{"id":73672,"date":"2015-07-30T22:46:02","date_gmt":"2015-07-31T02:46:02","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-24T16:59:07","modified_gmt":"2021-08-24T20:59:07","slug":"spear-phishing","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/spear-phishing\/","title":{"rendered":"Spear Phishing"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20130611231234\/http:\/\/rhftech.com\/blog\/did-you-hear-about-the-one-armed-phisherman\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-98057 alignleft\" title=\"Spear Phishing\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing2.jpg?resize=85%2C87&#038;ssl=1\" alt=\"Spear Phishing\" width=\"85\" height=\"87\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing2.jpg?resize=147%2C150&amp;ssl=1 147w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing2.jpg?w=265&amp;ssl=1 265w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>As long as there have been people, there have been <strong>scammer<\/strong>s of some kind. Today, <strong>cybercriminals<\/strong> use the same technology email, instant messaging, chats, that helps everyone else in their daily lives. The only difference is that they use it for <strong>wrongdoing<\/strong>. The results of a recent JPMorgan Chase company <strong>hack<\/strong> prove it. The banking giant fell victim to a spear phishing attack.<\/p>\n<p><a href=\"http:\/\/www.infosecurity-magazine.com\/news\/sixty-percent-will-fall-to-a-phishing-attack-that\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98059\" title=\"Phising\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing3-e1563734023506-148x150.jpg?resize=91%2C92&#038;ssl=1\" alt=\"Phising\" width=\"91\" height=\"92\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing3-e1563734023506.jpg?resize=148%2C150&amp;ssl=1 148w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing3-e1563734023506.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing3-e1563734023506.jpg?w=182&amp;ssl=1 182w\" sizes=\"auto, (max-width: 91px) 100vw, 91px\" \/><\/a>The <a title=\"JPMorgan Chase Hacking Affects 76 Million Households\" href=\"https:\/\/web.archive.org\/web\/20220303175143\/https:\/\/dealbook.nytimes.com\/2014\/10\/02\/jpmorgan-discovers-further-cyber-security-issues\/?_r=0\" target=\"_blank\" rel=\"noopener noreferrer\">outcome<\/a>\u00a0of the <a href=\"http:\/\/www.jpmorganchase.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">JPMorgan Chase &amp; Co<\/a>., <a href=\"https:\/\/web.archive.org\/web\/20160829070317\/http:\/\/www.fastcompany.com:80\/3036633\/fast-feed\/this-is-why-the-enormous-jpmorgan-chase-hack-is-so-scary\" target=\"_blank\" rel=\"noopener noreferrer\">hack<\/a> says that over 76 million user accounts were compromised. It is also very likely that other banks were <a title=\"JPMorgan Chase attackers hacked other banks, report says\" href=\"http:\/\/www.pcworld.com\/article\/2691912\/jpmorgan-chase-attackers-hacked-other-banks-report-says.html\" target=\"_blank\" rel=\"noopener noreferrer\">breached<\/a> by the same attackers. The breach of JPMorgan Chase should serve as a reminder that even <strong>large, sophisticated businesses can be breached by today\u2019s phishing expeditions<\/strong>.<\/p>\n<p>Attackers were able to penetrate JPMorgan Chase\u2019s defenses and <a title=\"JPMorgan Hackers Came In the Front Door -- in June. Two Months of Mayhem \" href=\"http:\/\/www.bloomberg.com\/news\/2014-08-29\/jpmorgan-hack-said-to-span-months-via-multiple-flaws.html\" target=\"_blank\" rel=\"noopener noreferrer\">roam their<\/a>\u00a0<a title=\"JPMorgan Hackers Came In the Front Door -- in June. Two Months of Mayhem \" href=\"http:\/\/www.bloomberg.com\/news\/2014-08-29\/jpmorgan-hack-said-to-span-months-via-multiple-flaws.html\" target=\"_blank\" rel=\"noopener noreferrer\">networks<\/a> undetected for months most likely due to one worker who fell victim to a <strong><a title=\"Spear Phishing\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/spear-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">spear phishing attack<\/a><\/strong>. Corporate security and hackers are engaged in an <strong>asymmetric figh<\/strong><strong>t<\/strong> right now. The good guys have to protect the entire enterprise while the <strong>bad guys only need a single point of failure<\/strong> to gain access, just one user to fall victim to a spear phishing attack and they are in.<\/p>\n<h3>The bad guys have the advantage<\/h3>\n<p><a href=\"http:\/\/www.businessinsider.com\/microsofts-research-scientists-finally-solved-why-scammers-say-theyre-from-nigeria-2012-6\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98061 \" title=\"Nigerian prince\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scammer-e1563734391530-145x150.jpg?resize=110%2C114&#038;ssl=1\" alt=\"Nigerian prince\" width=\"110\" height=\"114\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scammer-e1563734391530.jpg?resize=145%2C150&amp;ssl=1 145w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scammer-e1563734391530.jpg?resize=73%2C75&amp;ssl=1 73w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/scammer-e1563734391530.jpg?w=348&amp;ssl=1 348w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Anyone can claim to be a <a href=\"https:\/\/web.archive.org\/web\/20180721123410\/http:\/\/www.cbc.ca:80\/newsblogs\/yourcommunity\/2013\/11\/nigerian-prince-email-scam-actually-200-years-old.html\" target=\"_blank\" rel=\"noopener noreferrer\">Nigerian prince<\/a> from behind their computer screen and bilk unsuspecting targets for their financial information over email. All it takes is a valid email account \u2013 personal or otherwise. With the hacker&#8217;s advantage in mind, here are some tips to help avoid spear phishing attacks and prevent the attacker&#8217;s access to your firm.<\/p>\n<h3>Spear Phishing<\/h3>\n<p>Today\u2019s phishing attacks are not the crude, typo-filled <a title=\"The \u201cNigerian\u201d Email Scam\" href=\"https:\/\/web.archive.org\/web\/20190604214603\/https:\/\/www.consumer.ftc.gov\/articles\/0002l-nigerian-email-scam\" target=\"_blank\" rel=\"noopener noreferrer\">emails from Nigeria<\/a> of yesteryear. Spear-phishers carefully <strong>research their targets<\/strong>. They will know your manager\u2019s name, the names of your co-workers, and perhaps the projects you\u2019re assigned to. This knowledge and detail make spear-phishing very effective.<\/p>\n<p>No matter what the nature of an email account is, it is susceptible to all the dangers of the Internet. This is bad news for businesses that use email, and a lot of organizations out there fit that bill to a T. <strong>The more that a company uses email, the greater the chance that they will experience a data breach of some kind<\/strong>.<\/p>\n<p>There is really nothing stopping a well-crafted phishing scam from appearing in a corporate inbox and fooling an unwitting employee. Here is a look at three of the <strong>email-based scams<\/strong> that could be threatening your business right now:<\/p>\n<h3>Vendor identity fraud<\/h3>\n<p>According to a report from Virginia TV station <a href=\"http:\/\/maps.google.com\/maps?ll=38.6014166667,-78.6326388889&amp;spn=0.01,0.01&amp;q=38.6014166667,-78.6326388889 (WHSV-TV)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">WHSV<\/a>, the <a title=\"Better Business Bureau\" href=\"https:\/\/www.bbb.org\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Better Business Bureau<\/a> is <a title=\"Scammers Hack Business Email, Redirect Payments\" href=\"https:\/\/web.archive.org\/web\/20141110224013\/http:\/\/www.whsv.com\/home\/headlines\/Scammers-Hack-Business-Email-Redirect-Payments-277428831.html\" target=\"_blank\" rel=\"noopener noreferrer\">warning businesses<\/a> of a recent scam that targets this daily operation as a way to siphon money from corporate bank accounts. The BBB describes the attack:<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>As part of your job, you pay invoices for several of your business&#8217;s\u00a0<\/em><em>vendors &#8230; One day, you receive an urgent email from an executive in your company telling you to change how you pay invoices from a vendor. Instead of sending a check, you now need to wire the money straight to a bank account.<\/em><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98063 \" title=\"SPAM email\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam1.jpg?resize=115%2C94&#038;ssl=1\" alt=\"SPAM email\" width=\"115\" height=\"94\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam1.jpg?resize=150%2C123&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam1.jpg?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/spam1.jpg?w=416&amp;ssl=1 416w\" sizes=\"auto, (max-width: 115px) 100vw, 115px\" \/>This phishing attack is made possible by malicious hacking. Cybercriminals break into company emails and gain enough information to <strong>impersonate one of the\u00a0organization&#8217;s suppliers<\/strong>. Next, they send off the false email that tells some poor admin to <strong>wire the payment to the hackers<\/strong> instead of the supplier and leave\u00a0businesses out hundreds of thousands of dollars depending on the nature of\u00a0the vendor.<\/p>\n<h3>Hackers impersonate branch of FBI<\/h3>\n<p>Nobody likes being accused of crimes that they didn&#8217;t commit. This is especially true when the <a title=\"Federal Bureau of Investigation\" href=\"https:\/\/www.fbi.gov\" target=\"_blank\" rel=\"homepage noopener noreferrer\">FBI<\/a>\u00a0is involved. But a new scheme involving the <a title=\"Internet Crime Complaint Center\" href=\"http:\/\/www.ic3.gov\/default.aspx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Internet Crime Complaint Center<\/a> has many people thinking their <strong>arrest is\u00a0imminent if they do not fork over a hefty fine via online transaction<\/strong> \u2013\u00a0something that is unheard of in real law enforcement agencies and that\u00a0the FBI has been forced to address. DailyFinance contributor Mitch Lipka wrote:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>The emails claim that the victim is the subject of a criminal report and\u00a0that charges are forthcoming &#8230;\u00a0They are then told that they have one or two days to respond or risk\u00a0arrest, IC3 said. Those who respond are told they have to send money via\u00a0prepaid cards if they want to avoid prosecution<\/em>.<\/p>\n<h3>Fooled by &#8220;clients&#8221;<\/h3>\n<p>Lawyers are trained to always read between the lines and examine the fine print in legal documents, but what about in their supposedly secure communications?<\/p>\n<p>This is one concept that has been inadvertently brought up\u00a0in New Zealand thanks to a scam targeting law firms and their clients.\u00a0There are plenty of things that can be done over email, but that doesn&#8217;t mean that they should be. Client and lawyer communications are one of these\u00a0tasks. According to The National Business Review, <strong>criminals will pose as\u00a0either a law professional or someone they currently represent, asking the\u00a0opposite party to make a payment or carry out a transaction<\/strong>. This not only puts funds in danger but also sensitive information. This may land a law firm in serious legal trouble.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.tripwire.com\/state-of-security\/latest-security-news\/linkedin-plugs-hole-that-allowed-for-spear-phishing-campaigns\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">LinkedIn Plugs Hole that Allowed for Spear Phishing Campaigns<\/a> (tripwire.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online security is an asymmetric fight bad guys only need one user to fall victim to spear phishing attack to win<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,2308,874,171,1041,77,612,4],"class_list":["post-73672","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-bbb","tag-confidence-trick","tag-email","tag-fbi","tag-internet","tag-phishing","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=73672"}],"version-history":[{"count":11,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73672\/revisions"}],"predecessor-version":[{"id":130868,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73672\/revisions\/130868"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=73672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=73672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=73672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}