Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Creative Hacking Underscores The Need For MFA
Facebook   X   LinkedIn   Email

Creative Hacking Underscores The Need For MFA

March 26, 2024

Attackers are getting more creative by the day. It's more important than ever before with so many bad actors out there to make all of your accounts ultra-secure. That means that using some method of multifactor authentication (MFA) is in order. Case in point: Recently, there was an elaborate scheme targeting unsuspecting users that would perhaps not have been victims, had MFA been enabled.

Essentially what these crafty hackers did was break into a Microsoft Exchange server, use administrator permissions, and use those to send out mass spam email messages.

You might be asking why they would feel the need to use someone else’s email server to do this. Well, because phishing email is more likely to be opened if it looks like it comes from a legitimate domain. Therefore, because the hackers were able to gain access to the Exchange server, they could make it look like the email messages were just that…from somewhere legitimate and perhaps less likely to be marked as spam. By doing this, it masked the real origin of the email, which was actually third-party email marketing services.

The spam email that was mass delivered was promoting fake sweepstakes where recipients were encouraged to put their credentials into a form. This is a common phishing scheme used by bad actors. However, what made it so effective is that by using a hacked server, they were able to gain privileged access to user accounts. The hackers essentially used these user permissions to grant themselves administrative permissions, which essentially gave them unlimited access. They used these permissions to craft messages and use the legitimate organization’s domain information, which allowed them to bypass spam filtering tools.

This attack could have been prevented, if only the administrator accounts had some form of MFA enabled. MFA requires users to not only input their passwords but also provide some other form of identification beyond that. For instance, once you input your password, you would be asked to then provide an authentication code or device that only the administrator has access to. This could be in the form of a hardware key that you physically plug into a device, an authentication app, or even an email verification.

Without this type of protection in place, the bad actor only needs to gain access to the account by hacking the password. This can be done through brute-force methods as well as in other ways.

This is another reminder that having unique and strong passwords for each account is necessary. If they get one password, they won’t be able to use it on multiple accounts. When creating passwords, use at least eight characters, combining letters, number, and special characters. If you can’t remember all of them (yes, we know there are so many of them), try associating them with clues and use the clue to jog your memory. You can also consider password managers. However, there are risks to using those. There recently was a breach involving LastPass. Although that company claims master passwords were not accessed, there have been cases where those were and that meant all other passwords were also accessed and needed to be changed.

As a last resort, write them down on an old-fashioned physical sheet of paper and keep it tucked away out of sight; preferably in a locked drawer. The more you can do to protect your accounts, such as enabling MFA when it’s offered, the safer all of your information will remain.


Email Scams Threaten Extortion And Blackmail

Scams & Phishing

Email Scams Threaten Extortion And Blackmail

An uptick in email scams has cybersecurity professionals concerned, and for good reason. Symantec researchers found that in the first five months of 2019, they prevented almost 300 million extortion email attacks from going forward. Just some of those discovered include blackmail, sextortion, bombs, hit men, and malware threats. The researchers also determined the average cost of paying demands over a 30 day period was $1.2 million in 243 Bitcoin transactions. READ FULL STORY

Mobile Banking Apps Continue To Be A Hi Value Target For Cybercriminals

Mobile Security

Mobile Banking Apps Continue To Be A Hi Value Target For Cybercriminals

It’s that time of year when organizations that track cybersecurity stats and other information start to release their results. And to no one’s surprise, mobile banking has been under attack in 2021. The Nokia 2021 Threat Intelligence Report found the cybercriminals’ desire to steal your banking credentials has ramped up throughout the year by logging your keystrokes, taking screenshots, trying to snag those two-factor authentication (2FA) codes, and using overlays. There’s no lack of trying to get your confidential information…and your money. READ FULL STORY

Sustained Phishing Campaign By The SEABORGIUM Threat Actor Reported By Microsoft

Scams & Phishing

Sustained Phishing Campaign By The SEABORGIUM Threat Actor Reported By Microsoft

The Microsoft Threat Intelligence Center (MSTIC) recently published a new blog on the sustained campaign of phishing and credential theft by the threat actor SEABORGIUM. This campaign has persistently targeted larger scale organizations over long periods of time. This debunks the idea of some that cybercriminals get into the organization and right back out. In fact, it is becoming more common for them to sneak in under the radar and wait for long periods of time. Sometimes, years before they attack. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...