Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Lazy Habits of Phishing Attackers
Newest First  |  Oldest First  |  Threaded View
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
7/31/2017 | 1:45:51 PM
Lazy Hackers, Lazy Architecture
I've often equated to level of sophistication of a hack to the complexity of the infrastructure used in the hack, or penetrated by the hack.  With millions of would be techies out there, the number of one-off domains with shopping carts, emails and PayPal accounts is in the multi-millions.  The number of those that are sophisticated (look like Amazon.com for instance) is incredibly low.  The reason for this, and the reason so many hackers - in this case, phishers - are lazy is that the architecture behind the infrastructure is old and lazy; time to market pushes sophistication out the door in some cases and leaves users vulnerable.  We in tech should never expect our users to be sophisticated.  Instead we need to be, and to make use of tech easy and highly secure.  Yet in most cases when it comes to domains, email and websites we simply don't.  No, these cyber criminals are lazy because they know the tech behind the platforms they exploit are also lazy.  We can't blame the users who fall for phishing scams.  They are not the ones tasked with providing a secure product.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-21933
PUBLISHED: 2022-01-21
ASUS VivoMini/Mini PC device has an improper input validation vulnerability. A local attacker with system privilege can use system management interrupt (SMI) to modify memory, resulting in arbitrary code execution for controlling the system or disrupting service.
CVE-2022-0326
PUBLISHED: 2022-01-21
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
CVE-2022-22930
PUBLISHED: 2022-01-21
A remote code execution (RCE) vulnerability in the Template Management function of MCMS v5.2.4 allows attackers to execute arbitrary code via a crafted payload.
CVE-2022-23314
PUBLISHED: 2022-01-21
MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via /ms/mdiy/model/importJson.do.
CVE-2022-23315
PUBLISHED: 2022-01-21
MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component /ms/template/writeFileContent.do.