Security Manager's Journal: Target breach unleashes fresh scams
Scammers are nothing if not innovative. It just goes to show that the best defense is an educated workforce.
Computerworld - The recent Target breach has furnished scammers with fresh victims, tailor-made and prepped for information theft. I've seen several variations of Target-related scams at my company since the breach. For the most part, the scammers' trick of using Target as their scapegoat has backfired around here, because my company's users are mostly aware enough to be skeptical. I've spent a lot of time educating them about the classic characteristics of email scams (like urgent warnings, lack of personalization, poor grammar and spelling, and clickable links that don't go where you would expect them to). Yet the scammers continue to try, and now they are using more than one kind of trick.
The most obvious variation of the Target scam that I've seen lately is the standard phishing email scam (of the "click here" variety). Fortunately, my users are pretty smart about the basics. I've told them enough times to watch out for phishing attempts (and avoid clicking on links sent via email) that 99% of our user base won't click (and about 50% recognize phishing email on sight). Of course, the remaining 1% become victims, setting off my network-based malware alarm systems when they get infected. We get a few infections per week this way, which our desktop team quickly contains by running out to meet the end user as soon as they can and disconnecting the infected computer, the hard drive of which is immediately replaced with a freshly imaged one and the original stored away, never to be reused.
Another scam variation I've been seeing is text-based. Text messages sent to the victims give a phone number to call offering "protection" or investigating the Target security breach. Anyone foolish enough to call that number gets asked for their personal information, including Social Security number, card number and PIN. My company's users have reported a few of these, but nobody has yet fallen for this trick. I think it's just too unusual to fool people. They are not used to seeing urgent messages from retailers and financial institutions in this way, and most people are very suspicious. For example, a common reaction has been "How did they get my text number? I never gave that to Target."
Phone calls have been running the same scam. Random dialing does give the scammers fresh victims. One person at my company was scammed by a person-to-person phone call, although in this case it was not directly related to the Target breach. The scammer told the victim that he was from "technical support" and that the victim's computer had a virus. The victim went to a website the scammer provided, and was immediately infected (in this case, with ransomware that encrypted his hard drive so he could no longer access his data or software). This was on the victim's home computer, not within my company's network. If it had been on the network, the attempt probably would have failed, or would at least have been detected right away. So the poor guy came to me asking what to do, and all I could tell him was that he should give up on recovering his hard drive and start over with a fresh one. Not what he wanted to hear, but in this world of scams, sometimes the truth is hard. One thing's for sure: He won't fall for the same trick again.
More by J.F. Rice
- Security Manager's Journal: Peering behind the firewall
- Security Manager's Journal: Trapped: Building access controls go kablooey
- Security Manager's Journal: We manage our threats, but what about our vendors?
- Security Manager's Journal: With Heartbleed, suddenly the world is paying attention to security
- Security Manager's Journal: A rush to XP's end of life
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!