There is a disturbing new trend in computer security, fraudulent computer attacks and small business security threats. Attacks are getting more personal, where the criminals are using big data to pinpoint attacks at small to mid-sized business owners.
Pinpointing Business Owners
Telnexus now has some clients who have financial fraud perpetrated upon them in a similar way via email. These weren’t technological attacks, but more like criminal deception playing on human fallibilities, also known as Social Engineering. Everyone involved in a business needs to be savvy about Social Engineering attacks, especially those of you involved in handling financial transactions.
The fake email was convincing enough to make the employee believe the request was real and it was coming from their boss. Fortunately, in both cases the fraud was stopped because the employee checked with the owner before issuing the wire.
To help you from being tricked, here is the Telnexus advice for when you get an email with a financial request:
NEVER ACT ON A EMAIL REQUESTING A FINANCIAL TRANSACTION WITHOUT VERIFICATION.
Email is not secure. In fact, by default when you send an email it goes into the Internet with no encryption or protection, making it visible to anyone in government, law enforcement or a hacker with ISP access.
The email technology in use on the Internet today was invented in the 1990’s, when we didn’t worry about spoofing, spear phishing, malware and social engineering. The “spoofing” technique used in these financial social engineering attacks can be done by anybody by just changing the settings in a program like Apple Mail.
Social engineering is really just a polite term for lying bast**ds. Unfortunately, we don’t have a technology solution to this problem at this time. So, please keep an eye out for those lying bast**ds and think twice when you get an email from the boss asking to send a wire transfer.
Spear Phishing
Most of us are familiar with the crude “phishing” emails that barely looks like a Bank of America or some other trusted web site. If you haven’t seen any of these lately, then check your Spam folder. It’s probably loaded with the crude phishing attacks sent out by the billions.
Spear phishing, on the other hand, is a more targeted attack not unlike the fake wire fraud email. This is where the big data comes in. We imagine that these attackers collate information from the web or other data sources to craft their attacks. Spear phishing attacks come in the form of fake email and documents that purport to come from someone you know, especially your boss.
Spear phishing that infiltrates corporations is a real problem, and we know about several famous incidents, including Sony Pictures in 2014. It started with The New York Times reporting in 2013 on media and financial companies infiltrated by Chinese hackers, chiefly aided by spear phishing attacks. And, who can forget the 2015 Ashley Madison data dump? And, just this month the biggest document dump ever was uncovered — The Panama Papers. After the attackers get the root passwords, they cut through weak internal security like a knife, exposing the most intimate corporate secrets for the world to see.
Ransomware
The third big threat to be concerned about is ransomware, or attack software that will encrypt your servers with an unbreakable key and demand a bitcoin ransom for the key.
How does the ransomware get into a network in the first place? It’s usually spear phishing, again. In this case the attacker isn’t interested in infiltration, but to simply drop a bomb with a well-crafted email designed to fool just the person to whom it was sent.
Botnets
The last of our four computer security threats to be concerned about is the most insidious — botnets. Using techniques such as spear phishing and files in other distribution networks, a lightweight malware silently infects a computer, phones home to let home base know it has landed, and then waits for further orders.
Why would someone do that? Once millions of computers are infected, the attacker wields a mighty power on the Internet — the ability to shut a part of it down. Upon command, all the computers in the botnet will start sending continuous packet streams to an attack target. It’s called a Denial of Service attack. There are stories about how you can hire a botnet to attack someone you hate and hold their business hostage. A botet is kind of like a 21st century hit man.
With all those botnets floating around, you’ve got to wonder the impact on everyday business users. The impact is real, and it’s worth checking the next time you can’t explain why your Internet connection is pegged and you can’t send an email or your VoIP phones don’t work.
Guard Your Attack Surfaces
If you’re running a business with over $3M in revenue, you are now a target and you have to deal with these security threats. What is a business owner to do? You have to take a more professional and proactive approach to computer security. You efforts have to start with a combination of education, awareness, training, strong IT management and good security protocols.
Beyond those common-sense IT management goals, at Telnexus we use an engineering-oriented approach to computer security that focuses on minimizing attack surfaces and protecting the edge.
An attack surface refers to any part of your IT that is exposed to the network. The generic term “attack surface” is used because we need to think about everything on your network as a device that could be exploited by a hacker. The most obvious devices that have attack surfaces are PCs and servers, but routers, gateways, WiFi access points, switches, cameras, printers and phones can also have flaws in their computer code that can be exploited by a hacker.
One of the reasons why Microsoft had to finally give up on Windows XP last year was that they couldn’t keep up with the zero-days. The hackers have basically won the war on Windows XP. That means if you are still running a Windows XP system in your network it can easily be converted into a hacker’s portal into your network. Keeping a Windows XP system on your network is like welcoming a marauder into a vacant, unlocked office in your building that he can then use as a safe house from which to terrorize your business.
You Need PC and File Server Protection
Call Telnexus To Meet Your Security Threats
You can’t afford to fool around with computer and IT security in 2016. Today the threats are more sophisticated than ever, and the crooks are using some of the most advanced IT tools available to sharpen their attacks. If you own a small business, you could be in some offshore hacker’s crosshairs, and you wouldn’t even know it until it’s too late.
Give Telnexus a call today at +1-510-859-7000 or email us at info@telnexus.com to request a free assessment of the security risks in your network. We will let you know what vulnerabilities we uncover, and then offer affordable and unobtrusive solutions to get you more secure fast.