Gerry Morley - Director of Cyber Security No Comments

Threat Alert: QR Code Scams

What are QR Codes?

QR codes are digital images that when scanned by a smart phone app, allow rapid access to a certain document or website. They are often used for restaurant menus, business cards, links to videos in adverts, access to sporting events etc. They are fast becoming the norm as they help facilitate the move to contactless communications.

QR codes however are quickly becoming another way cybercriminals can trick users into accessing a website or document as it can be more difficult for a user to verify (in advance) the website address, the QR code will take them to.

Cyber attackers however can interfere with QR Codes and lead victims to malicious websites where their financial and personal information is stolen.

QR Code Scams

Some criminals have begun sticking fake QR Codes to parking meters enticing unwitting drivers to scan the code, and hand over their credit/debit card information in the belief they were paying for parking when they the money went straight to the criminals. Earlier this year the FBI published an advisory to warn people.

Many paid and free sites exist that will allow one to create their own QR code allowing bad actors to come up with elaborate attacks or techniques. 

This QR Code we generated above allows someone to quickly and easily connect to a Wi-Fi connection. While this is convenient in a shop/restaurant/café, or to provide guests access to your wireless network, it could be very easily abused and used to entice users into connecting to a malicious network. 

There are many other types of QR codes and all of these are relatively simple to repurpose for malicious activities. 

A recently reported phishing email utilises a QR code while posing as DHL. The criminals behind this scam are exploiting QR codes in a unique way to avoid detection.

A fake DHL themed email begins the attack and although the sender’s address in this scam has nothing to do with the courier service’s name, the message body has a corporate logo, an order number and the purported date of package arrival, all of which are very convincing.

The reported scam notes: An order has arrived at a nearby post office, and the courier was unable to deliver it personally. Normally a link to “resolve the issue” would be included, but this time there is a QR code for the user to scan.

Albeit this scam email below is directed at companies with Spanish employees, the same scam could apply no matter the language or country.

The attackers are counting on the victim using their smartphone to read the QR code. This will cause the malicious website to load on a small screen where the URL is not fully visible and other phishing scam signs are more difficult to identify.

How to thwart an attack? 

The best ways to help thwart such attacks is to:

  1. Always Stop, Look and Think. Are you expecting the email? Does the context indicate an unexpected or unforeseen problem has suddenly arose? Does the email infer a sense of urgency or a negative consequence if not actioned?
  2. Verify an emails sender address to ensure it is genuine.
  3. If you need to use a QR Code scanning app, use one that offers a preview where a QR code will take you before it takes you there. If this is not possible or if in doubt, don’t scan the QR Code. It is best practice to instead visit the genuine website via a web browser.
  4. If you’re expecting a shipment, be sure to make a note of the tracking code and check  the status of the shipment on the official website.
  5. Where possible, save genuine links to work and personal cloud-based services (including courier services) in your PC and phones bookmarks. Access these sites via your bookmarks and avoid clicking links to these services in an email.

If in doubt, before you take any action, understand and follow your company approved policy/procedures for reporting suspicious email activity. The sooner an incident is reported, the sooner measures can be put in place to prevent a breach.

More info:

QR Codes in the Time of Cybercrime (knowbe4.com)

Criminals steal payment details of DHL customers | Kaspersky official blog

Gerry Morley - Director of Cyber Security 4 Comments

Ransomware – WannaCry No More – Train and Phish your staff.

prevent ransomware

By now, many of you that have not been under a rock for the last couple of weeks have heard about the worldwide ransomware cyber-attack WannaCry Decrypt0r that began in earnest on Friday 12th May 2017. The new ransomware caused major disruption to the IT systems of 40 National Health System hospitals across the UK (resulting in most non-emergency operations being suspended). Not only that, but it also caused disruption to an additional 200,000 victims, distributed over at least 150 countries (including several banks, Renault, Nissan, FedEx Corp, Telefonica, German Railways and even the Russian Interior ministry).

How Did This Happen?

Global reports from cyber security experts confirm that this ransomware gets onto a network through an unsuspecting user clicking on a link or attachment in a spam email.

The last few years and countless data breaches have shown that human error (due to a lack of security awareness training) from phishing and social engineering is the number 1 cause of cyber-attacks, ransomware and data breaches worldwide. Unfortunately, many companies including hospitals who have not invested in security awareness training and ongoing testing of their staff with simulated fake emails (to keep them savvy to the latest scams) will continue to be the most vulnerable to this and future similar style cyber- attacks.

Read more

Gerry Morley - Director of Cyber Security No Comments

Next Generation Fileless Malware Requires Next Generation Security

Train staff, install Next Generation security and disable macros as the latest fileless malware exploits a lack of all three to steal data.

DNS Malware

I’m afraid to say but gone are the days when just having standard security such as Anti-virus software was enough. Cybercriminals are now using complex clandestine techniques to exploit standard system tools and protocols that are not always monitored.

The latest example of such attack is DNSMessenger – a new Remote Access Trojan (RAT) that uses DNS queries to conduct malicious PowerShell commands on compromised computers – a technique that makes the RAT difficult to detect onto targeted systems. Just like their physical counterparts, without a trap in place (i.e a next generation security detection system) they won’t be caught and will end up causing untold damage.

Read on for what next generation security you need to protect your business from these advanced next generation threats. Read more

Gerry Morley - Director of Cyber Security No Comments

Worldwide disruption of Internet services due to Amazon Web Services Outage

If your favourite website or internet related service wasn’t accessible or working right yesterday it may not have been just you.

Amazon Web Services

Yesterday, Amazon Web Services S3 system which hosts well over a hundred thousand websites experienced a major outage for between 4 and 5 hours yesterday. Many popular websites (Netflix, Instagram, Spotify, Pinterest, Slack, Trello, Buzzfeed, Reddit, IFTTT, Quora, Splitwise and Medium to name a few) use Amazon’s S3 system and users of these popular sites may have experienced slowness in accessing such services.

Unbeknownst to users familiar with Amazon’s online shopping website, Amazon Web Services is a giant provider of the back-end of the Internet. It provides cloud-based storage and web services for companies so they don’t have to build their own server farms, allowing them to rapidly deploy computing power without having to invest in infrastructure.

While not all AWS customers were affected by the outage at one of AWS’s main storage systems, many experienced slowdowns in website reaction times, after a big portion of its S3 system went offline. Amazon wasn’t able to update its own service health dashboard for the first two hours of the outage because the dashboard itself was hosted on AWS.

“We’ve identified the issue as high error rates with S3 in US-EAST-1,” Amazon explains on its services tracking page, adding that the issue “is also impacting applications and services dependent on S3.

The issue appears to have been resolved but these instances are always a great reminder of how much of the internet relies on just a handful of huge companies to keep it up and running and even massive companies like Amazon can have unforeseen issues which cause downtime.  Unfortunately, there will always be “ghosts” in the machine, and just like cyber-attacks, downtime at some stage is inevitable for nearly every business. It’s a case of “when” not “if” it will happen to you. That’s why it’s so important to have a backup, disaster recovery and business continuity plan for your own business so you can be best prepared to continue to maintain operations and service your customers even when issues happen.

Sources: USA Today, Engadget, Verge, BGR

 

 

 

Gerry Morley - Director of Cyber Security No Comments

Hackers offer Apple staff in Cork up to €20,000 for insider information

Hackers are tempting employees of high profile organisations around the world with large sums of money for insider information.

This serves as yet another wake up call for Irish organisations and organisations worldwide of the increasing insider threat and that hackers will stop at nothing to gain sensitive data on companies which they can sell on the dark internet for a mini fortune. Read more