Page 9 - AccumeView - September 2019
P. 9

Social Engineering













            LookBack malware targeting utility sector - Three U.S. firms in the utility sector were hit with a spear
            phishing campaign in mid-July with the emails containing a malicious Word document that can contain
            and can install the new remote access trojan LookBack. The Proofpoint Threat Insight Team’s initial take
            is the attack was the work of a nation-state sponsored actor based on the macro used and comparing it
            to other previous attacks conducted by such groups. The social engineering behind the emails, which
            were sent between July 19-25 makes it appear as if the correspondence comes from a domain owned by
            the U.S. National Council of Examiners for Engineering and Surveying and includes that organization’s
            logo. The email itself pretends to contain a failed examination result from the National Council of
            Examiners for Engineering and Surveying, a subject likely to pique someone’s interest and be opened,
            Proofpoint said..

                   Source: https://www.scmagazine.com/home/security-news/malware/lookback-malware-
                   targeting-utility-sector/



            New Phishing Campaign Bypasses Microsoft ATP to Deliver Adwind to Utilities Industry -            The
            CofenseTM Phishing Defense CenterTM has observed a new phishing campaign that spoofs a PDF
            attachment to deliver the notorious Adwind malware. This campaign was found explicitly in national grid
            utilities infrastructure. Adwind, aka JRAT or SockRat, is sold as a malware-as-a-service where users can
            purchase access to the software for a small subscription-based fee.
                   Source: https://cofense.com/new-phishing-campaign-bypasses-microsoft-atp-deliver-adwind-
                   utilities-industry/



            APT34 spread malware via LinkedIn invites - FireEye researchers identified a phishing campaign
            conducted by the cyberespionage group APT34 masquerading as a member of Cambridge University to
            gain their victim’s trust to open malicious documents. Researchers noticed the campaign in late June
            2019 using LinkedIn professional network invitations to deliver the malicious documents that included
            the use of three new malware families according to a July 18 blog post.

                   Source: https://www.scmagazine.com/home/security-news/apts-cyberespionage/fireeye-
                   researchers-identified-a-phishing-campaign-conducted-by-apt34-masquerading-as-a-member-of-
                   cambridge-university-to-gain-their-victims-trust-to-open-malicious-documents/




            Phishing attacks jump by 21% in latest quarter, says Kaspersky - Cybercriminals continually look for
            more innovative and effective ways to deliver spam and launch phishing attacks. By developing new
            methods of attack and improving old ones, they're able to create more sophisticated and therefore more
            successful methods of targeting unsuspecting victims. That's one reason why both spam and phishing
            attacks rose during the second quarter of 2019 compared with the same quarter last year, according to a
            report by Kaspersky.

                   Source: https://www.techrepublic.com/article/phishing-attacks-jump-by-21-in-latest-quarter-
                   says-kaspersky/

                                                    www.accumepartners.com
   4   5   6   7   8   9   10   11   12   13   14