 42. This week we&#8217;re going to talk about Consent Phishing.<span id="more-2264"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2264-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-042-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-042-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-042-lo.mp4</a></video></div>
<h3>What is consent phishing?</h3>
<p>&#8220;What is consent phishing?&#8221; I hear you ask. It&#8217;s actually even a fairly new term even for me. Earlier this week, SANS the well-respected Cyber Security organisation <a href="https://www.sans.org/dataincident2020?msc=data-incident-2020" target="_blank" rel="noopener noreferrer">revealed that they had had a data breach</a> back in July. They detected it in August and they <a href="https://www.youtube.com/watch?v=KZ3gcFe4_rE" target="_blank" rel="noopener noreferrer">shared the results of their investigation</a> with the public earlier this week.</p>
<h3>What happened to them?</h3>
<p>What had happened was, a number of their staff received the following email which looks like a genuine Office 365 file sharing email. One user fell for the phish and they clicked the Open button.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-2266 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Phishing-email.jpg" alt="SANS Data Breach Phishing email" width="943" height="710" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Phishing-email.jpg 943w, https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Phishing-email-300x226.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Phishing-email-768x578.jpg 768w" sizes="(max-width: 943px) 100vw, 943px" /></p>
<p>What happened then was a malicious Office 365 App tries to install. When it does that it needs to get permission. The user got popped up something similar to the following message to say &#8220;Can you give me permissions to do some of these things?&#8221;</p>
<p><img decoding="async" class="aligncenter wp-image-2267 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Permissions.jpg" alt="SANS Data Breach Permissions" width="372" height="552" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Permissions.jpg 372w, https://www.l2cybersecurity.com/wp-content/uploads/2020/08/SANS-Data-Breach-Permissions-202x300.jpg 202w" sizes="(max-width: 372px) 100vw, 372px" /></p>
<p>The user fell for that and they gave their permission. Then the app installed a forwarding rule on the user&#8217;s email account such that if any email containing the words:</p>
<ul>
<li>invoice</li>
<li>payment</li>
<li>bank</li>
<li>BIC</li>
<li>IBAN</li>
<li>SWIFT</li>
<li>account</li>
</ul>
<p>all these type of financial terms. The rule will forward that email to an external address which is controlled by the hackers.</p>
<h3>What should I look out for?</h3>
<p>So if you ever get something that pops up unexpectedly looking to get permissions, to your Office 365 or G Suite accounts, stop and think, &#8220;Is this legitimate or not?&#8221;</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>. We include these types of real world examples in our training, so people get to see what is actually tried by the criminals.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-042-consent-phishing/">#WeekendWisdom 042 Consent Phishing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-042-lo.mp4" length="23278279" type="video/mp4" />

			</item>
	</channel>
</rss>
