Insights

Latest Feature - Cyber Newsletter

Written by Team Fusion | Jul 4, 2024 4:00:00 AM

Hackers Impersonate IT Support on Microsoft Teams

What:

A recent cyber-attack threatening all types of businesses occurred this month. Using Microsoft Teams and other malicious techniques, ransomware was deployed on the targeted networks to extract sensitive information for payment.

How:

Using a technique called Email Bombing, attackers send through thousands of emails to employee inboxes within minutes. The goal is to create worry and panic within the company so the malicious actors can move in undetected. Once gaining the attention of the targeted business, they exploited Microsoft Teams' default setting, which allow users to interact with people outside the organisation. Then, posing as IT support personnel on Microsoft Teams, assistance is offered to resolve the email spam issue. Trusting the legitimacy of the IT support, employees began to grant remote access to their systems, allowing the attackers to plant ransomware freezing networks and extracting sensitive data for ransom demands.

Damage Control:

While specific company names have not been confirmed, cybersecurity company Sophos has identified 15 incidents in the past three months, half of which happened in the past fortnight. Organizations have implemented measures to combat these types of attacks:
1. Block the Outsiders. Companies updated their Teams Settings to restrict/block outside communication. This tiny change can be the difference between attackers being spotted or a successful.
2. Train the Team. Employees received crash courses on spotting scams. These scams are easily noticeable but only if you know what to notice.
3. Eyes on the Prize. Ramp up monitoring to catch suspicious activity early, before hackers do damage. This is the ultimate win for cybersecurity mitigation techniques.

 

Latest Alert

Cybercriminals Target iPhone Apple IDs

Security software company Symantec has said be aware of a new cyberattack targeting iPhone users with criminals attempting to obtain individuals' Apple IDs in a phishing campaign.
iPhone users in the United States, are receiving malicious SMS text messages that appear to be from Apple but are in fact an attempt at stealing victims' personal credentials by encouraging recipients to click a link and sign in to their iCloud accounts. For example, a phishing text could say:
Apple important request iCloud: Visit signin[.]authen-connexion[.]info/icloud to continue using your services.

To appear legitimate, recipients are also asked to complete a CAPTCHA challenge before they are directed to a fake iCloud login page. These login pages look genuine and are used to obtain these personal details from the unsuspecting target;
  • Email
  • Password
  • 2FA Passcode

Emerging Cyberthreats

AI-Powered Cyber-Attacks

These are emerging as a significant challenge in cyberspace. Cybercriminals are using artificial intelligence to increase the sophistication and overall threat-level of their attacks.
These attacks can automate key aspects of an attack, craft convincing phishing schemes and even adapt in real-time to circumvent security measures. This means traditional defences may no longer work, calling for more intelligent and adaptable cybersecurity solutions.

Deepfake Technology

This is increasingly becoming a 'go-to' tool for cybercriminals and the number of deep-fake tech attacks has risen by 550%.
Using new deep-fake tech to create realistic fake videos, images, or audio that mimics real people, often makes it difficult to distinguish from genuine content. This allows malicious individuals to ransom targets with fake content for money or reputational damage.

Key Takeaways

Impersonation Risk. Hackers are using platforms like Teams and Apple services to impersonate support and steal personal
information.

  • Watch for Red Flags. Be cautious of unsolicited messages asking for account details or urgent actions.
  • Verify Request. Always confirm suspicious requests with official sources before responding.
  • Boost Security. Use multi-factor authentication, strong passwords, and regularly monitor accounts.
  • Act Fast. If compromised, change passwords immediately and report the issue.