Social Engineering | Attackers attempt to "con" an individual to share information or click-on buttons rather than attempting a technical breach of data
Spoofing | An email can appear to come an address of someone you know
RATs | "Remote access trojans" once inside your computer, allows the attacker access to sensitive data
Bacdoor.Breut | A trojan horse that opens a back door on the compromised computer. It then records keystrokes and may download more files on to the compromised computer.
Trojan.Nancrat | A trojan horse that opens a back door and steals information from the compromised computer.
Examples of subject lines of the email used by the attackers
- Re:Invoice
- PO
- Remittance Advice
- Payment Advise
- Quotation Required
- Transfer Copy
- TT Payment
- PAYMENT REMITTANCE
- INQUIRY
- Qoutation
- QUOTATION
- Request for Quotation
Huge impact with few resources
- While advanced attack groups attract a lot of attention in the news, it’s important to remember that less skilled attackers can still cause major damages to a targeted company.
- Even though the attackers in this case have limited resources, they can use Backdoor.Breut and Trojan.Nacrat to gain total access to a computer.
- By focusing their RAT infections on specific employees, the attackers can potentially steal a substantial amount of money and sensitive information from affected businesses.
Take these measures to prevent the attack
- If you do not have in-house tech support, retain the services of a tech support service
- Keep security software up to date
- Do not open attachments or click on links in suspicious email messages
- Avoid providing any personal information when answering an email
- Never enter personal information in a pop-up web page
- If you’re uncertain about an email’s legitimacy, contact your computer consultant
Photo: Warner Bros (promotional)
No comments:
Post a Comment