FBI attack shows all are vulnerable to phishing
Last week’s successful cyber attack on the US FBI should serve as a wake-up call to businesses that any organisation is vulnerable to attack, according to StickmanCyber CEO and founder Ajaay Unni.
Attackers were able to compromise the FBI’s Law Enforcement Portal by exploiting a software misconfiguration, sending out spam emails to 100,000 recipients.
“Although the motives of the hacker aren’t clear and no actor was able to access or compromise any data or personally identifiable information (PII), it should serve as a warning that if the FBI, arguably one of the world’s largest security enterprises, is unable to spot a vulnerability in their system, every business needs to be extra vigilant to ensure they maintain great cyber hygiene practices,” Unni said.
“Phishing methods such as email spoofing can have devastating effects on the reputational and operational health of a business. They are typically used by malicious actors to mislead recipients into divulging sensitive information or enabling access to systems and networks by posing as a credible source.”
Unni said it is becoming vital for businesses to have a comprehensive training and awareness program to ensure staff are vigilant against impersonation attacks.
Employees should also be on the lookout for red flags such as bad grammar and spelling, questionable messaging alluding towards some sort of cash prize or riches, or an element of urgency tied to an unusual request.
“Employees should follow best practices when interacting with emails — avoiding clicking on any suspicious links or attachments, instead opting to type out the official domains in their browsers or even copying and pasting the message in a search engine to identify if an attempted phishing attack may have already been reported,” Unni added.
“Even if the email looks legitimate, always forward it to the cybersecurity department to perform a check and/or call the sender to confirm if it actually came from them.”
The emergence of the successful double extortion technique is fuelling rapid growth in the...
An international team of researchers has developed a scanning tool to make websites less...
Proofpoint has discovered a method of exploiting a function within Microsoft 365 that could allow...