STE WILLIAMS

How Hackers Emptied Church Coffers with a Simple Phishing Scam

Cyber thieves aren’t bound by a code of ethics. They look for weak targets and high rewards, which is exactly what Saint Ambrose Catholic offered.

The approach was simple, a combination email scam and social engineering phone call. All it took was a call to St. Ambrose Catholic Parish, claiming to be Marous Brothers Construction, a company working on a church renovation project for the past two months. But the phone call wasn’t from Marous Brothers Construction. The scammers told the church that payments were late.

A statement from the Saint Ambrose Catholic Parish’s Father Bob Stec said:

On Wednesday, Marous Brothers [construction] called inquiring as to why we had not paid our monthly payment on the project for the past two months totaling approximately $1,750,000. This was shocking news to us, as we have been very prompt on our payments every month and have received all the appropriate confirmations from the bank that the wire transfers of money to Marous were executed/confirmed.

The scammers convinced the church that the construction company they hired had changed their bank. Hindsight being 20/20, whoever received the call should have confirmed with another source. But they didn’t. Father Stec explained:

Upon a deeper investigation by the FBI, we found that our email system was hacked and the perpetrators were able to deceive us into believing Marous Brothers had changed their bank and wiring instructions. The result is that our payments were sent to a fraudulent bank account and the money was then swept out by the perpetrators before anyone knew what had happened.

According to the FBI, the criminals breached the church’s email account, then began a waiting game during which the hackers sat back and read all of the conversations in the inbox. Eventually, they were able to glean enough information to convince the church to wire them money. Before the church realized, it was out $1.75 million in the middle of a major renovation, and all it took was a few emails, some Photoshop skills, and a phone call to derail the good intentions of the parish.

Protect Thyself: Even the Sacred Are at Risk
In 2019, even a cyberattack on a church shouldn’t surprise anyone. According to the FBI, cybercrime losses doubled in 2018 over the previous year. It wouldn’t be shocking, based on trends, for 2019 to up the ante even further. With cybercrime prevention all over the news, more individuals and organizations are realizing that they must get proactive at protecting themselves; this story should serve as a warning to all organizations, even those not operated for profit or that are religiously affiliated. 

A good first step is to shift your security strategy from cybersecurity to cyber resilience, which is essentially a change in emphasis from reactive to proactive. The important point is not to be intimidated by the universe of potential security processes, tools, and strategies. Start with a few simple things.

  • Be brilliant at the basics. Simply put, this means doing the small things right, such as staying on top of routine maintenance such as patches, updates, and access permissions.
  • Embrace the cloud for security. Take advantage of the secure storage space offered by cloud providers to make data less accessible to cybercriminals.
  • Implement data-centric security by encrypting data and restricting access to sensitive information. 
  • Demand application security by design. Implement best security practices and test them often. With the continuing popularity of phishing, experts would recommend employee training in how to recognize attacks, followed by test fake attempts to evaluate response.
  • Engage in proactive defense. A proactive defense includes a firewall, security software, and a strong virtual private network (VPN). The first two provide a protective perimeter that detects, blocks, and removes inbound malware and viruses. The latter creates an anonymous, encrypted internet connection that makes it harder for snoopers to find, intercept, or read data. 

Saint Ambrose lost nearly $2 million as a result of the cyberattack, and may or may not get it back. The cost to prevent it could have been as simple as:

  • A few hours of paid time for a cybersecurity consultant
  • Employee training on how to not get phished
  • A few hundred dollars’ worth of software (firewall, VPN, etc)

Related Content:

Sam Bocetta is a freelance journalist specializing in U.S. diplomacy and national security, with emphases on technology trends in cyber warfare, cyber defense, and cryptography. Previously, Sam was a defense contractor. He worked in close partnership with architects and … View Full Bio

Article source: https://www.darkreading.com/network-and-perimeter-security/how-hackers-emptied-church-coffers-with-a-simple-phishing-scam/a/d-id/1334971?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

6 Security Tips That’ll Keep the Summer Fun

Taking some time off this summer? Before you head out on vacation, make sure your devices and apps are also ready. PreviousNext

Image Source: Adobe Stock: pogonici

Image Source: Adobe Stock: pogonici

Summer has arrived and it’s time for a vacation — but don’t forget that hackers are lurking, just waiting for you to let your guard down.

Plenty of people do, says McAfee, which in a recent blog reported that 42% of Americans either do not check the security of their Internet connections or they willingly connect to an unsecured network while traveling.

Gary Davis, chief consumer security strategist at McAfee, adds that nearly two in five Americans have been putting companies at risk of cyberattacks because they connect their work devices to unsecure Wi-Fi networks while traveling.

As always, common sense will go a long way toward staying safe while on the road. Here are six tips that will keep you safe and worry-free when you’re ready to take some well-deserved time off.

 

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full BioPreviousNext

Article source: https://www.darkreading.com/threat-intelligence/6-security-tips-thatll-keep-the-summer-fun-/d/d-id/1335003?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cost per Cyberattack Jumps to $4.6M in 2019

From 2018 to 2019, the percentage of cyberattacks costing $10 million or more nearly doubled, hitting 13%.

The cost of cyberattacks spiked more than $1.5 million in the past year, going from $3 million per incident in 2018 to $4.6 million in 2019. Pricier breaches are becoming more frequent: The percentage costing $10 million or more nearly doubled from 7% in 2018 to 13% this year.

Radware researchers who compiled the report “2019 C-Suite Perspectives: From Defense to Offense, Executives Turn Information Security into a Competitive Advantage” found there are four main business impacts after a cyberattack: customer loss (45%), brand reputation loss (44%), and revenue loss and operational effects (32% each). Cybersecurity has also become an executive issue, with 72% of executives reporting it’s on every board meeting agenda.

Respondents are now working to meet the expectations of an increasingly cyber-savvy customer base; people want to know what companies are doing to protect their information. Three-quarters of executives say security is a key part of their marketing messages. Half of businesses sell dedicated security products and services; 41% offer security features as add-ons.

Still, companies have a long way to go. Seventy percent of senior executives polled in North America and Europe say their organization experienced a cyberattack in the 12 months prior. Three-quarters of those in EMEA admit their networks are vulnerable to cyberattacks.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/perimeter/cost-per-cyberattack-jumps-to-$46m-in-2019/d/d-id/1335008?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Millions of Venmo transactions scraped (again)

A year ago, a researcher whipped up a bot to automatically tweet out the profile photos of anybody making drug deals on Venmo.

Or, to be more specific, profile photos and first names of people whose public-by-default Venmo transactions include words such as heroin, marijuana, cocaine, meth or speed; emojis that denote drugs; or non-drug-related words such as sex, porn or hookers. Joel Guerra, the creator of the Who’s buying drugs on Venmo? bot, got the idea after seeing Venmo’s API publicly posted to Twitter.

He built on the work of researcher Hang Do Thi Duc, who had analyzed a year’s worth of data from Venmo’s public API to find out what people are buying, who they’re sending money to, why they’re sending money, first and last names, profile pictures, times of the transactions, messages attached to the transactions, and more.

Using 207,984,218 transactions, she chronicled Venmo users’ lives: everything from cannabis sales to budding romances, to breakups, to how much pizza they ate and how much Coke they bought to wash it down.

Here it is, one year later, and little has changed. After last year’s privacy kerfuffle, all Venmo did was slow down the rate that data can be scraped and remove a warning it used to show users when they switched their default privacy settings from public to private…

…which, if you haven’t done yet, we urge you to do (here’s how), considering that a) why would you want your financial transactions to be public in the first place? and b) yet another data scraper has squeezed and publicly posted another ~7 million transactions out of Venmo.

On Friday, TechCrunch reported that computer scientist Dan Salmon had scraped those transactions, which occurred over a six-month period.

Salmon, who published the data on GitHub, said that he did it to let Venmo users know that their dirty laundry’s hanging on the line for everybody to see, and grab, and make use of for whatever purposes for which people use publicly available data:

I am releasing this dataset in order to bring attention to Venmo users that all of this data is publicly available for anyone to grab without even an API key. There is some very valuable data here for any attacker conducting OSINT [open-source intelligence] research.

Salmon is about the umpteenth person to sound the alarm over Venmo’s approach to privacy. Dan Gorelick did so back in 2016, explaining how to open up the Chrome dev console to watch Venmo dynamically load live data… live data that he figured out how to trace to user transactions.

As TechCrunch notes, since then, other researchers, such as Johnny Xmas, have said that Venmo restricted its API to limit the historical data that can be collected. It can’t have throttled things much, though, given that its most recent limits still allowed Salmon to access 40 transactions per minute: what Salmon reportedly calculated to be about 57,600 scraped transactions each day.

What to do?

Salmon is “highly” encouraging Venmo users to switch their accounts to private, and we here at Naked Security agree. Go to Settings Privacy and select “Private” as well as Past Transactions Change All to Private. You can see the instructions in screenshot form here.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/PBWgcYb-xFM/

Spin the wheel and find today’s leaky cloud DB… *clack clack… clack* A huge trove of medical malpractice complaints

In what has become a depressingly common occurrence, the personal information of hundreds of thousands of people may have fallen into the wrong hands because yet another organization did not secure a cloud-hosted database.

This time around, social media marketing house xSocialMedia has been accused of failing to set up proper protections on multiple databases tracking the activity of advertising campaigns for medical malpractice lawyers. That configuration blunder seemingly left the data silos facing the public internet for anyone to find and rifle through.

Researchers at vpnMentor, who specialize in discovering and documenting insecure cloud servers, say they were able to get into xSocialMedia’s databases and view the personal information of people who had clicked on ads on Facebook for legal advice or class action claims for things like botched surgeries and defective implants.

Because of the nature of the campaigns, the biz tended to gather particularly sensitive information from netizens clicking through the promotions. The database of collected information, containing some 150,000 records, included things like names, addresses, phone numbers, and partial medical history.

“The ads that xSocialMedia post on Facebook lead users to a variety of ‘injury-check.com’ domains, depending on their specific ailments. Examples include ied-fund.injury-check.com and ivcfilter-risk.injury-check.com,” staff at vpnMentor explained.

“xSocialMedia lists 10 different kinds of injury lawyers that they work with. Once Facebook users have entered one of the injury-check.com domains, they are encouraged to fill out a form with their medical data to see if they qualify for legal assistance.”

It only gets worse from there. On another database, the vpnMentor crew say they also found copies of the testimony some plaintiffs had given as part of their medical malpractice suits. That testimony would in some cases include personal and private medical information, or in some cases a recounting of traumatic incidents.

Crucially, we’re told:

The injuries described in the database vary from combat injuries suffered by American veterans to injuries caused by medical devices, pesticide use, medication side-effects, and defective baby products.

The security blunder may also be a serious breach of US medical privacy laws.

“This data breach has far-reaching consequences, especially because of the sensitive health data included in xSocialMedia’s database. Medical records are heavily protected in the US by HIPAA laws,” vpnMentor staff noted in their summary.

“Practitioners and other healthcare providers cannot release any identifying information about their patients without written permission.”

xSocialMedia has yet to return a request for comment on the report. The vpnMentor team says it discovered the database on June 2, reported it on June 5, and by June 11 the offending server was locked down. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/18/xsocialmedia_cloud_leak/

Delicious irony: Hacked medical debt collector AMCA files for bankruptcy protection from debt collectors

The healthcare debt collector ransacked by hackers, who gained access to millions of patients’ personal information, has filed for bankruptcy protection.

Retrieval Masters Creditors Bureau, aka American Medical Collection Agency, told the Southern New York US District Court this week that it was seeking chapter 11 bankruptcy protection. That means it’s asked a judge to shield it for up to 18 months from creditors’ lawsuits, in which money owed is demanded, while it gets its finances in order. The biz lists its address as being in Elmsford, New York, a town about 27 miles from NYC.

The filing [PDF] comes after it emerged AMCA’s patient databases, which stored personal and banking details of millions of folks, were infiltrated by crooks. The agency had been recruited by medical testing companies to collect payments from their customers, which is why it was storing their personal records on its subsequently hacked systems.

Those testing labs included Quest Diagnostics (12 million records exposed), LabCorp (8 million), BioReference Laboratories (423,000), Carecentrix (500,000), and Sunrise Laboratories, adding up to more than 20 million records, including several hundred thousand payment card details, at miscreants’ fingertips. The network intrusion went undetected for some eight months.

In the fallout of the hack, Quest and Labcorp bore the brunt of public scrutiny and scorn from US Congress, however, as we now see, AMCA has also taken a hit from the cyber-heist, one significant enough to put its future in doubt.

Far from a filing of insolvency, chapter 11 bankruptcy allows a company to shore up its finances without the threat of creditors and aggressive collection agencies such as, ironically enough, AMCA, extracting any money owed.

According to the chapter 11 filing, AMCA says it has somewhere between one and ten million dollars in liabilities, and the same range of money in assets. AMCA noted that it plans to pay off its creditors, estimated to number anywhere from 100 to 199 different people and companies.

The list of those creditors is fairly mundane and seems to mostly be bills for day-to-day activities.

For example, AMCA says it owes IBM $15,299.64 for IT services, and Cablevision is owed $7,679.02, presumably for internet service. The filing makes no mention of Quest Diagnostics, LabCorp, or any of the other customers whose patient data was illegally accessed. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/18/hacked_amca_bankruptcy_protection/

Awoogah! Awoogah! Firefox fans urged to update and patch zero-day hole exploited in the wild by miscreants

Mozilla has released an emergency critical update for Firefox to squash a zero-day vulnerability that is under active attack.

The Firefox 67.0.3 and ESR 60.7.1 builds include a patch for CVE-2019-11707. The vulnerability is a type confusion bug in the way Firefox handles JavaScript objects in Array.pop. By manipulating the object in the array, malicious JavaScript on a webpage could get the ability to remotely execute code without any user interaction.

This is a bad thing.

What’s worse, Mozilla says it has already received reports that the flaw is being actively exploited in the wild by miscreants, making it critical for users to install the latest patched versions of the browser.

Fortunately, because Mozilla automatically updates Firefox with new patches and bug fixes, both Linux, Mac, and Windows PC users can install the patch with a simple browser restart.

Credit for the discovery and disclosure of the bug was given to Samuel Groß of Project Zero. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/18/firefox_zero_day_patch/

Google Targets Deceptive Sites with New Chrome Tools

A new extension and browser alert aim to help users report deceptive sites and prevent them from encountering fraud.

Today Google announced two new features intended to protect Chrome users from deceptive sites, which are becoming a broader threat as cybercriminals advance their fraud strategies.

Google Safe Browsing has been blocking phishing attacks for more than a decade, the company reports in a blog post on the updates. It automatically analyzes websites known via Google Search Web crawlers and creates lists of sites considered deceptive or dangerous. The new Suspicious Site Reporter extension lets users help to identify and report suspicious sites.

Those who install the extension will see an icon appear when they arrive on a potentially malicious website, as well as more details about why the site was deemed suspicious. If they click the icon, users can report these unsafe sites to Safe Browsing for further investigation.

Google is also taking steps to weed out deceptive websites with confusing URLs — for example, go0gle[.]com. Chrome 75 will bring a new warning to direct users away from these URLs, which many often click without taking a closer look at the text. The warning compares the URL of the page someone is visiting with URLs of pages the person previously visited. If the URL looks similar and may cause confusion, an alert displays a warning to help the user virtually relocate to safety.

(Suspicious Site Reporter. Image: Google)

(Suspicious Site Reporter. Image: Google)

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/google-targets-deceptive-sites-with-new-chrome-tools/d/d-id/1334994?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

The Evolution of Identity

How data and technology can help businesses make the right fraud decisions, protect people’s identities, and create an improved customer experience.

Identity theft and fraud have been around for decades. The schemes and approaches have just shifted and evolved over time — particularly as of late. What started as the impersonation of an individual through physical means — beginning with a stolen wallet or identification card — has transformed into digital fraud, which is a much more sophisticated blueprint. With most people performing life’s daily tasks online, the general population has become more exposed and susceptible to these attacks.

As our society embraces both technology and the digital lifestyle, businesses and agencies need to be more responsible about the protection of people’s digital identities and information. Unfortunately, there’s a profound change that makes that objective increasingly difficult. In the past, the foundation of a person’s identity has always been rooted in personally identifiable information (PII) such as name, address, date of birth, and Social Security number. With today’s influx of data breaches, and the emergence of a sophisticated Dark Web marketplace for nefarious data exchange and sale, these core elements of a person’s identity have more than likely been exposed multiple times. So much so, in fact, that we should now assume all PII has been compromised. Yet, many businesses still rely on these foundational components to verify, authenticate, and uniquely identify and inventory individuals when conducting transactions online.

With the unlawful exposure of PII, criminals today have direct access and the means to manipulate and assume identities, create wholly new and fraudulent ones, take over online accounts, and fraudulently purchase hundreds of thousands of dollars in products and services. Businesses that rely on these data elements alone can no longer confidently verify an individual is who they say they are. In fact, the illegitimate availability of personal information has even made passwords unreliable (because people use the same password for multiple online accounts). And yet, we know that many businesses still use passwords as an authentication measure.

Protecting PII Is Not Enough
Moving forward, PII should only serve as a definitional element of a person’s identity. Just as criminals continue to evolve their fraud strategies and tactics, the definition of an identity needs to be fluid and proportional to the type of relationship a business has with a consumer and the means by which they interact. This means businesses and agencies should continuously explore innovative ways to recognize, identify, and assess individual risk in order to both remove friction for legitimate customers and to stay ahead of equally innovative fraudsters. To successfully adapt to the new digital environment, businesses and agencies need to maximize technology and innovation, as well as the expertise of their own internal workforce.

As odd as it may sound, fraud prevention and identity management need to be about more than the protection of data and information. Businesses and agencies need to factor in the customer experience as foundational to operations and a means to gain competitive advantage. According to Experian’s 2019 Global Identity Fraud Report, 74% of consumers see security as the most important element of their online experience, followed by convenience. 

People expect convenience, and will look for alternatives when it is not provided. It’s part of the reason for the near-universal adoption of technology and a digital environment. The next wave of identity- and fraud-prevention tools must minimize the effort required of a consumer without passwords, which require remembering dozens of different passwords and the painstaking task of unlocking an account, should a person forget.

The future of identity should be rooted in intelligence, passive recognition and authentication, and an improved customer experience. Using advanced analytics, such as machine learning and artificial intelligence, businesses already have the ability to detect patterns and anomalies that may indicate a fraudulent identity or transactional attempt. Additionally, the technology and infrastructure exists for businesses to leverage advanced innovation, such as physical and behavioral biometrics (facial recognition, how a person holds a phone or inputs data into an online form) device intelligence (device prints, characteristics, and histories), document validation and verification (autofill, facial recognition, and comparison) and digital behavior (transaction behavior, transaction velocity). In fact, the report shows that 77% of consumers are more confident in the security of a financial institution when physical biometrics are present.

Authentication’s New Frontier
The true power behind these innovative approaches is the behind-the-scenes nature of the authentication process. Many of these identity verification techniques work without the knowledge of the individual. For example, a person purchasing a new laptop via their mobile phone may need to use their fingerprint to approve the purchase, but there are secondary and tertiary checks in the background. Is the individual holding the phone in a typical manner? Is the device connected to an often-used IP address? Is the transaction part of the individual’s normal purchasing behavior? Is the personal information provided or captured being used consistently and in a low-risk fashion across time and disparate applications?

Separately these techniques can help minimize fraud. But together, the power of identity management and fraud prevention increases significantly. Businesses and agencies can be more confident during onboarding and ongoing authentication processes while ensuring a higher-quality customer experience for the vast majority of interactions which are legitimate.

Keep in mind that a silver bullet for fraud prevention doesn’t exist. But together these techniques and attributes, when contextually layered and invoked, can help create a new frontier of authentication and identity management. Fraudsters are quick to evolve, so businesses and agencies need to stay a step ahead. Data and technology can help businesses make the right fraud decisions, protect people’s identities, and create an improved customer experience. The foundational elements of a person’s identity need to be reassembled, and the innovation is in place do that.

Related Content:

Kathleen Peters is Experian’s senior vice president and head of fraud identity, where she is responsible for the strategic direction of the company’s fraud and identity products and capabilities. In 2018 and 2019, Kathleen was named a “Top 100 Influencer in Identity” by One … View Full Bio

Article source: https://www.darkreading.com/perimeter/the-evolution-of-identity/a/d-id/1334969?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Advertising Alliance Plans Protocols to Reduce Dangerous Content

The Global Alliance for Responsible Media will seek ways to clamp down on dangerous and fake content.

Some of the largest advertisers in the world have joined together to push major social media and advertising platforms to reduce fake and dangerous online content.

The Global Alliance for Responsible Media includes advertisers, advertising agencies, and advertising platforms. According to a statement by the group, the initial focus will be on content dangerous to society, such as that promoting or recruiting for terrorism. The alliance will work to to reduce the impact of such material by developing protocols and processes that platforms can use to police themselves.

Members of the alliance include Procter Gamble, General Mills, Mastercard, Facebook, Twitter, Google, Omnicom Media Group, and GroupM.

The alliance is scheduled to hold their first face-to-face meeting in Cannes, France, on Wednesday.

Read more here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/advertising-alliance-plans-protocols-to-reduce-dangerous-content/d/d-id/1334997?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple