This weekly brief highlights the latest Threat Intelligence: Evidence-based knowledge about an existing hazard designed to help organizations understand the risks common and severe external threats, used to inform decisions regarding the subject’s response. LookingGlass Cyber (n) - Actionable, relevant, and timely information that can help when assessing the security posture of an organization. A little more left. No no, that’s now too far... news to provide insight into the latest threats to various industries.
“Attention Gen Xers and millennials: Your parents and grandparents are under attack!
Seniors, pay attention! A major scamming effort is underway targeting Medicare recipients and those eligible for services. The attack is being mounted on three fronts — mail, phone and internet and includes multiple tactics.
Why are con artists attracted? Medicare represents a huge “cash cow” waiting to be milked by scammers. According to the Kaiser Family Foundation, in 2015 Medicare covered 57 million people at an expense of $632 billion — 15 percent of the entire federal budget. Adding to the attraction is the reality that Medicare is often difficult to understand, complex and undergoing change, making it a playground for con artists.
Telephone and email scams focus on the upcoming changes to Medicare accounts. In 2018, Social Security numbers will be dropped from the cards and replaced with numbers unique to Medicare. Fraudulent emails and calls focus on this change by requesting verification of current Medicare numbers as part of this process. Medicare and Social Security do not use phone calls or email to communicate. Letters are sent for this purpose and contain secure contact information for inquiries. Any calls or emails requesting Medicare numbers are scams!”
“A recently discovered network worm leverages a total of seven Hacking: The using of a computer and/or program in order to gain unauthorized access to data in a computer, system or network. LookingGlass Cyber (n) - not the axe swinging you’re thinking of. This type of hacking is unauthorized access to another computer, or system. tools stolen from the National Security Agency (NSA)-linked Equation Group.
Dubbed EternalRocks and capable of self-replication, the threat emerged over the past couple of weeks, with the most recent known sample dated May 3. The Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs. was discovered by security researcher Miroslav Stampar, who also found that the tool was initially called MicroBotMassiveNet.
The seven NSA hacking tools included in the network worm include the EternalBlue, EternalChampion, EternalRomance, and EternalSynergy exploits, along with the DoublePulsar backdoor and the Architouch, and Smbtouch SMB reconnaissance tools.”
– Security Week
“Target will pay $18.5 million to 47 states and the District of Columbia as part of a settlement with state attorneys general over a huge security breach that compromised the data of millions of customers.
The settlement ends a yearslong investigation into how hackers obtained names, credit card numbers and other information about tens of millions of people in 2013.
New York will receive $635,000, while California will receive $1.4 million, the largest amount of any state, according to the Eric T. Schneiderman, New York’s attorney general. Dollar figures were determined “largely” based on each state’s population size, his office said.”
– NY Times
“In an effort to work around the security measures built into EMV credit cards, a Brazilian criminal gang has created a skimmer-type device that steals the chip right out of the card when it is inserted into a compromised ATM.
The operation is pretty simple, but requires a certain level of inattentiveness by the victim, according to a FlashPoint blog by Analyst Olivia Rowley and Senior Intelligence Analyst Ian W. Gray. The criminal first installs a skimmer-like device onto the ATMs card slot. However, instead of reading information off the magnetic strip like a typical skimmer, the device punches out the chip, leaving a big hole in the card, which can them be inserted into a blank card for future use. The bad guys also rig up a camera at the ATM so they can record the person’s name and PIN.
The researchers are not entirely certain what happens to the chips after they are removed, but believe they are most likely stored in what they called an overlay that is installed by the criminals.”
You May Also Be Interested In…
- [WEBINAR] Building a Threat Intelligence Program
- [WHITE PAPER] Building a Threat Intelligence Program That Works For You
- [Data Sheet] LookingGlass Cyber Threat Center
- [Data Sheet] Information Protection