Page 9 - Threat Intelligence 7-29-2019
P. 9

Social Engineering














             Warning As Iranian State Hackers Target LinkedIn Users With Dangerous New Malware - The
             multidimensional cyber warfare playing out in the Middle East has taken a shape we have not seen
             at this scale before—a mix of military offensive and defensive capabilities with state-sponsored
             attacks on civilian targets. With cyber warfare becoming "an interchangeable battlefield tool," an
             attack in one domain can lead to retaliation in another. And the catalyst has been the continuing
             escalation of tensions between the U.S. (and its allies) and Iran. Now, U.S. cybersecurity firm FireEye
             has warned of a malicious phishing campaign that it has attributed to the Iranian-linked APT34—
             whose activity has been reported elsewhere as OilRig and Greenbug. The campaign has been
             targeting LinkedIn users with plausible but bogus invitations to join a professional network and
             emailed attachments laced with malware that seeks to infect systems with a hidden backdoor and
             steal data and credentials.
                    Source: https://www.forbes.com/sites/zakdoffman/2019/07/22/critical-linkedin-warning-as-
                    irans-hackers-send-fake-invites-laced-with-malware/#558c009d6ac1



             Microsoft Office 365 Users Targeted by Malware Disguised as Browser Update - malware campaign
             whose purpose is to eventually infect devices with the TrickBot password-stealing Trojan. A fake
             Office 365 page which looks just like Microsoft’s serves a fake browser update that is used to deploy
             the malicious payload. Discovered by the experts at MalwareHunterTeam, the page was specifically
             designed to look as legitimate as possible, so it even includes links that point to Microsoft domains.
             However, a few seconds after landing on the page, users are provided with a warning that is adapted
             to their browser and which recommends downloads and installing an update. Both Google Chrome
             and Mozilla Firefox appear to be targeted with such custom warnings.
                    Source: https://news.softpedia.com/news/microsoft-office-365-users-targeted-by-malware-
                    disguised-as-browser-update-526775.shtml



             40% of enterprises experienced Office 365 credential theft, report finds - While 80% of
             organizations use more than the default security provided by Office 365, additional measures are
             needed to secure enterprise email. Despite the promise of increased security cloud-hosted email
             solutions are thought to provide, an eye-watering 40% of enterprise respondents indicated that
             Office 365 login credentials have been compromised, according to a survey of 300 companies with
             more than 5,000 employees in the US and UK conducted by Cyren and Osterman Research,
             published Monday. On average—across all organizations surveyed—Office 365 credentials were
             compromised 3.7 times, with incidents more likely (54%) in the UK than in the US (34%).
                    Source: https://www.techrepublic.com/article/40-of-enterprises-experienced-office-365-
                    credential-theft-report-finds/









                                                    www.accumepartners.com                                            9
   4   5   6   7   8   9   10   11   12   13   14