<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Social Engineering Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/social-engineering/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/social-engineering/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Fri, 24 Aug 2018 11:11:10 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Social Engineering Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/social-engineering/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Eir laptop theft &#8211; could have been worse</title>
		<link>https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 24 Aug 2018 11:11:10 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1346</guid>

					<description><![CDATA[<p>The eir laptop theft that was revealed this week was pretty &#8230; actually &#8230; it was really bad and deeply embarrassing for eir. However details that emerged from the statement by the Data Protection Commission showed that it could have been a LOT worse. 1,500 Laptops worse! First up though I did a short video recently&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/">Eir laptop theft &#8211; could have been worse</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1349" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1-150x150.jpg" alt="eir laptop" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/eir_laptop_stolen-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />The eir laptop theft that was revealed this week was <del>pretty</del> &#8230; actually &#8230; it was really bad and deeply embarrassing for eir. However details that emerged from the <a href="https://www.dataprotection.ie/docs/EN/22-08-2018-Statement-by-Data-Protection-Commission-in-relation-to-Eir-breach-notification/m/1783.htm" target="_blank" rel="noopener">statement by the Data Protection Commission</a> showed that it could have been a LOT worse. 1,500 Laptops worse!<span id="more-1346"></span></p>
<p>First up though I did <a href="https://www.l2cybersecurity.com/data-breach-video-series-mobile-device-loss/" target="_blank" rel="noopener">a short video</a> recently explaining why loss of mobile devices (including laptops) is a Data Breach under #GDPR. Have a quick watch and then come back here.</p>
<h3>Why was the laptop not encrypted?</h3>
<p>They&#8217;ve not specified exactly what happened, but I surmise that eir use a third party package to secure their mobile devices and some of the many <a href="https://www.computerworld.com/article/3216425/microsoft-windows/microsoft-patch-alert-mainstream-august-patches-look-remarkably-good.html?nsdr=true&amp;page=2" target="_blank" rel="noopener">problematic monthly updates</a> that Microsoft released in July caused them issues. It must have been bad for them to have to decrypt 1,500 laptops. In fairness to eir, they at least notified the Data Protection Commission (DPC) about this on the 10th of August.</p>
<h3>What happened next?</h3>
<p>At some point between 10th August and last weekend one of the 1,500 unsecured laptops was stolen outside. In other words an employee/contractor removed one of the laptops from eir&#8217;s premises and then fell victim to a thief.</p>
<h3>What was on this eir laptop?</h3>
<p>According to the report from the DPC &#8211; names, email addresses, mobile numbers &amp; account numbers for 36,642 customers and names &amp; contact details for 177 eir employees.</p>
<h3>That doesn&#8217;t sound too bad &#8230; does it?</h3>
<p>As I say to people in my training, it&#8217;s all about the context. If you are a florist and you lose a list of names and addresses of your customers, there may not be a significant risk to those individuals in respect to their rights and freedoms. So you probably won&#8217;t need to notify them about the breach. It might be a borderline call as to whether you would need to notify the DPC. I would say you should.</p>
<p>Now lets say that list of names and addresses are for clients of a sexually transmitted disease clinic. The context now shifts dramatically as there is now a significant risk to the individuals rights and freedoms. If that list became public, there would be much embarrassment to those people. So you would definitely be reporting to the DPC and also notifying the affected people.</p>
<p>In the eir laptop case, the fact there are emails and account numbers is quite concerning. If an evil doer uses all of the available information, they could craft an extremely plausible phishing e-mail, which they could con the victim into doing something that is not in their best interests.</p>
<p>Also, if the bad guys combined the detail from the eir laptop with some information they gleaned from answers to <a href="https://www.l2cybersecurity.com/identity-theft-enabled-fun-quizzes/" target="_blank" rel="noopener">fun quizzes</a>, they may be able to impersonate the eir customer to an eir customer service agent and effectively take over the customers account.</p>
<h3>What should have happened?</h3>
<p>Once eir were aware that all of these devices were unsecured, they should never have been allowed to leave the premises. They should have been locked to the employees/contractors desks and the keys stored in the kennel of a hungry rottweiler until the issue with the patch was rectified.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1350 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller-200x300.jpg" alt="hungry rottweiler" width="200" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller-200x300.jpg 200w, https://www.l2cybersecurity.com/wp-content/uploads/2018/08/hungry-rottweiller.jpg 283w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<h3>What have eir done?</h3>
<p>Well they had been busily working away re-encrypting their laptops and according to the DPC&#8217;s statement they had all but 46 completed as of 22nd August.</p>
<p>They have also notified the affected customers, by email from a &#8220;no-reply&#8221; email address, which is pretty crappy. They really should have a specific email address and freephone telephone number for those impacted customers.</p>
<h3>What should we all learn from this?</h3>
<p>The most important thing we should all learn from this eir laptop theft case is that, if you have a mobile device of any type, even if it doesn&#8217;t currently have personal data on it, <span style="text-decoration: underline;"><strong>encrypt the thing</strong></span>! If it&#8217;s not encrypted, <span style="text-decoration: underline;"><strong>keep it securely stored in your</strong></span><strong><span style="text-decoration: underline;"> premises</span></strong> &#8211; don&#8217;t ever take it off premises.</p>
<p>If you want to learn more about good security practice send an e-mail to <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener">info@L2CyberSecurity.com</a> and we can talk to you about training and practical steps to improve your cyber security set-up.</p>
<p>#LetsBeCarefulOutThere</p>
<p>#SecuritySimplified</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/eir-laptop-theft-could-have-been-worse/">Eir laptop theft &#8211; could have been worse</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Disaster Relief Charity Scam &#8211; watch out!</title>
		<link>https://www.l2cybersecurity.com/disaster-relief-charity-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 10:15:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=888</guid>

					<description><![CDATA[<p>Disasters happen many times a year and huge disasters impacting the US that get massive coverage in the international media happen less frequently (Katrina 2005, Sandy 2012 and now Harvey 2017). What has also happened at all of these disasters is a vile crime. The Disaster Relief Charity Scam. At times of crisis, such as&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/disaster-relief-charity-scam/">Disaster Relief Charity Scam &#8211; watch out!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-full wp-image-891" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/08/scam-alert-1.png" alt="Disaster Relief Charity Scam" width="300" height="300" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/08/scam-alert-1.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/08/scam-alert-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" />Disasters happen many times a year and huge disasters impacting the US that get massive coverage in the international media happen less frequently (<a href="https://en.wikipedia.org/wiki/Hurricane_Katrina">Katrina</a> 2005, <a href="https://en.wikipedia.org/wiki/Hurricane_Sandy">Sandy</a> 2012 and now <a href="https://en.wikipedia.org/wiki/Hurricane_Harvey">Harvey</a> 2017). What has also happened at all of these disasters is a vile crime. The Disaster Relief Charity Scam.</p>
<p><span id="more-888"></span></p>
<p>At times of crisis, such as right now in <a href="http://www.independent.co.uk/news/world/asia/india-floods-bangladesh-nepal-deaths-millions-homeless-latest-news-updates-a7919006.html">Bangladesh and Nepal</a>, where some 1,200 people have died and millions have lost their homes, charity organisations call out for financial and material support to help them in their disaster relief efforts. These organisations have a lot of experience (unfortunately) in helping the less fortunate following these disasters and their collection of money and material is (usually) efficient and effective.</p>
<p>What also happens are well meaning people who want to help with fund raising for a disaster, they set up a page on a fundraising website or on social media and ask for donations, which they intend to go to the victims. This is very laudable, but how can you be certain of these people&#8217;s bona fides.</p>
<p>This has also given the bad guys a way of making easy money, by similarly setting up bogus fund raising pages and pocketing all the cash that comes their way. You can be absolutely certain that none of the monies go where they are most needed.</p>
<p>So treat any e-mail or Facebook message from a &#8220;charity&#8221; with the same contempt that you reserve for any unsolicited message (according to <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>) and simply delete/ignore it.</p>
<p>If you want to give funds towards a specific disaster, the proper charities usually have a way of enabling you to specify where you want the donation to go. So go directly to their websites and donate there. Don&#8217;t click links from social media, text messages or e-mail.</p>
<p>So look up the big guys such as <a href="https://www.redcross.ie/">The Red Cross</a>, <a href="https://www.unicef.org/">UNICEF</a> and <a href="https://www.oxfam.org/">Oxfam</a>, donate to them and don&#8217;t fall for the Disaster Relief Charity Scam.</p>
<p>If you want to give to a lesser known/unknown charity then you can check them out with the likes of the <a href="http://www.charitiesregulatoryauthority.ie/">Irish Charities Regulator</a>, <a href="http://give.org/">Wise Giving Alliance</a>, <a href="https://www.charitynavigator.org/">Charity Navigator</a> or <a href="https://www.charitywatch.org/home">Charity Watch</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/disaster-relief-charity-scam/">Disaster Relief Charity Scam &#8211; watch out!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phishing subject lines &#8211; Top 10.</title>
		<link>https://www.l2cybersecurity.com/phishing-subject-lines-top-10/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 20 Jul 2017 15:22:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=814</guid>

					<description><![CDATA[<p>What would you expect if you got an e-mail with the subject line of &#8220;Security Alert&#8221;? How about &#8220;Unusual sign-in activity&#8221;? You probably expect it to be an e-mail that is trying to raise your awareness about some potential security issue. I&#8217;m afraid it is likely not. These are just two examples from the Top&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/phishing-subject-lines-top-10/">Phishing subject lines &#8211; Top 10.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-544" src="https://www.l2cybersecurity.com/wp-content/uploads/2016/05/Phish-150x150.png" alt="Phishing Subject Lines" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2016/05/Phish-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2016/05/Phish.png 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />What would you expect if you got an e-mail with the subject line of &#8220;Security Alert&#8221;? How about &#8220;Unusual sign-in activity&#8221;? You probably expect it to be an e-mail that is trying to raise your awareness about some potential security issue. I&#8217;m afraid it is likely not. These are just two examples from the Top 10 Phishing Subject Lines <a href="http://www.prweb.com/releases/2017/07/prweb14499138.htm">report</a> for Quarter 2 2017 that was release by KnowBe4 recently.<span id="more-814"></span></p>
<p>The report shows that people are clicking on e-mails with the above subjects (which could potentially be business related). However some of the other subject lines are not very &#8220;business-like&#8221; at all and people are still going into them and potentially bringing things like Ransomware into their employers networks.</p>
<ol>
<li><span style="color: #0000ff;">21%</span> Security Alert</li>
<li><span style="color: #0000ff;">14%</span> Revised Vacation &amp; Sick Time Policy</li>
<li><span style="color: #0000ff;">10%</span> UPS Label Delivery 1ZBE312TNY00015011</li>
<li><span style="color: #0000ff;">10%</span> BREAKING: United Airlines Passenger Dies from Brain Hemorrhage – VIDEO</li>
<li><span style="color: #0000ff;">10%</span> A Delivery Attempt was made</li>
<li><span style="color: #0000ff;">9%</span>  All Employees: Update your Healthcare Info</li>
<li><span style="color: #0000ff;">8%</span>  Change of Password Required Immediately</li>
<li><span style="color: #0000ff;">7%</span>  Password Check Required Immediately</li>
<li><span style="color: #0000ff;">6% </span> Unusual sign-in activity</li>
<li><span style="color: #0000ff;">6% </span> Urgent Action Required</li>
</ol>
<p>Clearly #4 above is not in anyway a business related e-mail (unless you are a United Airlines employee, obviously <span id="c128" class="notranslate">?</span>). However #3 and #5 could also be unrelated to your company&#8217;s day-to-day business.</p>
<p>The e-mails in the research actually made it passed any spam or malware filters that the surveyed organisations had in place, showing that technology cannot be completely relied upon to give 100% protection against the many evils on the internet. Your staff will be your last line of defence.</p>
<p>Of course you could avail of our <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Security Awareness and Safety Training</a>. This will show your staff what to watch out for and how to handle such dodgy e-mails. It will also give them a very comprehensive insight into what threats are out there and how they can prevent downtime in your business</p>
<p>If you don&#8217;t want to go down that road, then at least have a read of <a href="https://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> of our very own Top 10 &#8211; <a href="https://www.l2cybersecurity.com/the-ten-commandments/">The Ten Commandments of Cyber Security</a>, which will give you plenty to think about in respect to handling e-mail with any type of phishing subject lines.</p>
<p>The post <a href="https://www.l2cybersecurity.com/phishing-subject-lines-top-10/">Phishing subject lines &#8211; Top 10.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Phone scams &#8211; some current examples</title>
		<link>https://www.l2cybersecurity.com/phone-scams-current-examples/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 19 Jun 2017 15:54:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=758</guid>

					<description><![CDATA[<p>In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite. The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-759" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg" alt="Phone scams" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Scam-meme.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />In the last few days, I&#8217;ve received a couple of attempted phone scams. The first was a new one on me, but the second was an old favourite.</p>
<p><span id="more-758"></span></p>
<p>The first occurred on Friday, late afternoon. I was speaking with a client on my business phone, when a call came in on my personal phone. It was a UK number +44-141-846-1617. I didn&#8217;t answer and let it go to voicemail, which a minute or so later showed that I had a message. When I finished speaking with my client I dialed 171 and listened to it.</p>
<p>There was silence for a long time and then &#8220;Hi. A free Euromillions Lottery ticket is waiting for you at the upcoming 45 million Euro jackpot draw. To redeem, press 1.&#8221;. This was repeated until the voicemail cut out. Here is a recording:</p>
<audio class="wp-audio-shortcode" id="audio-758-1" preload="none" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3">https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3</a></audio>
<p>There was probably some sort of auto-dialler that was cycling through a set of numbers and playing the message at them. Presumably if somebody pressed 1, they would be connected to an &#8220;agent&#8221; who would kick off the <em>sales-pitch</em>, with &#8220;Oh good news, you have won a thousand Euro in a special draw, just give me all of your bank account details and PIN number and we can transfer that money for you.&#8221; and then proceed to empty your account. <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>There were some reports in <a href="http://www.independent.ie/irish-news/news/garda-warning-over-lotto-scam-offering-free-play-in-the-euromillions-draw-35725526.html">May</a> about these calls coming from an Irish number, but this week it was a UK number.</p>
<p>The second of the phone scams came yesterday and was the old SMS text message with a link to a photo (apparently), and here is said offender:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-761 size-medium" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png" alt="scam text" width="300" height="190" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-300x190.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-768x486.png 768w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39-1024x648.png 1024w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Screenshot_2017-06-18-19-22-39.png 1079w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>It would be so easy to click on that link, but as I am a firm believer in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, I resisted the temptation to click and instead fired up a sacrificial machine and typed the link into that instead <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/fe5/1/28/1f60f.png" alt="?" width="15" height="15" />.  After a moment of the web address changing in the browser (also known as a redirect) I was presented with, what appears to be, the start of a movie trailer and then this message:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-762 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png" alt="" width="504" height="276" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax.png 504w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-hoax-300x164.png 300w" sizes="auto, (max-width: 504px) 100vw, 504px" /></p>
<p>So like a good sucker, I clicked on OK and was presented with:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-763 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png" alt="" width="708" height="397" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2.png 708w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Movie-Hoax-2-300x168.png 300w" sizes="auto, (max-width: 708px) 100vw, 708px" /></p>
<p>Anybody who read last week&#8217;s <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">post</a>, will know that these kind of sign-ups, will usually mean entering a credit card number somewhere, which will then be milked dry by the evil doers. I traced the original link to a company based in the Seychelles, so at least the money would be going somewhere nice <img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f92/1/28/1f911.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f37/1/28/1f47a.png" alt="?" width="15" height="15" /><img loading="lazy" decoding="async" class="" src="https://www.facebook.com/images/emoji.php/v9/f6e/1/28/1f621.png" alt="?" width="15" height="15" /></p>
<p>So, please don&#8217;t fall for these phone scams. There are many others, so if in doubt, just remember &#8220;If it sounds too good to be true, then it probably is.&#8221; and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a> for unsolicited e-mails, texts or social media messages with links.</p>
<p>The post <a href="https://www.l2cybersecurity.com/phone-scams-current-examples/">Phone scams &#8211; some current examples</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Lotto-Draw-Hoax.mp3" length="107847" type="audio/mpeg" />

			</item>
		<item>
		<title>How a typo can cause you problems.</title>
		<link>https://www.l2cybersecurity.com/typo-can-cause-problems/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Tue, 13 Jun 2017 14:55:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Adobe Flash Player]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Flash Player]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Typo]]></category>
		<category><![CDATA[Typosquatting]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=747</guid>

					<description><![CDATA[<p>Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;Typosquatting&#8220;. Essentially this is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-748" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg" alt="Typo squatting" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/Bad-Spelling.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Nobody is perfect and we all make mistakes. One of the most common mistakes, in particular with mobile phones and their small keyboards, is the simple typo. Did you know that the evil doers have got sneaky ways that they try to capitalise on your fumbling fingers? It&#8217;s a technique called &#8220;<a href="https://en.wikipedia.org/wiki/Typosquatting">Typosquatting</a>&#8220;.</p>
<p><span id="more-747"></span></p>
<p>Essentially this is where the bad guys have a web page at an address that is very very very close to the spelling of a popular or well known webpage and they count on you having a typo and either missing a letter (e.g. instgram.com) or hitting an adjoining letter (e.g. facebooo.com) in error.</p>
<p><span style="text-decoration: underline;"><strong>Don&#8217;t try this on your desktop/laptop/tablet/phone</strong></span>. I have a separate, sacrificial machine which I can use for such things.</p>
<p>I tried to access www.instgram.com (missing the &#8220;a&#8221; in the middle) and received the following page:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-750" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg" alt="instgram.com 1" width="572" height="201" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1.jpg 572w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-1-300x105.jpg 300w" sizes="auto, (max-width: 572px) 100vw, 572px" /></p>
<p>Notice the address where it is going to (circled in yellow) &#8211; that is not an Instagram address, but some sort of ad/advertising address.</p>
<p>When I clicked to continue, I got:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-749" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg" alt="instgram 2" width="765" height="472" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/instgram-2-300x185.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>I didn&#8217;t continue any further, as I googled gr8musik.com and the results indicated it was a scam site, which if you registered with it, would take money from your credit card, even though you were supposed to be in some kind of a free trial period.</p>
<p>Similarly, I tried www.facebooo.com (an &#8220;o&#8221; instead of the &#8220;k&#8221;) and got the following:</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-751" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg" alt="facebooo 1" width="798" height="409" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1.jpg 798w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-300x154.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/facebooo-1-768x394.jpg 768w" sizes="auto, (max-width: 798px) 100vw, 798px" /></p>
<p>This was just some kind of survey. But you never know what you will get. A subsequent attempt to go to www.instgram.com brought me to the survey, followed by the survey (again), followed by a sign-up form for mcplayz.com (identical to the above gr8musik.com). So these crooks are randomly sending you to different pages trying to compromise you in someway.</p>
<p>According to this <a href="https://isc.sans.edu/diary/Deceptive+Advertisements%3A+What+they+do+and+where+they+come+from/22494">post</a>, the victim&#8217;s typo sent him to a &#8220;Technical Support&#8221; page, where he was advised that his PC was locked and he needed to telephone for support. If he did this, the scammers at the other end of the line would have talked him through giving them remote access to the PC and then they would have totally locked him out and looked for his credit card details to &#8220;fix&#8221; the problem.</p>
<p>Some pages reached by a typo try to apparently show you a video, but then indicates there is a problem and that you need to download a specific video player to watch it. For example, the following headline is tempting you to watch the video to get your hands on software worth $7,000.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-753" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg" alt="video player not" width="765" height="462" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer.jpg 765w, https://www.l2cybersecurity.com/wp-content/uploads/2017/06/videoplayer-300x181.jpg 300w" sizes="auto, (max-width: 765px) 100vw, 765px" /></p>
<p>These will typically download what is referred to as adware, and if you read our last week&#8217;s <a href="http://www.l2cybersecurity.com/fireball-bigger-than-wannacry/">post</a> about the Fireball adware, you can see  how insidious that adware can be. Adware will take control of your browser and fire ads at you while you are trying to use the internet. It might also re-direct your searches to odd search engines, which will likely attempt to track you and violate your personal privacy on the internet.</p>
<p>So just be careful when typing addresses. Better still use bookmarks.</p>
<p>If you do inadvertently get taken to some page that you never intended to go to, just close the browser immediately by way of the <strong>X</strong> in the top right-hand corner of the window. You might get warnings about losing data, just ignore them and close that browser. It would do no harm to run a spyware check on your PC at this point, in case any adware did manage to sneak in without your knowledge or permission. There are free tools from <a href="https://www.malwarebytes.com/">Malwarebytes</a> or <a href="https://www.safer-networking.org/">Safer Networking</a> that can do this for you, but you might want to also talk to some real life technical support (a techy friend or the IT team in your place of employment) about it and have them give your PC a once over.</p>
<p>Whatever you do, don&#8217;t continue to engage with a website that you weren&#8217;t intending to visit and stay safe.</p>
<p>The post <a href="https://www.l2cybersecurity.com/typo-can-cause-problems/">How a typo can cause you problems.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GMail had a bad case of the phishers.</title>
		<link>https://www.l2cybersecurity.com/gmail-users-phished/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 08 May 2017 22:46:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=639</guid>

					<description><![CDATA[<p>About 1 million GMail users were subject to a very clever phishing campaign last week. &#8220;What&#8217;s phishing?&#8221; I hear you ask. It&#8217;s basically an e-mail that persuades you to take an action, which ends up compromising you in some way. In this case, you receive an e-mail with an apparent Google Docs attachment. If you follow&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-users-phished/">GMail had a bad case of the phishers.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-thumbnail wp-image-640 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG-150x150.jpg" alt="GMail base case of the spammers" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />About 1 million GMail users were subject to a very clever phishing campaign last week. &#8220;What&#8217;s phishing?&#8221; I hear you ask. It&#8217;s basically an e-mail that persuades you to take an action, which ends up compromising you in some way. In this case, you receive an e-mail with an apparent Google Docs attachment. If you follow through with it, all of your e-mail contacts will receive the same phishing e-mail, but coming from you.</p>
<p><span id="more-639"></span>Fortunately there was nothing destructive in this phishing campaign, but it did cause quite a lot of consternation because it could have been very nasty. It was quite clever in how it fooled it&#8217;s victims.</p>
<p>What the evil doers did was to create an app called &#8220;Google Docs&#8221; &#8230; not to be confused with the official one from Google called &#8230; errrrr &#8230; &#8220;Google Docs&#8221; ?.</p>
<p>They then sent out their phishing e-mail, which looked like this:</p>
<p><img loading="lazy" decoding="async" class="wp-image-644 size-full aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1.jpg" alt="" width="700" height="208" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1.jpg 700w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1-300x89.jpg 300w" sizes="auto, (max-width: 700px) 100vw, 700px" /></p>
<p>In later occurrences of the phishing campaign, the blurred out name in the image above, was probably somebody you know or at least you were on their contact list. If you click on the &#8220;Open in Docs&#8221; button above, you launch the app called &#8220;Google Docs&#8221;, which sounds like the right kind of thing to happen &#8211; right? Then you get the following pop-up, which looks fairly legitimate, because it is:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-643 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2.jpg" alt="" width="300" height="340" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2-265x300.jpg 265w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>The reason it&#8217;s legitimate is because this is the standard screen from Google in regards to this &#8220;new&#8221; app that you want to execute. The app developers (the bad guys) had to specify what permissions their app needed to carry out it&#8217;s nefarious deeds on your e-mail, and so Google helpfully popped up this window to ask you to give permission to the app for the parts of your GMail profile that it needed. Don&#8217;t freak out, there could be genuine reasons an app needs these particular permissions, so this would not have been a red-flag to Google &#8230; the app name on the other hand &#8230; ?.</p>
<p>Anyway, if you click &#8220;allow&#8221;, the app goes ahead and uses your contacts to e-mail a new copy of the phishing e-mail to all your contacts.</p>
<p>Fortunately Google resolved the issue reasonably quickly. If you think you might have been a victim of this attack, you can check very quickly by going to this link <a href="https://myaccount.google.com/permissions">https://myaccount.google.com/permissions</a> and if there is something in the list called &#8220;Google Docs&#8221;, then left-click on it and hit the &#8220;Remove&#8221; button. You&#8217;ll then be safe again, for now.</p>
<p>This was really clever because the evil doers were able to create a sneaky app, with a ridiculously trusty name, which then fooled people into granting seemingly required permissions in the platform (Google in this instance) to enable the app to do something bad. There are other platforms that use a similar set-up &#8211; Facebook and LinkedIn, so be on the lookout for any messages which try to execute apparently genuine &#8220;apps&#8221; that may try to give you a very bad day. Treat all messages that want you to do something that is out-of-the-ordinary with great suspicion. Or you could go all biblical on them and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>BTW &#8211; Google didn&#8217;t reveal the number of affected users, they just said less than 0.1% of the GMail accounts were affected &#8211; a tiny fraction, right? Well given they had over a billion users this time last year, means the not insubstantial figure of 1 million is how many were affected. ?</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-users-phished/">GMail had a bad case of the phishers.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Evil e-mail has your name and address!</title>
		<link>https://www.l2cybersecurity.com/evil-e-mail-knows-you/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 30 Mar 2017 15:52:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=602</guid>

					<description><![CDATA[<p>Reports today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://nakedsecurity.sophos.com/2017/03/30/the-scam-that-knows-your-name-and-home-address-heres-what-to-do/">Reports</a> today are somewhat concerning. Below are two examples of evil e-mail that has been doing the rounds in the last day or so. The greeting addresses you by your first/given name and the file that is attached to the e-mail is called after your surname. The postal address shown IS also your address. I&#8217;ll bet if you got this e-mail, it would get your attention pretty fast.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-604 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png" alt="" width="400" height="209" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21-300x157.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-21.png 640w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-605 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png" alt="" width="401" height="243" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11-300x182.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/hello-11.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p><span id="more-602"></span></p>
<p>Even though it is written in the scam-iest possible language with the bad spelling and poor English, because it is addressed direct to you, you are going to sit up and take notice. So much so, that you might be very tempted to open the attachment to see what other information this person has on you. You should know me by now &#8211; Just DON&#8217;T open the attachment on an e-mail from a stranger &#8211; delete the damned thing, as set out in <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>If you did open it, it will ask for the password, which is specified in the evil e-mail:</p>
<p><img loading="lazy" decoding="async" class="wp-image-606 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png" alt="evil e-mail asks for password" width="401" height="238" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password-300x178.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/password.png 637w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>And after you enter that, it will want you to disable all of the security protections in Microsoft Word, so it can attempt to do it&#8217;s nasty work on your desktop/laptop:</p>
<p><img loading="lazy" decoding="async" class="wp-image-607 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png" alt="evil e-mail asks to disable security" width="400" height="346" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected-300x260.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/protected.png 636w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p>If you follow through and do what it asks you to do, you wont see any further information about you, you will see an &#8220;alternative fact&#8221; &#8211; It will tell you the file is corrupted and can&#8217;t be opened:</p>
<p><img loading="lazy" decoding="async" class="wp-image-608 alignnone" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png" alt="evil e-mail shows corrupted message" width="401" height="234" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted-300x175.png 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/corrupted.png 640w" sizes="auto, (max-width: 401px) 100vw, 401px" /></p>
<p>In fact this is a sign that the evil e-mail has done it&#8217;s worst and may be scrambling your files and locking you out of them. The payload can vary, depending on what the evil doers decide they want to achieve. Trust me on this, it will not be anything in your best interests.</p>
<p>So please, JUST DON&#8217;T do anything with the e-mail! Delete the damned thing and go on with your life.</p>
<p>The fact that they have your name and address, while concerning is maybe not terribly surprising. After all in 2016, there was <em><strong>at least</strong></em> <a href="https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-2016-1-6-billion-records-leaked/">3.1 billion records reported</a> as being leaked in various data breaches. So it is possible that your name, address and e-mail have made it into the hands of the criminals who are now trying to exploit the data in this nasty phishing scam.</p>
<p>Delete the e-mail and move on.</p>
<p>And let&#8217;s be careful out there.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/evil-e-mail-knows-you/">Evil e-mail has your name and address!</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scary new way to have your GMail password and account stolen.</title>
		<link>https://www.l2cybersecurity.com/gmail-password-stolen/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 18 Jan 2017 11:43:43 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=467</guid>

					<description><![CDATA[<p>This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ? So what happens is you receive an e-mail from somebody you know, who also had a GMail (note the emphasis on had).  This e-mail will have&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" title="GMail password" src="https://1.bp.blogspot.com/-7Vym9Gnn-zQ/WH9LZ13c8oI/AAAAAAAABFg/zZCh8CPJptAEG0tnmvSbwKCYH18Fu5n0QCLcB/s320/download.png" alt="Scary new way to have your GMail password and account stolen" width="316" height="159" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This is an incredibly easy way for the evil doers to steal your GMail ID and GMail password. This one could even catch out security people like me! ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what happens is you receive an e-mail from somebody you know, who also <b><i>had</i></b> a GMail (note the emphasis on had). </span></p>
</div>
<p><span id="more-467"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This e-mail will have a subject line of a previous e-mail conversation that you have had with that person and also, what appears to be an, attachment that had been attached in an earlier e-mail in that conversation. So far this e-mail is looking <u data-blogger-escaped-style="font-weight: bold;">EXTREMELY</u> legitimate.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That attachment, is actually an image in the e-mail with a link embedded in it and if you click on it, it will take you to, what appears to be, the GMail log-in screen, as follows:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s1600/gmail-data-URI-sign-in-page.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-9KAAm1iqCfw/WH9NZdzhOFI/AAAAAAAABFw/2wumWv_O_vUPqR-LIzDnY2RpYDgs1-FWwCLcB/s320/gmail-data-URI-sign-in-page.png" width="275" height="320" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Being asked to log-in like this would certainly trigger an alert in my mind that something was up. I would immediately check to see where this password page has come from, so I would look up at the address bar of the browser. This is what you would see:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-iCBopbFc6pQ/WH9OlfyPKqI/AAAAAAAABF8/fkfYp2Vfbpok95qb7nI7H6oMHjKC1wToACLcB/s1600/dataURI%2B%25281%2529.png" width="526" height="49" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;"> So that looks OK doesn&#8217;t it? <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> (nice and secure site) <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">accounts.google.com</span> (legitimate address) and the e-mail came from somebody I know, from an e-mail conversation I have had with them, that had an attachment, which was here again in this new e-mail. <b>All very believable! </b>So let me enter my GMail ID and password and &#8230; you&#8217;ve now given the hackers your credentials.</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Within minutes, they will have taken over your GMail account and will be sending this nasty surprise e-mail to your friends, family and colleagues.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So how do I know it&#8217;s not a legitimate GMail login screen? Let&#8217;s take another look at that address bar:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-5ZA9kDxB208/WH9OlfsIpcI/AAAAAAAABGE/MhFtj0uo9vcCZNo4-kSp1I9DjN4qsxprwCEw/s1600/dataURI.png" width="528" height="52" border="0" /></span></a></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That first part of the address (highlighted) looks <i data-blogger-escaped-style="font-weight: bold;">a bit odd</i>, don&#8217;t you think? It is very odd. It actually has a verrrrrrrrry long string of text, which stretches off beyond the end of what you can see in the address bar that executes a script, which brings up that log-in page.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Also, if you know your secure websites, you know that where there is proper <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">https://</span> there is also a green padlock symbol like this:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;"><a href="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s1600/Capture.PNG" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://4.bp.blogspot.com/-t9SCWPSDHJI/WH9Q6PHmllI/AAAAAAAABGM/DUIN9fuHbNkkgVnkzPvRLHIjTu0hPeBbwCLcB/s320/Capture.PNG" width="320" height="35" border="0" /></a></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">That gives a high degree of confidence that the site is legitimate and properly secure.</span></p>
</div>
<h2 data-blogger-escaped-style="text-align: justify;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Here&#8217;s the best possible protection for your GMail password</span></h2>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve said this numerous times. I tell everyone I know, that they must set this up to protect their accounts. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">It is known by many names &#8211; Two factor authentication or Two step verification or Login approvals.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">I&#8217;ve a whole <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">commandment</a> dedicated to it, so please have a read and please implement it.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This protection, won&#8217;t prevent you falling for the scam outlined above. What it will do is prevent the bad guys from accessing your account, even though they have your GMail ID and GMail Password, they won&#8217;t have your smart phone and as such won&#8217;t be able to sign in as you.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Please implement Two factor authentication on all your on-line accounts. It really gives you the best possible protection.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">h/t to the folks over on <a href="https://www.wordfence.com/blog/2017/01/gmail-phishing-data-uri/">WordFence</a> for the details on this.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-password-stolen/">Scary new way to have your GMail password and account stolen.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Could the attempted theft of €4.3m from Meath County Council happen to your business?</title>
		<link>https://www.l2cybersecurity.com/meath-county-council-scammed/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 22 Dec 2016 09:23:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[CEO Fraud]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=471</guid>

					<description><![CDATA[<p>As was widely reported at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really. This attempted theft was facilitated by the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://4.bp.blogspot.com/-jkJnX039VCQ/WFq2YmKI0-I/AAAAAAAAA7U/12qdIiN6IHMdFP8yCP-LDHp6C8PmnL1ygCLcB/s1600/MeathCoCo.jpg" alt="Meath County Council" width="180" height="180" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As was widely <a href="https://www.irishtimes.com/news/ireland/irish-news/meath-county-council-confirms-attempted-cyber-attack-1.2910180">reported</a> at the weekend, Meath County Council were the victim of an attempted theft of some €4.3 million. A lot of the reportage was pointing to hackers and this being a cyber attack, but based on what is known, in my opinion, it&#8217;s not really.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">This attempted theft was facilitated by the use of technology, but not necessarily the abuse of it. They&#8217;re no longer commenting about it now while the matter is investigated, so we&#8217;ll need to await the outcome of that before we know for sure.</span></p>
</div>
<p><span id="more-471"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">However this sort of theft is incredibly common and is known variously as CEO fraud or Business Email Compromise (BEC). Basically what the bad guys do, is send an e-mail or even a text message that appears to come from the CEO, the MD, the Head Honcho, the Big Boss. This e-mail/text is sent to somebody in the finance department and it instructs them to urgently transfer or wire funds to some account that is outside of the EU area. If the transfer was within the EU area, it can be recalled under SEPA regulations, but outside of the area the money can be a taken and never seen again. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">If, in your business, you have a finance function (however big or small) that has a single person who is able to initiate a transfer of funds in any amount, on their own, then you could easily fall victim to this type of fraud. The thieves will have done research on your organisation and will know who is involved in the various departments and how you operate. This enables them to make their e-mail/text much more believable.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The FBI in the US have <a href="https://www.fbi.gov/contact-us/field-offices/phoenix/news/press-releases/fbi-warns-of-dramatic-increase-in-business-e-mail-scams">reported</a> that this fraud has occurred in 80 countries. From October 2013 to February 2016, there have been over 17,600 victims with total losses amounting to over $2.3 billion &#8211; that&#8217;s an average of just over $130,000 from each victim. This whole area is increasing rapidly and this will happen more and more.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So what can you do to prevent it happening to you?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">Well quite simply, have the banking set-up, such that at least two signatories are required for every transaction, no matter the size. Then follow this up with a strict policy on how money transfers can be requested &#8211; particularly where the target account is new. If you are simply transferring to a known, established account (belonging to a vendor you deal with for example), then this should be OK (as long as there is a supporting invoice of course). However, if an e-mail requests the transfer of funds to an unknown account, then certain due diligence should kick in. For example, the CEO/MD/Whatever should be contacted by phone and additional verification sought. If the CEO cannot be contacted, then there should be no further action taken until they are reached. Very importantly, the CEO needs to acknowledge this policy and never subvert it, no matter what.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">As mentioned earlier, the thieves will have done their homework on the company. The true story I tell during the <a href="http://www.l2cybersecurity.com/#ourservices">Internet Security Awareness and Safety Training</a> is about the finance director of a company receiving an e-mail from his boss asking him to urgently transfer funds to a client account in order to secure a new contract. As it&#8217;s for a new contract, it&#8217;s to go to a new account. Also the amount of the funds is just within the Finance Directors approval range for a solo authorisation. The CEO concludes the e-mail saying that he is just getting onto a long haul flight, so he will now be incommunicado for several hours.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">The CEO was indeed travelling long haul that day, which the Finance Director knew, so it all looked fine, so he sets up the transfer on the system and is about to process it when a niggle hits him. There was just something that wasn&#8217;t quite right, so he chanced calling the CEO, who answered from the departure lounge at the airport. Of course there had been no e-mail sent by the CEO &#8211; it was all a hoax. But if the Finance Director didn&#8217;t have that niggle to call, the money was gone, never to be seen again.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: &quot;helvetica neue&quot; , &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;">So put a strong policy in place and make sure your staff are instructed in it and are never criticised for adhering to the policy. This last part if critical, because if they do get criticised, then the policy won&#8217;t get enforced and the risk of theft will become greater.</span></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/meath-county-council-scammed/">Could the attempted theft of €4.3m from Meath County Council happen to your business?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>There is a lot of variations in scam e-mail the last couple of days.</title>
		<link>https://www.l2cybersecurity.com/variations-of-scam-email/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 27 Oct 2016 16:29:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spear-Phishing]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=576</guid>

					<description><![CDATA[<p>I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ? In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people. I&#8217;ll run through three sneaky methods&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s1600/emailscam.jpg" data-blogger-escaped-style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-EIlXpP2NYbo/WBIhZeY39mI/AAAAAAAAAc4/SomGB_1sroIGCv7I_aX3egrgjiy1C-lMwCLcB/s320/emailscam.jpg" width="320" height="240" border="0" /></span></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I yearn for the days when evil e-mail was so easily identified &#8220;becuse it wuz ritten in, gud, inglish wit grate spellhng an pun.tation&#8221;. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">In the last couple of days, the evil doers have been varying their scam e-mails fairly wildly and it&#8217;s bound to catch out some people.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I&#8217;ll run through three sneaky methods that have been attempted on others over the last 48 hours.</span><span id="more-576"></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(1) Non-Delivery Receipt.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">You know these e-mails. You get them when you send an e-mail, but you make a mistake and send it to an address which doesn&#8217;t exist or the mailbox has a size limit and your e-mail breaches that limit. This is the text of the Non-Delivery Receipt (NDR) in this instance:</span></p>
<blockquote class="tr_bq">
<pre data-blogger-escaped-style="background: rgb(238, 238, 238); border: 1px solid rgb(204, 204, 204); color: #222222; padding: 5px 10px;"><span style="font-family: 'courier new', courier, monospace; font-size: small;" data-blogger-escaped-style="font-family: &quot;courier new&quot; , &quot;courier&quot; , monospace; font-size: x-small;">Your message was not delivered due to the following reason(s):

Your message could not be delivered because the destination server was
not reachable within the allowed queue period. The amount of time
a message is queued before it is returned depends on local configura-
tion parameters.

Most likely there is a network problem that prevented delivery, but
it is also possible that the computer is turned off, or does not
have a mail system running right now.</span></pre>
</blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a ZIP file attached to the NDR, which of course has some nasty software that does not have your best interest at heart. ?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(2) A Microsoft Sharepoint Notification.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">This is a particularly sneaky one, as lots of larger organisations depend on Sharepoint&#8217;s sharing abilities.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The e-mail looks something like this:</span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s1600/sharepoint-spam.png" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" src="https://2.bp.blogspot.com/-kASnvXCzPc0/WBIlKvuRzSI/AAAAAAAAAdI/Vw_ezBVwR7YsIbwSO3GqyW8fohJpuo2qwCLcB/s400/sharepoint-spam.png" width="400" height="295" border="0" /></a></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The Link in the body text would take you to a not particularly nice website. No doubt it might attempt to infect your computer. </span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">?</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>(3) Somewhat abusive attempt to get you to open the attachment.</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Please be warned, there is a profanity ahead. I wanted to leave it in as it does generate something of a visceral reaction when you read it.</span></p>
<blockquote class="tr_bq"><p><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Subject: credit card charge from &lt;<i>your company&#8217;s domain name</i>&gt; </span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">What is this fucking charge on my card?</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I never visited or bought anything from &lt;</span></span><i data-blogger-escaped-style="color: blue; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;">your company&#8217;s domain name</i><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;"><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">&gt;.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached a screenshot of my statement.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I want my money back!!!</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">I have attached my card statement, please get back to me ASAP.</span><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><br data-blogger-escaped-style="background-color: white; font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, Arial, sans-serif; font-size: 13.6px;" /><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;">Thank you</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">company name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">person name</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">phone</span></span></p></blockquote>
<blockquote class="tr_bq"><p><span style="font-family: 'lucida grande', 'lucida sans unicode', arial, sans-serif;" data-blogger-escaped-style="background-color: white; font-family: &quot;lucida grande&quot; , &quot;lucida sans unicode&quot; , &quot;arial&quot; , sans-serif; font-size: 13.6px;"><span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">fax</span></span></p></blockquote>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There is a Word document attached to the e-mail, which of course has &#8230; nasty ransomware, which will scramble all of your files and leave you with a very bad day ahead. </span>?<span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Just delete the scam e-mail.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><b></b></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><b>Conclusion</b></span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I hope you noticed that I was pretty consistent in my recommended action &#8230; this is because it is from <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment #5</a> in our <a href="http://www.l2cybersecurity.com/the-ten-commandments/">Ten Commandments of Cyber Security</a>.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If you wish to train your staff on how they can spot these type of e-mails, then have a read of <a href="http://www.l2cybersecurity.com/security-awareness-training/">this course outline</a> and contact us on the number or e-mail address at the end of that. We&#8217;ll be happy to discuss your training requirements and provide a quotation to cover same.</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;"><br />
</span><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">And lets be careful out there.</span></p>
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">H/T to the SANS Institute&#8217;s Internet Storm Centre @ <a href="https://isc.sans.edu/">https://isc.sans.edu/</a></span></p>
<p>The post <a href="https://www.l2cybersecurity.com/variations-of-scam-email/">There is a lot of variations in scam e-mail the last couple of days.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
