Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/30/2018
04:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Holiday Hacks: 6 Cyberthreats to Watch Right Now

'Tis the season for holiday crafted phishes, scams, and a range of cyberattacks. Experts list the hottest holiday hacks for 2018.
3 of 7

Gift Cards: A New Business Email Compromise
Employees should always watch out for any emails requesting a financial transaction or asking them to open an attachment or click a link. But the holiday season brings a seasonal twist to business email compromise (BEC) attacks that happen year-round, says Asaf Cidon, vice president of email security at Barracuda Networks. Gift lures are common around the holidays.
'I think the gift card attack is quite interesting because, in a sense, it is a blend of two disparate attacks we've seen in the past that have now been combined,' he explains. The first of these is CEO fraud, in which an attacker impersonates the CEO to request a financial transaction from a junior employee. Second is the gift lure, which is common around the holidays.
'As far as we can tell, up until this holiday season, we've never seen this specific blend of attack,' Cidon continues. 'It seems that attackers are getting inspiration from different types of successful attacks and trying to blend different tactics to achieve their aims.'
These aims, he adds, are primarily financial in nature - getting a victim to wire money, for example, or pay for a liquid asset (gift cards, Bitcoin) that the attacker can monetize. The greatest threat from email and communication fraud is account takeover. Cidon says his company is seeing more attackers compromise employee accounts so they can trick colleagues and third parties. It's most devastating when it abuses the legitimate account of a high-level employee.
If you receive a request to send a gift card or a link to open one, be sure to verify the sender's address and ensure the email doesn't come with suspicious links or strange address, he advises.
(Image: Drpixel - stock.adobe.com)

Gift Cards: A New Business Email Compromise

Employees should always watch out for any emails requesting a financial transaction or asking them to open an attachment or click a link. But the holiday season brings a seasonal twist to business email compromise (BEC) attacks that happen year-round, says Asaf Cidon, vice president of email security at Barracuda Networks. Gift lures are common around the holidays.

"I think the gift card attack is quite interesting because, in a sense, it is a blend of two disparate attacks we've seen in the past that have now been combined," he explains. The first of these is CEO fraud, in which an attacker impersonates the CEO to request a financial transaction from a junior employee. Second is the gift lure, which is common around the holidays.

"As far as we can tell, up until this holiday season, we've never seen this specific blend of attack," Cidon continues. "It seems that attackers are getting inspiration from different types of successful attacks and trying to blend different tactics to achieve their aims."

These aims, he adds, are primarily financial in nature getting a victim to wire money, for example, or pay for a liquid asset (gift cards, Bitcoin) that the attacker can monetize. The greatest threat from email and communication fraud is account takeover. Cidon says his company is seeing more attackers compromise employee accounts so they can trick colleagues and third parties. It's most devastating when it abuses the legitimate account of a high-level employee.

If you receive a request to send a gift card or a link to open one, be sure to verify the sender's address and ensure the email doesn't come with suspicious links or strange address, he advises.

(Image: Drpixel stock.adobe.com)

3 of 7
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18218
PUBLISHED: 2019-10-21
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
CVE-2019-18217
PUBLISHED: 2019-10-21
ProFTPD before 1.3.6b and 1.3.7rc before 1.3.7rc2 allows remote unauthenticated denial-of-service due to incorrect handling of overly long commands because main.c in a child process enters an infinite loop.
CVE-2019-16862
PUBLISHED: 2019-10-21
Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.
CVE-2019-17409
PUBLISHED: 2019-10-21
Reflected XSS exists in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 ia the id parameter.
CVE-2019-10715
PUBLISHED: 2019-10-21
There is Stored XSS in Verodin Director before 3.5.4.0 via input fields of certain tooltips, and on the Tags, Sequences, and Actors pages.