<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Scale to the One</title>
	<atom:link href="https://scaletotheone.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://scaletotheone.com</link>
	<description>Just another WordPress site</description>
	<lastBuildDate>Fri, 02 Sep 2022 16:33:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<item>
		<title>Phishing Emails Impersonating LinkedIn Surge by 232% Amid &#8216;Great Resignation&#8217;​</title>
		<link>https://scaletotheone.com/phishing-emails-impersonating-linkedin-surge-by-232-amid-great-resignation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishing-emails-impersonating-linkedin-surge-by-232-amid-great-resignation</link>
					<comments>https://scaletotheone.com/phishing-emails-impersonating-linkedin-surge-by-232-amid-great-resignation/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 00:49:28 +0000</pubDate>
				<category><![CDATA[Email Phishing]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=276</guid>

					<description><![CDATA[Email phishing attacks impersonating Linkedin have increased by 232% since February 1 2022, according to Egress.

The cybersecurity vendor said this surge is linked to the so-called ‘Great Resignation,’ in which record numbers of employees are leaving their jobs and searching for new opportunities amid the COVID-19 crisis. For example, a record number of Americans left their jobs in 2021 for new opportunities.]]></description>
										<content:encoded><![CDATA[<p>Vast numbers of jobseekers use LinkedIn to find and apply for new positions, and the researchers revealed that cyber-attackers are increasingly leveraging the professional social networking site to socially engineer victims into clicking on phishing links and then entering their credentials into fraudulent websites.</p>
<p>The sophisticated attacks all follow a similar pattern – using webmail addresses with a LinkedIn display name – while the phishing emails are sent from separate webmail accounts that have zero correlation to each other. They also use subject lines similar to those used by the social networking site, including: ‘You appeared in 4 searches this week,’ ‘You have 1 new message,’ ‘Your profile matches this job’ and ‘Who’s searching for you online.’</p>
<p>In addition, the attackers are using multiple stylized HTML templates to make them appear genuine, such as the LinkedIn logo, brand colors and icons. The bottom of the message accurately mimics LinkedIn’s genuine email footer, with its global HQ address, hyperlinks to unsubscribe and to its support section and the recipient’s information.</p>
<p>Within the body of the email, other well-known organizations’ names are used, including American Express and CVS Carepoint. When the links are clicked, the victim is taken to a website that harvests their LinkedIn log-in credentials.</p>
<p>Egress said the attacks successfully bypass traditional email security defenses to reach people’s inboxes. Currently, it is unknown whether the attacks are being conducted by a single cyber-criminal or a gang operating together.</p>
<p>Egress VP of threat intelligence Jack Chapman explained: “Current employment trends help to make this attack more convincing. ‘The Great Resignation’ continues to dominate headlines, and a record number of Americans left their jobs in 2021 for new opportunities. It is likely these phishing attacks aim to capitalize on jobseekers (plus curious individuals) by flattering them into believing their profile is being viewed and their experience is relevant to household brands. While the display name is always LinkedIn and the emails all follow a similar pattern, the <a href="https://scaletotheone.com/microsoft-365-phishing-attack-makes-comeback/">phishing attacks</a> are sent from different webmail addresses that have zero correlation with each other. Currently, it is unknown whether these attacks are the work of one cybercriminal or a gang operating together.</p>
<p>“The targets vary, covering companies in both North America and the UK, and operating within different industries. LinkedIn states it has over 810 million members in more than 200 countries, which provides an extensive victim pool for cyber-criminals. Many professionals choose to include their corporate email address within their profile, and many regularly receive update communications from LinkedIn. Consequently, they could be more trusting of a stylized <a href="https://scaletotheone.com/email-threats-phishing-attacks-find-new-ways-to-trick-victims/">phishing email</a>. The cyber-criminal(s) involved has likely used a legitimate LinkedIn email as their starting point for these attacks. They have used branded elements, including the current LinkedIn logo, to make the phishes more convincing.”</p>
<p>Responding to the findings, a LinkedIn spokesperson highlighted measures the firm have put in place to protect its members from such impersonation attacks: “Our internal teams work to take action against those who attempt to harm LinkedIn members through phishing. We encourage members to report suspicious messages and help them learn more about what they can do to protect themselves, including turning on <a href="https://www.linkedin.com/help/linkedin/answer/544/turn-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener" data-feathr-click-track="true">two-step verification</a>. To learn more about how members can identify phishing messages, see our Help Center <a href="https://www.linkedin.com/help/linkedin/answer/5342/phishing-emails?lang=en" target="_blank" rel="noopener" data-feathr-click-track="true">here</a>.&#8221;</p>
<p>Yesterday, Barclays released <a href="https://www.infosecurity-magazine.com/news/barclays-scams-surged-quarter/" target="_blank" rel="noopener" data-feathr-click-track="true">new research</a> on scams, which found nearly two-thirds (64%) of Brits would be more likely to comply with a request if it came from a high-profile institution.</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on infosecurity-magazine.com on February 16, 2022. Written by James Coker.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/phishing-emails-impersonating-linkedin-surge-by-232-amid-great-resignation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable​</title>
		<link>https://scaletotheone.com/new-browser-in-the-browser-bitb-attack-makes-phishing-nearly-undetectable/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-browser-in-the-browser-bitb-attack-makes-phishing-nearly-undetectable</link>
					<comments>https://scaletotheone.com/new-browser-in-the-browser-bitb-attack-makes-phishing-nearly-undetectable/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 31 Aug 2022 00:39:04 +0000</pubDate>
				<category><![CDATA[Phishing Attack]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=273</guid>

					<description><![CDATA[A novel phishing technique called browser-in-the-browser (BitB) attack can be exploited to simulate a browser window within the browser in order to spoof a legitimate domain, thereby making it possible to stage convincing phishing attacks.]]></description>
										<content:encoded><![CDATA[<p>According to penetration tester and security researcher, who goes by the handle <a href="https://twitter.com/mrd0x" target="_blank" rel="noopener">mrd0x</a> on Twitter, the method takes advantage of third-party single sign-on (<a href="https://en.wikipedia.org/wiki/Single_sign-on" target="_blank" rel="noopener">SSO</a>) options embedded on websites such as &#8220;Sign in with Google&#8221; (or Facebook, Apple, or Microsoft).</p>
<p>While the default behavior when a user attempts to sign in via these methods is to be greeted by a pop-up window to complete the authentication process, the BitB attack aims to replicate this entire process using a mix of HTML and CSS code to create an entirely fabricated browser window.</p>
<p>&#8220;Combine the window design with an iframe pointing to the malicious server hosting the phishing page, and it&#8217;s basically indistinguishable,&#8221; mrd0x <a href="https://mrd0x.com/browser-in-the-browser-phishing-attack/" target="_blank" rel="noopener">said</a> in a technical write-up published last week. &#8220;JavaScript can be easily used to make the window appear on a link or button click, on the page loading etc.&#8221;</p>
<p>Interestingly, the technique has been abused in the wild at least once before. In February 2020, Zscaler <a href="https://www.zscaler.com/blogs/security-research/fake-sites-stealing-steam-credentials" target="_blank" rel="noopener">disclosed</a> details of a campaign that leveraged the BitB trick to siphon credentials for video game digital distribution service Steam by means of fake Counter-Strike: Global Offensive (CS: GO) websites.</p>
<p>&#8220;Normally, the measures taken by a user to detect a phishing site include checking to see if the URL is legitimate, whether the website is using HTTPS, and whether there is any kind of <a href="https://thehackernews.com/2020/08/magecart-homograph-phishing.html" target="_blank" rel="noopener">homograph</a> in the domain, among others,&#8221; Zscaler researcher Prakhar Shrotriya said at the time.</p>
<p>&#8220;In this case, everything looks fine as the domain is steamcommunity[.]com, which is legitimate and is using HTTPS. But when we try to drag this prompt from the currently used window, it disappears beyond the edge of the window as it is not a legitimate browser pop-up and is created using HTML in the current window.&#8221;</p>
<p>While this method significantly makes it easier to mount effective <a href="https://github.com/mrd0x/BITB" target="_blank" rel="noopener">social engineering campaigns</a>, it&#8217;s worth noting that potential victims need to be redirected to a phishing domain that can display such a fake authentication window for credential harvesting.</p>
<p>&#8220;But once landed on the attacker-owned website, the user will be at ease as they type their credentials away on what appears to be the legitimate website (because the trustworthy URL says so),&#8221; mrd0x added.</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on thehackernews.com on March 21, 2022. Written by Ravie Lakshmanan.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/new-browser-in-the-browser-bitb-attack-makes-phishing-nearly-undetectable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Phishing Top Threat to US Healthcare</title>
		<link>https://scaletotheone.com/phishing-top-threat-to-us-healthcare/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishing-top-threat-to-us-healthcare</link>
					<comments>https://scaletotheone.com/phishing-top-threat-to-us-healthcare/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 24 Aug 2022 01:01:23 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=264</guid>

					<description><![CDATA[New research by the Healthcare Information and Management Systems Society (HIMSS) has found phishing and ransomware attacks are the most significant security incidents impacting healthcare organizations of all types.]]></description>
										<content:encoded><![CDATA[<p>The finding emerged from the <em>2021 HIMSS Healthcare Cybersecurity <a href="https://www.himss.org/resources/2021-himss-healthcare-cybersecurity-survey-report" target="_blank" rel="noopener" data-feathr-click-track="true">Survey</a></em> that questioned 167 healthcare cybersecurity professionals about security incidents their organizations had experienced in the past twelve months.</p>
<p>Nearly half (45%) said the most significant security breach they had experienced in the previous twelve months was a phishing attack, while a further 17% named ransomware as their worst aggressor.</p>
<p>Asked about the cause of their most significant breach, more than half (57%) said phishing was to blame. Negligent insider activity was named by 7% of respondents as the cause of the most significant security incident.</p>
<p>While email-based <a href="https://scaletotheone.com/microsoft-365-phishing-attack-makes-comeback/">phishing attacks</a> accounted for most (71%) of the significant security breaches, 27% had suffered a significant vishing (voice phishing) incident and 21% said they had been the victim of a significant smishing (SMS phishing) attack.</p>
<p>In 15% of attacks, the initial point of compromise occurred through social engineering. However, the most common route into an organization for attackers was <a href="https://scaletotheone.com/phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for/">phishing</a>, which accounted for 71% of attacks.</p>
<p>Other key findings were that human error was the cause of 19% of data breaches. A further 15% of breaches were pinned on the use of legacy software that is no longer supported.</p>
<p>Asked about the impact of security breaches, 32% said breaches disrupted systems that impacted business operations. More than a quarter (26%) said security breaches disrupted IT systems, and 22% said security breaches resulted in data breaches or data leakage.</p>
<p>Fewer respondents (21%) said security breaches impacted clinical care, and only 17% said the most significant security incident resulted in financial loss.</p>
<p>HIMSS said: &#8220;The findings of the 2021 HIMSS Healthcare Cybersecurity Survey suggest that healthcare organizations still have significant challenges to overcome.</p>
<p>&#8220;These barriers to progress include tight security budgets, growing legacy footprints and the growing volume of cyber-attacks and compromises.&#8221;</p>
<p>The society said that while basic security controls have not been fully implemented at many organizations, &#8220;perhaps the largest vulnerability is the human factor.&#8221;</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on infosecurity-magazine.com on February 17, 2022. Written by Sarah Coble.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/phishing-top-threat-to-us-healthcare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Phishers Add Chatbot to the Phishing Lure​</title>
		<link>https://scaletotheone.com/phishers-add-chatbot-to-the-phishing-lure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishers-add-chatbot-to-the-phishing-lure</link>
					<comments>https://scaletotheone.com/phishers-add-chatbot-to-the-phishing-lure/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 17 Aug 2022 11:41:15 +0000</pubDate>
				<category><![CDATA[Phishing Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=257</guid>

					<description><![CDATA[Researchers have discovered a new approach being taken by phishers to increase victim engagement and confidence: the addition of an interactive chatbot. We have all become accustomed to the chatbots used by many of the largest service providers – they are annoying, but something we must navigate.]]></description>
										<content:encoded><![CDATA[<p>The phishers hope that this reluctant acceptance of chatbots will help lower the attention of the target victim. The process is described in a new <a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/interactive-phishing-using-chatbot-like-web-applications-to-harvest-information/" target="_blank" rel="noopener">blog</a> post.</p>
<p>The discovery was made at Trustwave SpiderLabs. In its own telemetry it has found just the one sample, but Karl Sigler, manager of SpiderLabs’ threat intelligence notes that since the phishers have registered a series of domains for the process, it is likely to be part of a wider campaign.</p>
<p>The basic lure is the common failed DHL delivery, and the victim must still fall for this. But the victim is not immediately directed to the phishing site. Instead, the ‘please follow our instructions’ results in the delivery of a PDF with a ‘fix delivery’ button. So far, although there are red flags for the observant victim, there is nothing overtly dangerous.</p>
<p>If the victim clicks the button, he or she is sent to another website where the phishing chain begins with the introduction of a chatbot that promises to fix the delivery but really harvests personal data.</p>
<p>If the target accepts the chatbot, it continues the engagement by showing the victim a photo of the damaged package, and asks for details on how to deliver. If the victim asks to schedule delivery, a false CAPTCHA is presented to further increase confidence.</p>
<p>The next stage is to ask for a delivery address and time. An unspecified password is requested. It really doesn’t matter what password is entered – it could be a DHL account password or the user’s email account – the phisher steals it anyway along with the delivery address and the user’s email address (which he already has). The phishing has begun but is not complete.</p>
<p>The chatbot explains that the additional delivery attempt is an additional service that requires payment – so a credit card payment page is displayed. The amount is small. If the victim has been taken in so far, the payment is not unreasonable. Paying for the fake redelivery gives up the phisher’s real target – bank card details.</p>
<p>There then follows a strange procedure – the phisher says an OTP verification code has been sent to the victim. But the phisher hasn’t yet asked for the victim’s phone number, so this could not happen. “Putting in random characters will just redirect you to the same page stating that the security code is no longer valid,” write the researchers. “On the fifth try, however, the page redirects to another page saying that the submission was successfully received. This marks the end of the perpetrator’s phishing chain.”</p>
<p>We are left with a somewhat puzzling phishing attack. It seems sophisticated but lacking in some very easy detail that could improve it. It would be easy, indeed logical, to ask for the victim’s phone number for the OTP token. The fact that the chatbot is going to send a token to a phone number that hasn’t been given could be a serious red flag. At the same time, the phisher no longer really cares since he already has the details he was after.</p>
<p>However, an apparently functioning OTP would give the victim greater confidence in the validity of the process. With no concerns, the victim may easily give no further thought to the occurrence until non-delivery of the non-existent package (if ever) – giving the phisher ample time to collect the user details. The obviously flaky OTP process, could, however, spark sufficient concern for the victim to contact his or her bank.</p>
<p>This combination of sophistication with a certain level of incompleteness raises the question of whether this is really an attack methodology still in development. It is certainly possible that this sample will mark the beginning of a wider and more sophisticated use of chatbots in <a href="https://scaletotheone.com/phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for/">phishing campaigns</a>. However, Trustwave’s Sigler has a slightly different view.</p>
<p>“Reading through the lines and with my experience,” he told <em>SecurityWeek</em>, “what this tells me is that this was a campaign first used for other purposes. They probably did have it more targeted; they probably did ask for the potential victim’s phone number and then sent them an OTP code to try and capture that. But what the phishers are doing here is they’re reusing the same infrastructure from a more targeted campaign for more general purposes. This could be some minor group that just bought this package from some malware-as-a-service or some dark web link and are trying their best to use it as they can, even though certain components of it don’t really make sense to the victims they’re targeting.”</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on securityweek.com on May 19, 2022. Written by Kevin Townsend.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/phishers-add-chatbot-to-the-phishing-lure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Do phishing simulations work? Sometimes</title>
		<link>https://scaletotheone.com/do-phishing-simulations-work-sometimes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=do-phishing-simulations-work-sometimes</link>
					<comments>https://scaletotheone.com/do-phishing-simulations-work-sometimes/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 27 Jul 2022 08:46:31 +0000</pubDate>
				<category><![CDATA[Phishing Simulation]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=239</guid>

					<description><![CDATA[A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.]]></description>
										<content:encoded><![CDATA[<p>On overwhelming number of security teams believe their email security systems to be ineffective against the most serious inbound threats, including ransomware.</p>
<p>That’s according to a survey of business customers using Microsoft 365 for email commissioned by Cyren and conducted by Osterman Research, which examined concerns with phishing, business email compromise (BEC), and <a href="https://scaletotheone.com/over-620-million-ransomware-attacks-detected-in-2021/">ransomware threats</a>, attacks that became costly incidents, and preparedness to deal with attacks and incidents.</p>
<p>“Security team managers are most concerned that current email security solutions do not block serious inbound threats (particularly ransomware), which requires time for response and remediation by the security team before dangerous threats are triggered by users,” according to <a href="https://www.cyren.com/2022_04_rpt_osterman" target="_blank" rel="noopener">the report</a>, released Wednesday.</p>
<p>Less than half of those surveyed said that their organizations can block delivery of email threats. And, correspondingly, less than half of organizations rank their currently deployed email security solutions as effective.</p>
<p>Protections against impersonation threats are viewed as least effective, followed by measures to detect and block mass-mailed phishing emails.</p>
<p>Thus, it’s perhaps no surprise that almost all of the organizations polled have experienced one or more types of email breaches.</p>
<p>In fact, 89 percent of organizations experienced one or more successful email breach types during the previous 12 months. And, the number of email breaches per year has almost doubled since 2019, according to the report, most of them due to successful <a href="https://scaletotheone.com/microsoft-365-phishing-attack-makes-comeback/">phishing attacks that compromised Microsoft 365</a> credentials.</p>
<p>Overall, according to the survey, successful ransomware attacks have increased by 71 percent in the last three years, Microsoft 365 credential compromise increased by 49 percent and successful phishing attacks increased by 44 percent.</p>
<h2><strong>Ineffective Defensive Approaches</strong></h2>
<p>Digging into where email defense breaks down, the firms found that, surprisingly, use of email client plug-ins for users to report suspicious messages continues to increase. Half of organizations are now using an automated email client plug-in for users to report suspicious email messages for analysis by trained security professionals, up from 37 percent in a 2019 survey.</p>
<p>Security operations center analysts, email administrators, and an <a href="https://scaletotheone.com/most-email-security-approaches-fail-to-block-common-threats/">email security</a> vendor or service provider are the groups most commonly handling these reports, although 78 percent of organizations notify two or more groups.</p>
<p>Also, user training on email threats is now offered in most companies, the survey found: More than 99 percent of organizations offer training at least annually, and one in seven organizations offer email security training monthly or more frequently.</p>
<p>“Training more frequently reduces a range of threat markers Among organizations offering training every 90 days or more frequently, the likelihood of employees falling for a phishing, BEC or ransomware threat is less than organizations only training once or twice a year,” according to the report.</p>
<p>Further, the survey found that more frequent training results in more messages being reported as suspicious, and a higher share of these suspicious messages proving to be malicious after analysis by a security professional.</p>
<p>So far so good. So where’s the breakdown? One concerning finding: Only about a fifth (22 percent) of organizations analyze all reported messages for maliciousness.</p>
<p>“How employees should determine the maliciousness of reported messages by themselves when they do not receive a verdict from security professionals is unclear,” according to the firms.</p>
<p>Across the board, the survey also showed that organizations using at least one additional security tool to complement the basic email protections offered in Microsoft 365. However, their implementation efficacy varies, the survey found.</p>
<p>“Additive tools include Microsoft 365 Defender, security awareness training technology, a third-party secure email gateway or a third-party specialized anti-phishing add-on,” the report explained. “There is a wide range of deployment patterns with the use of these tools.”</p>
<p>The firms concluded that these kinds of holes and ineffective defenses in general translate into major costs for organizations.</p>
<p>“Costs include post-incident remediation, manual removal of malicious messages from inboxes, and time wasted on triaging messages reported as suspicious that prove to be benign,” according to the report. “Organizations face a range of other costs too, including alert fatigue, cybersecurity analyst turnover and regulatory fines.”</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on <a class="ProsemirrorEditor-link" href="http://thehackernews.com/" target="_blank" rel="noopener">techtarget.com</a> on May 2022 2022. Written by Isabella Harford</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/do-phishing-simulations-work-sometimes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>U.S. DoD tricked into paying $23.5 million to phishing actor</title>
		<link>https://scaletotheone.com/u-s-dod-tricked-into-paying-23-5-million-to-phishing-actor/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=u-s-dod-tricked-into-paying-23-5-million-to-phishing-actor</link>
					<comments>https://scaletotheone.com/u-s-dod-tricked-into-paying-23-5-million-to-phishing-actor/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 20 Jul 2022 12:34:29 +0000</pubDate>
				<category><![CDATA[Phishing Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=232</guid>

					<description><![CDATA[The U.S. Department of Justice (DoJ) has announced the conviction of Sercan Oyuntur, 40, resident of California, for multiple counts relating to a phishing operation that caused $23.5 million in damages to the U.S. Department of Defense (DoD).]]></description>
										<content:encoded><![CDATA[<p>The fraudster managed to divert to his personal bank account DoD funds destined for a jet fuel supplier.</p>
<p>After an eight-day trial in Camden, California, Oyuntur was found guilty of conspiracy to commit wire, mail, and bank fraud, unauthorized device access, aggravated identity theft, and making false statements to federal law enforcement officers.</p>
<h2>Phishing operation</h2>
<p>According to the <a href="https://www.documentcloud.org/documents/21823782-us-complaint-oyuntur?responsive=1&amp;title=1" target="_blank" rel="nofollow noopener">criminal complaint</a> against Oyuntur in 2019, the damage from the phishing fraud occurred in September 2018.</p>
<p>Oyuntur and his conspirators registered the domain &#8220;dia-mil.com&#8221;, which is very similar to the legitimate &#8220;dla.mil, and used it to send <a href="https://scaletotheone.com/phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for/">phishing emails</a>.</p>
<p>These emails were delivered to users of SAM (System for Award Management), which is a vendor database where companies that want to conduct business with the Federal Government register themselves.</p>
<p>The phishing messages contained links to a cloned &#8220;login.gov&#8221; website, where the victimized vendors entered their account details, unknowingly exposing them to Oyuntur.</p>
<p>In at least one confirmed case, Oyuntur logged onto one of the stolen accounts belonging to a corporation from Southeast Asia that had 11 active contracts of fuel provision for the United States military at the time.</p>
<p>One of them was a $23,453,350 contract with a pending payment for the provision of 10,080,000 gallons of jet fuel to the U.S. DoD.</p>
<p>By logging in onto the SAM database as the victimized corporation, Oyuntur changed the registered banking information, replacing the foreign account with one that he controlled.</p>
<h2>Attempting to overcome safeguards</h2>
<p>At the time, DoD&#8217;s EBS servers featured a security system that scanned the SAM database every 24 hours for bank account changes and blocked payments of outstanding invoices that met specific risk criteria.</p>
<p data-inc="1">The conspirators stumbled upon this problem following the bank account change and resorted to calling the DLA (Defense Logistics Agency), delivering false explanations, and requesting the manual approval of the financial information changes.</p>
<p>In October 2018, the payment went through. Oyuntur and his conspirators used falsified invoices of a dealership&#8217;s car sales to forge a seemingly legitimate source for the hefty sum.</p>
<p>&nbsp;</p>
<p>&#8220;As part of his participation in the scheme, Oyuntur worked closely with another conspirator, Hurriyet Arslan, who owned a used car dealership, Deal Automotive Sales, in Florence, New Jersey.&#8221;</p>
<p>&#8220;Arslan opened a separate shell company based in New Jersey for use in the criminal scheme, obtained a cell phone number for the shell company, hired another person to pose as the shell company&#8217;s owner, and opened a bank account in the name of the shell company&#8221; &#8211; the <a href="http://www.justice.gov/usao-nj/pr/california-man-found-guilty-conspiracy-steal-payments-us-department-defense-bank-fraud" target="_blank" rel="nofollow noopener">U.S. Department of Justice</a></p>
<p>&nbsp;</p>
<p>However, the dealership used in the scheme wasn&#8217;t a government contractor and wasn&#8217;t registered on SAM, so the transaction was still a mismatch for the automated checking systems in place.</p>
<p>As a result, an investigation was launched, gradually uncovering all of the steps in the fraud, identifying one of Oyuntur&#8217;s conspirators, Hurriyet Arslan, the owner of the car dealership, and reverting the transaction.</p>
<p>Arslan pleaded guilty to conspiracy, bank fraud, and money laundering in January 2020 and is scheduled to be sentenced this summer.</p>
<p>Oyuntur faces a maximum potential penalty of 30 years in prison and a maximum fine of $1,000,000 or twice the gross profits of loss resulting from his offenses. The date of the sentence has not been set yet.</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on <a class="ProsemirrorEditor-link" href="http://bleepingcomputer.com" target="_blank" rel="noopener">bleepingcomputer.com</a> on May 2, 2022. Written by Bill Toulas.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/u-s-dod-tricked-into-paying-23-5-million-to-phishing-actor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Most Email Security Approaches Fail to Block Common Threats</title>
		<link>https://scaletotheone.com/most-email-security-approaches-fail-to-block-common-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=most-email-security-approaches-fail-to-block-common-threats</link>
					<comments>https://scaletotheone.com/most-email-security-approaches-fail-to-block-common-threats/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 13 Jul 2022 12:07:18 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=225</guid>

					<description><![CDATA[A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.]]></description>
										<content:encoded><![CDATA[<p>On overwhelming number of security teams believe their email security systems to be ineffective against the most serious inbound threats, including ransomware.</p>
<p>That’s according to a survey of business customers using Microsoft 365 for email commissioned by Cyren and conducted by Osterman Research, which examined concerns with phishing, business email compromise (BEC), and <a href="https://scaletotheone.com/are-you-prepared-for-2022s-more-destructive-ransomware/">ransomware threats</a>, attacks that became costly incidents, and preparedness to deal with attacks and incidents.</p>
<p>“Security team managers are most concerned that current email security solutions do not block serious inbound threats (particularly ransomware), which requires time for response and remediation by the security team before dangerous threats are triggered by users,” according to <a href="https://www.cyren.com/2022_04_rpt_osterman" target="_blank" rel="noopener">the report</a>, released Wednesday.</p>
<p>Less than half of those surveyed said that their organizations can block delivery of email threats. And, correspondingly, less than half of organizations rank their currently deployed email security solutions as effective.</p>
<p>Protections against impersonation threats are viewed as least effective, followed by measures to detect and block mass-mailed phishing emails.</p>
<p>Thus, it’s perhaps no surprise that almost all of the organizations polled have experienced one or more types of email breaches.</p>
<p>In fact, 89 percent of organizations experienced one or more successful email breach types during the previous 12 months. And, the number of email breaches per year has almost doubled since 2019, according to the report, most of them due to successful phishing attacks that compromised Microsoft 365 credentials.</p>
<p>Overall, according to the survey, successful ransomware attacks have increased by 71 percent in the last three years, Microsoft 365 credential compromise increased by 49 percent and successful phishing attacks increased by 44 percent.</p>
<h2><strong>Ineffective Defensive Approaches</strong></h2>
<p>Digging into where email defense breaks down, the firms found that, surprisingly, use of email client plug-ins for users to report suspicious messages continues to increase. Half of organizations are now using an automated email client plug-in for users to report suspicious email messages for analysis by trained security professionals, up from 37 percent in a 2019 survey.</p>
<p>Security operations center analysts, email administrators, and an email security vendor or service provider are the groups most commonly handling these reports, although 78 percent of organizations notify two or more groups.</p>
<p>Also, user training on email threats is now offered in most companies, the survey found: More than 99 percent of organizations offer training at least annually, and one in seven organizations offer email security training monthly or more frequently.</p>
<p>“Training more frequently reduces a range of threat markers Among organizations offering training every 90 days or more frequently, the likelihood of employees falling for a phishing, BEC or ransomware threat is less than organizations only training once or twice a year,” according to the report.</p>
<p>Further, the survey found that more frequent training results in more messages being reported as suspicious, and a higher share of these suspicious messages proving to be malicious after analysis by a security professional.</p>
<p>So far so good. So where’s the breakdown? One concerning finding: Only about a fifth (22 percent) of organizations analyze all reported messages for maliciousness.</p>
<p>“How employees should determine the maliciousness of reported messages by themselves when they do not receive a verdict from security professionals is unclear,” according to the firms.</p>
<p>Across the board, the survey also showed that organizations using at least one additional security tool to complement the basic <a href="https://www.clinkitsolutions.com/ensure-business-continuity-with-o365/" target="_blank" rel="noopener">email protections offered in Microsoft 365</a>. However, their implementation efficacy varies, the survey found.</p>
<p>“Additive tools include Microsoft 365 Defender, security awareness training technology, a third-party secure email gateway or a third-party specialized anti-phishing add-on,” the report explained. “There is a wide range of deployment patterns with the use of these tools.”</p>
<p>The firms concluded that these kinds of holes and ineffective defenses in general translate into major costs for organizations.</p>
<p>“Costs include post-incident remediation, manual removal of malicious messages from inboxes, and time wasted on triaging messages reported as suspicious that prove to be benign,” according to the report. “Organizations face a range of other costs too, including alert fatigue, cybersecurity analyst turnover and regulatory fines.”</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on <a class="ProsemirrorEditor-link" href="http://thehackernews.com/" target="_blank" rel="noopener">threatpost.com</a> on April 20, 2022. Written by Tara Seals.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/most-email-security-approaches-fail-to-block-common-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Phishing emails targeting LinkedIn accounts are on the rise. Here&#8217;s what to watch out for</title>
		<link>https://scaletotheone.com/phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for</link>
					<comments>https://scaletotheone.com/phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 06 Jul 2022 14:33:24 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=219</guid>

					<description><![CDATA[Cyber criminals want usernames, passwords and other personal information - don't let them have it.]]></description>
										<content:encoded><![CDATA[<div class="c-shortcodeVideo">
<div id="1e43c4bc-eea5-49b8-8048-5b9e3833f99f" class="c-avVideo o-ratio o-ratio-wide">
<div class="o-ratio_content">
<div class="c-videoTitlePanel">LinkedIn users are being urged to watch out for suspicious emails because the professional networking website is one of the most popular brands targeted by <a href="https://scaletotheone.com/email-threats-phishing-attacks-find-new-ways-to-trick-victims/">cyber criminals in phishing attacks</a>.</div>
</div>
</div>
</div>
<p>According to <a href="https://blog.checkpoint.com/2022/04/19/social-networks-most-likely-to-be-imitated-by-criminal-groups-with-linkedin-now-accounting-for-half-of-all-phishing-attempts-worldwide/" target="_blank" rel="noopener noreferrer nofollow">cybersecurity researchers at Check Point</a>, who analysed phishing emails sent during the first three months of this year, over half of all <a href="https://www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more/" rel="follow noopener" target="_blank">phishing attacks</a> (52%) attempted to leverage LinkedIn.</p>
<p>The phishing emails are designed to look like they come from LinkedIn, but if the recipient clicks the link, they&#8217;re sent to a login page designed to look like LinkedIn, and if they enter their email address and password, they&#8217;ll be handing them to the attacker, who can use that information to log in to the victim&#8217;s LinkedIn account.</p>
<p>The attacks aren&#8217;t particularly sophisticated. But by targeting a commonly used service like LinkedIn, there&#8217;s a good chance that some of the recipients won&#8217;t spot that what they&#8217;re interacting with is a phishing attack.</p>
<p>&#8220;These phishing attempts are attacks of opportunity, plain and simple. Criminal groups orchestrate these phishing attempts on a grand scale, with a view to getting as many people to part with their personal data as possible. Some attacks will attempt to gain leverage over individuals or steal their information, such as those we&#8217;re seeing with LinkedIn,&#8221; said Omer Dembinsky, data research group manager at Check Point Software.</p>
<p>While LinkedIn was the most commonly spoofed brand for phishing attacks during the reporting period, it&#8217;s far from the only known company that cyber criminals are attempting to leverage in attacks. Some of the other brands cyber criminals spoof in phishing emails include DHL, Google, Microsoft, FedEx, WhatsApp, Amazon and Apple.</p>
<p>In many cases, the aim, like the LinkedIn attacks, is to steal usernames and passwords, although researchers warn that, in some cases, malicious links and attachments are used to <a href="https://www.zdnet.com/article/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software/" rel="follow noopener" target="_blank">deliver malware</a>.</p>
<p>Cyber criminals send out mass-phishing campaigns <a href="https://www.zdnet.com/article/why-do-phishing-attacks-work-blame-the-humans-not-the-technology/" rel="follow noopener" target="_blank">because, unfortunately, they tend to work</a> – people are clicking malicious links and downloading attachments. But there are often tell-tale signs that an email could be a malicious phishing message.</p>
<p>&#8220;Employees should be trained to spot suspicious anomalies such as misspelled domains, typos, incorrect dates and other details that can expose a malicious email or text message. LinkedIn users, in particular, should be extra vigilant over the course of the next few months,&#8221; said Dembinsky.</p>
<p>LinkedIn provides users with the ability to use <a href="https://www.zdnet.com/article/multi-factor-authentication-use-it-for-all-the-people-that-access-your-network-all-the-time/" rel="follow noopener" target="_blank">multi-factor authentication</a>, which, if applied, can provide an extra barrier against phishing attacks.</p>
<p><em>&#8220;</em>Our internal teams work to take action against those who attempt to harm LinkedIn members through phishing. We encourage members to report suspicious messages and help them learn more about what they can do to protect themselves, including turning on<a href="https://www.linkedin.com/help/linkedin/answer/544/turn-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener noreferrer nofollow"> two-step verification</a>,&#8221; a LinkedIn spokesperson told ZDNet in an email.</p>
<p>&#8220;To learn more about how members can identify phishing messages, see our Help Center <a href="https://www.linkedin.com/help/linkedin/answer/5342/phishing-emails?lang=en" target="_blank" rel="noopener noreferrer nofollow">here</a>,&#8221; they added.</p>
<p>Some of the warning signs that an email might be an attempted phishing attack can include the message containing bad spelling, grammar, and a message that isn&#8217;t addressed to you personally, or a message claiming to be urgent that needs to be acted upon immediately. Messages asking you to download an attachment to install a software update should also be treated with caution.</p>
<p>A common tactic used in phishing emails is to tell users that their account has been hacked. If you are worried that an email with a cybersecurity warning that says you need to change your password might be legitimate, the best course of action is to avoid the URL in the email and visit the website directly. If there really is an issue, the website will tell you and you can take the necessary action.</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on <a class="ProsemirrorEditor-link" href="http://thehackernews.com/" target="_blank" rel="noopener">zdnet.com</a> on April 21, 2022. Written by Danny Palmer, Senior Reporter.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/phishing-emails-targeting-linkedin-accounts-are-on-the-rise-heres-what-to-watch-out-for/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Sneak &#8216;More_Eggs&#8217; Malware Into Resumes Sent to Corporate Hiring Managers</title>
		<link>https://scaletotheone.com/hackers-sneak-more_eggs-malware-into-resumes-sent-to-corporate-hiring-managers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-sneak-more_eggs-malware-into-resumes-sent-to-corporate-hiring-managers</link>
					<comments>https://scaletotheone.com/hackers-sneak-more_eggs-malware-into-resumes-sent-to-corporate-hiring-managers/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 29 Jun 2022 06:50:04 +0000</pubDate>
				<category><![CDATA[Phishing Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=213</guid>

					<description><![CDATA[A new set of phishing attacks delivering the more_eggs malware has been observed striking corporate hiring managers with bogus resumes as an infection vector, a year after potential candidates looking for work on LinkedIn were lured with weaponized job offers.]]></description>
										<content:encoded><![CDATA[<p>&#8220;This year the more_eggs operation has flipped the social engineering script, targeting hiring managers with fake resumes instead of targeting jobseekers with fake job offers,&#8221; eSentire&#8217;s research and reporting lead, Keegan Keplinger, said in a <a href="https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware" target="_blank" rel="noopener">statement</a>.</p>
<div class="ad_two clear">
<p>&nbsp;</p>
<div id="00000001-f9c79ac2-4c78-41c9-988f-5bf30445c87d" class="_ap_apex_ad" data-section="00000001-f9c79ac2-4c78-41c9-988f-5bf30445c87d" data-orig-id="91f17109-a8af-44f1-94fb-81d68f1fd2c4" data-render-time="1656398902292" data-ap-network="adpTags" data-refresh-time="1656399141255" data-timeout="660">
<div id="ADP_37020_responsivexresponsive_00000001-f9c79ac2-4c78-41c9-988f-5bf30445c87d"></div>
</div>
<p>&nbsp;</p>
</div>
<p>The Canadian cybersecurity company said it identified and disrupted four separate security incidents, three of which occurred at the end of March. Targeted entities include a U.S.-based aerospace company, an accounting business located in the U.K., a law firm, and a staffing agency, both based out of Canada.</p>
<p>The malware, suspected to be the handiwork of a threat actor called Golden Chickens (aka <a href="https://malpedia.caad.fkie.fraunhofer.de/actor/venom_spider" target="_blank" rel="noopener">Venom Spider</a>), is a stealthy, modular backdoor suite capable of stealing valuable information and conducting lateral movement across the compromised network.</p>
<p>&#8220;More_eggs achieves execution by passing malicious code to legitimate windows processes and letting those windows processes do the work for them,&#8221; Keplinger said. The goal is to leverage the resumes as a decoy to launch the malware and sidestep detection.</p>
<p>The role reversal in the modus operandi aside, it&#8217;s unclear what the attackers were after in light of the fact that the intrusions were stopped before they could bring their plans to fruition. But it&#8217;s worth pointing out that more_eggs, once deployed, could be used as a jumping off point for further attacks such as information theft and ransomware.</p>
<p>&#8220;The threat actors behind more_eggs use a scalable, spear-phishing approach that weaponizes expected communications, such as resumes, that match a hiring manager&#8217;s expectations or job offers, targeting hopeful candidates that match their current or past job titles,&#8221; Keplinger said.</p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on <a class="ProsemirrorEditor-link" href="http://thehackernews.com" target="_blank" rel="noopener">thehackernews.com</a> on April 21, 2022. Written by Ravie Lakshmanan.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/hackers-sneak-more_eggs-malware-into-resumes-sent-to-corporate-hiring-managers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Some companies still fire people for getting phished. It doesn’t make them more secure.</title>
		<link>https://scaletotheone.com/some-companies-still-fire-people-for-getting-phished-it-doesnt-make-them-more-secure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=some-companies-still-fire-people-for-getting-phished-it-doesnt-make-them-more-secure</link>
					<comments>https://scaletotheone.com/some-companies-still-fire-people-for-getting-phished-it-doesnt-make-them-more-secure/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 22 Jun 2022 09:42:29 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://scaletotheone.com/?p=207</guid>

					<description><![CDATA[Phishing attacks are on the rise, and a small but significant slice of employers are taking a hard-line stance, disciplining or even firing employees who fall for one of these email scams.]]></description>
										<content:encoded><![CDATA[<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">A former employee at Cooley LLP, one of the largest law firms in the world, was shocked to hear during a cybersecurity training in 2017 that the company had a three-strike policy for falling for phishing attempts.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“It was scary. I remember asking our IT guy about it, like ‘Can I really get fired?’ and he was super serious about it,” said the former employee, who spoke on the condition of anonymity to discuss internal company policies. (Grid contacted Cooley on April 11, seeking comment. A Cooley spokesperson replied after publication and denied that the firm’s “training on avoiding phishing traps” included “threats of termination,” now or in 2017. “We do not believe in instilling fear as a training tool,” the person said.)</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Security professionals say that such harsh policies like this aren’t limited to any one industry — and many of these experts are baffled that the practice continues. They say the idea that setting harsh penalties can prevent employees from clicking on a deceptive, dangerous link or file is misguided. Cybercriminals’ phishing attempts have grown more sophisticated, making it harder for a worker to recognize a scam email. And imposing harsh penalties for honest blunders can decrease employees’ loyalty, undermining a company’s culture and productivity.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“Sacking people for opening a link is vile and disgusting because it’s nobody’s fault for opening a deceptive link or download — it’s virtually impossible to stop a persistent targeted attack,” said Paul Walsh, CEO of the cybersecurity company MetaCert, which focuses on phishing.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Some companies take the shaming approach to extremes, even putting up signs in office kitchens naming employees who fall for a phishing attack, said Karen Renaud, a computer science professor at the University of Strathclyde in Scotland who studies cybersecurity behaviors. She and her colleagues published a study last year drawing on information from more than 100 people who personally experienced a cybersecurity incident at work or knew someone who had.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Renaud began studying how companies react to phishing attempts and attacks after hearing about a lawsuit in Edinburgh. A woman received an email, purportedly from her line manager, that instructed her to <a href="https://www.bbc.com/news/uk-scotland-glasgow-west-47135686" target="_blank" rel="noopener">transfer almost £200,000 to pay an invoice</a>. The woman emailed her line manager back to ask if she should proceed, and the attacker posing as her manager responded affirmatively. The woman transferred the funds. When her employer discovered what had happened, they fired her on the spot and took her to court for the money that was lost.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“What people were telling us, it really confirmed that companies really think that shame is a tool that they can wield here,” said Renaud of the survey she and her colleagues undertook, “not actually thinking about the long-term consequences of what they’re doing.”</p>
<h3 class="heading__StyledHeading-vsy2go-0 jRmIei">A frowned-upon practice</h3>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Social engineering attacks, a category that includes phishing, seek to manipulate people to take actions that benefit the attacker — such as sending money or clicking on a link that surreptitiously installs malware. The results can be disastrous. In 2013, a phishing attack on an HVAC company <a href="https://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/" target="_blank" rel="noopener">led to a massive data breach at Target</a> involving credit card and personal data from more than 100 million people. The breach began when an employee at the HVAC company, a Target contractor, clicked on a link that delivered malware.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Attackers also capitalize on events in the news. After the Colonial Pipeline ransomware attack, hackers <a href="https://www.zdnet.com/article/hackers-use-colonial-pipeline-ransomware-news-for-phishing-attack/" target="_blank" rel="noopener">sent phishing emails</a> purporting to be from cybersecurity firms encouraging clients to update their ransomware protections. Anyone who clicked the link would inadvertently download ransomware.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Phishing attacks have increased steadily in recent years, particularly during the pandemic, as many sectors transitioned to remote work. A recent <a href="https://www.tessian.com/resources/psychology-of-human-error-2022/" target="_blank" rel="noopener">survey of 2,000 workers</a> by cybersecurity firm Tessian said that 26 percent had fallen for a phishing scam at work in the past 12 months.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Grid viewed a set of training videos from the security company KnowBe4 that warn of potentially stark consequences for victims of phishing attacks. “A successful social engineering attempt could cost organizations millions of dollars in either theft, loss of production or damage to their reputation,” the videos’ narrator said in a voice-over. “What happens to the employees who fall for a social engineering attack? Well, they might get fired or have to pay for damages.”</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Firing an employee for falling for a phishing scam is not illegal. But professionals say it can undermine trust between security teams and regular employees that can be counterproductive by reducing employees’ willingness to flag potential security risks or ask questions.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">KnowBe4′s cybersecurity training options include versions with language about potential termination of employees and payment of monetary damages because some of its clients have such policies in place and need training that reflects that, said Perry Carpenter, KnowBe4′s chief evangelist and strategy officer.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“We know that there are companies out there that have that as a policy — even when our language and people like me, that represent [KnowBe4], can say over and over and over again that this should not be a punitive type of thing,” he said.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Walsh said that approach also ignores a key question: Why aren’t security vendors doing a better job keeping such emails from reaching clients’ inboxes?</p>
<h3 class="heading__StyledHeading-vsy2go-0 jRmIei">“Draconian methods”</h3>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Organizations who attempt to increase compliance through fear and penalties will fail, said Parham Eftekhari, executive vice president at the CyberRisk Alliance, an organization for cyber professionals. “It’s absolutely not productive,” he said. Eftekhari said that developing a security-centric culture can be done only by encouraging trust between a company’s IT staff and broader workforce through continuous education, gamification of training and nonthreatening feedback.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">In some cases, such policies may be designed to meet the requirements of insurers writing policies that cover damage from cyberattacks. Insurers will often seek to deny such claims if a breach or attack was caused by human error, Carpenter said.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“When you look at these draconian methods that some organizations use, where they try to put the employee on the hook for that, that’s for a recovery of funds,” he added.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">Gabriel Friedlander, CEO of security-training firm Wizer, said that in his experience, companies that fire employees who fall for phishing attacks aren’t limited to any one industry. He has seen both large and small companies adopt such policies and said it’s a reflection of management style.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“Some people believe in the carrot-and-stick approach and have hard, hard policies,” said Friedlander. “It comes down to the person running the show, to be honest.”</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">That can sow distrust within companies. “Instead of the mindset of ‘It’s us against the bad guys,’ it becomes the employer against the employee, who is now the bad guy,” said Marc Dupuis, a professor of information science at the University of Washington and one of Renaud’s co-authors. “It really flips the script in a negative way that just isn’t fair and isn’t true.”</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">And employers run the risk of being sued, or held legally liable, for firing an employee over falling for a phishing scam. In these situations, Friedlander said, the victim is the person who was the subject of the attack, and firing them could be a form of retaliation.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph">“It’s like putting the victim of a car crash in jail,” he said.</p>
<p class="ArticleBody__StyledText-sc-1eiq3o0-0 dViTxy body-paragraph"><i>This article has been updated. Thanks to Lillian Barkley for copy editing this article.</i></p>
<p>&nbsp;</p>
<p data-pm-slice="1 1 []"><em>This article was originally published on <a class="ProsemirrorEditor-link" href="https://threatpost.com/" target="_blank" rel="noopener">grid.news</a> on April 19 2022. Written by Benjamin Powers.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://scaletotheone.com/some-companies-still-fire-people-for-getting-phished-it-doesnt-make-them-more-secure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
