January 15 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
What is identity theft, and how can you protect yourself from it?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Journals can be accessed by title from an alphabetical list. For this exercise, click on ‘L’ from the A-Z list. Note: there also is a View complete list.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
December 4 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
December 11 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
January 21 st 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Important Information Provided by Information Technology Center
I S P S loss Prevention.
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Business Compromise and Cyber Threat
What is Phishing? Pronounced “Fishing”
Spear Phishing Awareness
Presentation transcript:

January 15 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED

Current Threats  Investigation Update  New Phishing Campaigns  Payment Advice – Macro Malware  ‘Scanned Document’ from MRH Solicitors  Avoid Being a Victim of Phishing  CEO Fraud and ‘Whaling’  Legacy Systems, Old Hardware and Security Action Fraud Reports from the South West Region  PBX Dial Through Miscellaneous  CiSP  New non-protectively marked briefing NOT PROTECTIVELY MARKED

Investigation Updates:  The South West Regional Cyber Crime Unit has recently completed an investigation into a series of cyber crime and fraud offences targeting a family-run farming business based in Gloucestershire and a transportation company based in London.  The offenders set up websites in the name of the legitimate companies and then used those names, details and associated addresses to try to obtain credit with a variety of suppliers for a range of high value goods.  These attempts were successful when suppliers did not complete full credit reference checks. They also used a complex network of telephone numbers and addresses to further mask their identities. NOT PROTECTIVELY MARKED

Investigation Updates Continued…  To reduce the chances of becoming a victim of this type of offence please consider the following: I. Be aware of your online digital footprint, especially when you don’t have a company website. Are others setting up web sites purporting to be you? Try Google searching you/ your company. II. If you are responsible for conducting credit checks on prospective customers, consider what measures you take to verify the legitimacy of the applicant. Do you use the details provided by them to check on them? Do you use the telephone numbers they provide to make contact? Consider using independently verified details (e.g. from Companies House) to contact the prospective customer to confirm their identity.  If you suspect that you have been a victim of similar offences then please report to Action Fraud. NOT PROTECTIVELY MARKED

Payment Advice – Macro Malware :  We have received a recent report from an organisation in Bristol regarding a fake containing a malicious Word document. This appears to be from a compromised address. If you receive this, do not open the attachment  Description: Bhavani Gullolla Payment Advice – macro malware.  Headers: From: Bhavani Gullolla Subject: Payment Advice –  Attachment filename: doc NOT PROTECTIVELY MARKED  Message Body: Dear Sir/Madam, This is to inform you that we have initiated the electronic payment through our Bank. Please find attached payment advice which includes invoice reference and TDS deductions if any. Transaction Reference : Vendor Code : Company Code :WT01 Payer/Remitters Reference No : Beneficiary Details : / Paymet Method : Electronic Fund Transfer Payment Amount : Currency :GBP Processing Date :11/01/2016 For any clarifications on the payment advice please mail us at OR call Toll Free in India between 9:00 am to 5:00 pm IST (Mon-Fri) OR contact person indicated in the purchase order. Regards, VHD Signature

Payment Advice – Macro Malware :  This Word attachment contains a malicious macro which is aimed at Windows and Microsoft Office users.  The Word document, once opened, is seen to download either the Dridex or Shifu banking trojans; both of which are designed to search for and collect banking details. Advice:  If you receive a suspected phishing , do not open the attachment as there is a high risk of infecting your system and network infrastructure.  Do not reply to the and report it to the appropriate people within the organisation. This includes network administrators, cyber security and Action Fraud.Action Fraud  If you believe financial accounts may have been compromised, contact your financial institution immediately for advice.  Make sure your anti-virus and malware scanners are up-to-date. NOT PROTECTIVELY MARKED

‘Scanned Document’ - Macro Malware :  We have received a second report of a fake containing a malicious Excel spreadsheet. If you receive this, do not open the attachment. This appears to be from a compromised address.  Description: MRH Solicitors Scanned Document macro malware.  Headers: From: MRH Solicitors" Subject: Scanned Document  Attachment filename: ScannedDocs xls NOT PROTECTIVELY MARKED  Message Body: Find the attachment for the scanned Document  The Excel document, once opened, is seen to download either the Dridex or Shifu banking trojans both of which are designed to search for and collect banking details  Please follow the advice in the previous slide

Avoid being a Victim of Phishing:  Do not reveal personal and financial information in s and do not respond to s asking for this information. This includes any demands to follow a web link within the fake .  Before sending your sensitive information over the Internet, be sure to check the security and legitimacy of the website first.  Many fake websites can be spotted by paying attention to the website’s URL. Malicious websites will look almost identical to the genuine site, but succeed in fooling people by changing one letter in the domain or by using a.net address as opposed to the genuine.com site.  If you are unsure whether an request is legitimate, try searching keywords in a web search engine, such as the subject line or source address. Contacting the company directly may also provide some answers.  If ever in doubt, never open attachments, even Office documents, as they can still contain malicious code that can automatically run once opened.  Keep anti-virus and anti-malware packages running and up-to-date. Should anything slip though the net then you have extra layers of security. NOT PROTECTIVELY MARKED

CEO Fraud and ‘Whaling’:  We have seen an increase in ‘whaling’ attacks in the South West region; nothing to do with big fish but primarily criminals posing as CEO’s targeting financial departments.  Whaling is a specific form of ‘spear-phishing’ in which higher management and CEO’s are targeted to acquire usernames, passwords, bank details and money.  This form of attack acts in the same way as spear-phishing, but the phishing s have an increased chance of being responded to because they purport to be from a named senior executive.  Content within these s will be carefully crafted to target higher management by first or full name. They will often be disguised as a legal requirement, customer complaint or internet executive directive.  In our most recent report: a company based in Devon received an posing as the CEO. The requested a money transfer to a recipient with details provided. The financial department contacted the CEO to question it. The attempt was reported it to Action Fraud. NOT PROTECTIVELY MARKED

CEO Fraud and ‘Whaling’: What to do if you suspect a targeted attack?  If you receive an unexpected asking for money, question it. If it appears to be from another member of staff pick up the phone and check with them.  Once you have confirmed it to be a form of spear-phishing attack, keep all s and any correspondence with the attacker and report it to Action Fraud.  Equally, be cautious of any web links that are in the s as well as malicious attachments. Even Word documents appearing to be a form of invoice, for instance, can have an embedded virus.  Frequent testing of your organisations’ staff awareness by simulating spear- phishing attacks to gauge the effectiveness of cyber security is recommended. NOT PROTECTIVELY MARKED

Legacy Systems, Applications & Security Risks:  We have investigated multiple incidents at organisations in the South West region where old legacy systems and hardware have caused security issues within the IT infrastructure.  By using out-dated hardware and applications within your business you run the threat of creating new attack vectors for hackers to exploit.  Unpatched software and firmware, default and hardcoded passwords and failure to invest in IT infrastructure all contribute to an unsafe network.  Some network engineers have been found to have customised legacy software to such a large degree that upgrading a switch, for instance, may require the upgrading of many other systems and software. What can we do?  Small to medium enterprises should consider completing an assessment of their hardware installations and security setup to prevent intrusions.  Identify vulnerable network devices such as printers and scanner which are common among legacy systems.  If you run a large network infrastructure, think about where budget is spent. Investing in new technologies makes business sense, but spending money on replacing legacy systems can potentially resolve underlying technical and security risks. NOT PROTECTIVELY MARKED

Hacking PBX/ Dial Through We have received a report of a PBX/Dial through attack on a business based in Bristol. The telephone system was compromised during closed office hours and calls were placed to premium rate numbers in Belarus and Jamaica resulting in a financial loss of £ In order to prevent yourselves becoming the next victim:  Use strong pin/passwords for your voic system, ensuring they are changed regularly.  If you still have your voic on a default pin/ password change it immediately.  Disable access to your voice mail system from outside lines. If this is business critical, ensure the access is restricted to essential users and they regularly update their pin/ passwords.  If you do not need to call international/ premium rate numbers, ask your network provider to place a restriction on your line.  Consider asking your network provider to block outbound calls at certain times eg when your business is closed.  Ensure you regularly review available call logging and call reporting options.  Regularly monitor for increased or suspect call traffic.  Secure your exchange and communications system, use a strong PBX firewall and if you don’t need the function, close it down!  Speak to your maintenance provider to understand the threats and ask them to correct any identified security defects. NOT PROTECTIVELY MARKED

CiSP - Cyber Crime Threats Shared The Cyber Security Information Sharing Partnership (CiSP), which is run by Cert-UK, is an information sharing platform used to share and publish cyber crime threat information. The aim of the platform is to allow members to take remedial action and modify their organisations to prevent cyber attacks. If you would like to join the CiSP then please sign up at and contact us as we can sponsor you. A regional South West CiSP is in place and will formally launched in April 2016; more details will be shared in due course. Open the ‘Adobe Acrobat Document’ attached (below) to find out more about the CiSP. NOT PROTECTIVELY MARKED

Additional Briefing Dissemination This document has been given the protective marking of NOT PROTECTIVELY MARKED and may be disseminated outside law enforcement with no restriction. If you know anyone else who would like to receive this, please send us their address and we will add them to the distribution list. Any comments or queries please South West Regional Cyber Crime Unit at: NOT PROTECTIVELY MARKED