Application Security

8/28/2017
05:16 PM
50%
50%

US CERT Warns of Potential Hurricane Harvey Phishing Scams

Be wary of malicious emails purportedly tied to the storm, officials say.

Phishing emails related to Hurricane Harvey may land in user inboxes as the now-tropical storm cuts a path of destruction across Texas, the US-CERT warned today.

US-CERT is advising users to remain cautious when receiving unsolicited emails with attachments or links purporting to be related to the Hurricane Harvey disaster, which has killed at least five people to date.

Bogus emails requesting donations from trumped-up charities are typically circulated following major disasters, with the links and attachments containing malware, US-CERT warns.

Users are advised to take such steps as directly contacting the charity in question by calling them, or assessing their legitimacy via the Better Business Bureau's National Charity Report Index.

Read more about Hurricane Harvey phishing scams here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
HowardE668
50%
50%
HowardE668,
User Rank: Apprentice
9/4/2017 | 1:18:25 PM
Remember emails are easily read on the web
Almost every time I order something on Ebay, within an hour or two I will get an email purporting to be from Ebay asking to 'confirm' my personal data - username, email address, login and password.  'For security reasons'.  The IP address is easily traced, they don't even try to mask it.  Comes back to a server in Prague, the Czech Republic.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
8/30/2017 | 7:31:24 AM
Re: Other Phishing scams
The part of me that has faith in mankind would like to agree with you.  The part of me that still watches endless armies of dummies open up a PDF or DOC file with a refund from the Liberty Wine company ....... 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2017 | 1:30:43 PM
Re: Other Phishing scams
"Never had anybody alive IN Nigeria to start with" That true and there is nobody left in Nigeria since they have all been dead based on the number of emails we receive. :--))
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
8/29/2017 | 1:28:55 PM
Re: Other Phishing scams
"Bank of Nigeria through a dead relative!" I agree, most people are aware of Nigeria scams, no need to fall into it anymore.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
8/29/2017 | 1:26:52 PM
Re: Other Phishing scams
"True enough but there are always phishing and phone scams running without cause or reason. " That is true. People are more vulnerable when there is a disaster, most try to help.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
8/29/2017 | 1:25:12 PM
Re: Other Phishing scams
"It's not just Harvey that's being used to scam. " That is true. I agree, after any disaster these types of scams have been increasing.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
8/29/2017 | 1:23:15 PM
Harvey
It is quite common that some people try to exploit vulnerable people, that is sad but reality that after a disaster these things jump high.
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
8/29/2017 | 1:17:58 PM
Re: Other Phishing scams
True enough but there are always phishing and phone scams running without cause or reason.  Whenever I receive a call form a Police benefit org, I hang up ..... and never respond to those infamous $7,203,232 waiting fr me in the Bank of Nigeria through a dead relative!!!  (Never had anybody alive IN Nigeria to start wit)
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
8/29/2017 | 9:48:54 AM
Other Phishing scams
It's not just Harvey that's being used to scam.  Beware of text messages with links asking for your user ID and password.  I've gotten two in as many weeks.  I immediately called the company affected only to be told these were phishing scams. 
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.