Security Manager's Journal: Target breach unleashes fresh scams
Scammers are nothing if not innovative. It just goes to show that the best defense is an educated workforce.
Computerworld - The recent Target breach has furnished scammers with fresh victims, tailor-made and prepped for information theft. I've seen several variations of Target-related scams at my company since the breach. For the most part, the scammers' trick of using Target as their scapegoat has backfired around here, because my company's users are mostly aware enough to be skeptical. I've spent a lot of time educating them about the classic characteristics of email scams (like urgent warnings, lack of personalization, poor grammar and spelling, and clickable links that don't go where you would expect them to). Yet the scammers continue to try, and now they are using more than one kind of trick.
The most obvious variation of the Target scam that I've seen lately is the standard phishing email scam (of the "click here" variety). Fortunately, my users are pretty smart about the basics. I've told them enough times to watch out for phishing attempts (and avoid clicking on links sent via email) that 99% of our user base won't click (and about 50% recognize phishing email on sight). Of course, the remaining 1% become victims, setting off my network-based malware alarm systems when they get infected. We get a few infections per week this way, which our desktop team quickly contains by running out to meet the end user as soon as they can and disconnecting the infected computer, the hard drive of which is immediately replaced with a freshly imaged one and the original stored away, never to be reused.
Another scam variation I've been seeing is text-based. Text messages sent to the victims give a phone number to call offering "protection" or investigating the Target security breach. Anyone foolish enough to call that number gets asked for their personal information, including Social Security number, card number and PIN. My company's users have reported a few of these, but nobody has yet fallen for this trick. I think it's just too unusual to fool people. They are not used to seeing urgent messages from retailers and financial institutions in this way, and most people are very suspicious. For example, a common reaction has been "How did they get my text number? I never gave that to Target."
Phone calls have been running the same scam. Random dialing does give the scammers fresh victims. One person at my company was scammed by a person-to-person phone call, although in this case it was not directly related to the Target breach. The scammer told the victim that he was from "technical support" and that the victim's computer had a virus. The victim went to a website the scammer provided, and was immediately infected (in this case, with ransomware that encrypted his hard drive so he could no longer access his data or software). This was on the victim's home computer, not within my company's network. If it had been on the network, the attempt probably would have failed, or would at least have been detected right away. So the poor guy came to me asking what to do, and all I could tell him was that he should give up on recovering his hard drive and start over with a fresh one. Not what he wanted to hear, but in this world of scams, sometimes the truth is hard. One thing's for sure: He won't fall for the same trick again.
More by J.F. Rice
- Security Manager's Journal: Trapped: Building access controls go kablooey
- Security Manager's Journal: We manage our threats, but what about our vendors?
- Security Manager's Journal: With Heartbleed, suddenly the world is paying attention to security
- Security Manager's Journal: A rush to XP's end of life
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Security Manager's Journal: Why the shutdown is like the cloud
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!