threat | TechSolutions, Inc. Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation. Thu, 27 Apr 2023 03:41:22 +0000 en-US hourly 1 https://www.techsolutionsinc.com/wp-content/uploads/2020/05/favicon.png threat | TechSolutions, Inc. 32 32 How SMBs can prevent VoIP eavesdropping https://www.techsolutionsinc.com/blog/how-smbs-can-prevent-voip-eavesdropping/ https://www.techsolutionsinc.com/blog/how-smbs-can-prevent-voip-eavesdropping/#respond Thu, 15 Apr 2021 00:00:10 +0000 https://www.techsolutionsinc.com/blog/how-smbs-can-prevent-voip-eavesdropping/ As a business owner, you should be aware of the different cyberattacks that can hurt your company. One of these is Voice over Internet Protocol (VoIP) eavesdropping. This occurs when cybercriminals infiltrate your VoIP network and listen in on your calls in hopes of stealing critical business information. To prevent this, you should implement the […]

The post How SMBs can prevent VoIP eavesdropping appeared first on TechSolutions, Inc..

]]>

As a business owner, you should be aware of the different cyberattacks that can hurt your company. One of these is Voice over Internet Protocol (VoIP) eavesdropping. This occurs when cybercriminals infiltrate your VoIP network and listen in on your calls in hopes of stealing critical business information. To prevent this, you should implement the proper defenses for your VoIP phone systems.

Change the default configurations of your VoIP system

Using your VoIP phones without changing the default configurations can be the worst mistake you can make. These days, it’s easy for hackers to search vendor documentation for things like default usernames and passwords. Depending on your VoIP provider and phone model, you should have the option of changing the default login credentials on your handsets.

Get updates from your handset vendor

In 2015, Cisco detected vulnerabilities in their VoIP phones that enabled attackers to listen in on phone conversations. Cisco quickly released security alerts to inform their customers about these vulnerabilities, giving them enough time to address the issues. The lesson here is you must regularly monitor advisories from your hardware vendor or work with an IT provider that does so for you. Without proper monitoring, you won’t know how susceptible your corporate VoIP phones are to eavesdropping.

Update session border controllers

Another way to combat VoIP eavesdropping is to constantly update your session border controllers (SBCs). By doing so, you’ll be updating your VoIP’s antivirus software, which means your systems are better protected from constantly evolving cyberthreats. Routine SBC updates are essential for securing SIP trunking as well as responding to new threats.

Encrypt VoIP calls

If you work in a regulated industry like healthcare or finance, encrypting VoIP calls is essential to staying compliant. Work with your VoIP provider and auditors to determine the best encryption options for your communications infrastructure. Many cloud VoIP providers offer call encryption guidelines, and some even offer it as a premium service.

Build a hardened VoIP network

Make sure your VoIP network has:

  • IP private branch exchange (PBX) using minimal services, so that the hardware can only power the PBX software
  • Firewalls with access control lists set to include call control information
  • Lightweight Directory Access Protocol lookup, and signaling and management protocol
  • Reinforced endpoint security with authentication at the endpoint level

To effectively defend against VoIP eavesdropping, businesses need to take a holistic approach to cybersecurity. This includes enforcing policies, deployment, and security practices that will keep malicious agents out of your network. Feel free to contact us for further information on how to protect your business.

Published with permission from TechAdvisory.org. Source.

The post How SMBs can prevent VoIP eavesdropping appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/how-smbs-can-prevent-voip-eavesdropping/feed/ 0
Cyberthreats and the finance sector https://www.techsolutionsinc.com/blog/cyberthreats-and-the-finance-sector/ https://www.techsolutionsinc.com/blog/cyberthreats-and-the-finance-sector/#respond Thu, 07 Mar 2019 02:00:06 +0000 https://www.techsolutionsinc.com/blog/cyberthreats-and-the-finance-sector/ The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarize themselves with the threats and the agents behind them. Here are seven new threats and tactics, techniques, and […]

The post Cyberthreats and the finance sector appeared first on TechSolutions, Inc..

]]>

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarize themselves with the threats and the agents behind them. Here are seven new threats and tactics, techniques, and procedures that security professionals should know about.

Extortion
Distributed denial of service (DDoS) attacks, which are typically delivered from massive botnets of zombie computers or internet of things (IoT) devices, have been used to bring down banking networks. This occurs when a targeted server or system is overwhelmed by multiple compromised networks. It’s essentially like a traffic jam clogging up the highway, preventing regular traffic from arriving at its intended destination.

Some cybercriminals are relentless with DDoS attacks and follow them up with cyberextortion, demanding payment in return for release from costly downtime. Banks cannot defend against these attacks alone, so they rapidly share information among themselves through organizations such as FS-ISAC4 and rely upon the ability of their internet service provider to handle and redirect massive quantities of traffic.

Social media attacks
This happens when fraudsters use fake profiles to gather information for social engineering purposes. Thankfully, with new regulations such as the General Data Protection Regulation (GDPR), big companies like Facebook and Twitter have significantly enhanced their security and privacy policy with regards to their data handling practices. The unprecedented reach of social media is something companies cannot afford to ignore because of the possible implications a data breach can have on businesses.

Spear phishing
Spear phishing is an attack where cybercriminals send out targeted emails ostensibly from a known or trusted sender in order to trick the recipient into giving out confidential information. Over the years, hackers have upped their game and cast a bigger net, targeting unwitting employees to wire money. This attack is called business email compromise (BEC), where a fraudster will purport to be a CEO or CFO and request for large money transfers to bogus accounts.

Point-of-sale (PoS) malware
PoS malware targets PoS terminals to steal customer payment (especially credit card) data from retail checkout systems. Cybercriminals use a memory scraper that operates by instantly detecting unencrypted type 2 credit card data, which is then sent to the attacker’s computer to be sold on underground sites.

ATM malware
GreenDispenser is an ATM-specific malware that infects ATMs and allows criminals to extract large sums of money while avoiding detection. Recently, reverse ATM attacks have also emerged. Here, PoS terminals are compromised and money mules reverse transactions after money is withdrawn or sent to another bank account. In October 2015, issuers were mandated to shift to EMV or Chip-and-PIN system to address the weakness of the previous payment system.

Credential theft
Dridex, a well-known credential-stealing software, is a banking Trojan that is generally distributed through phishing emails. It infects computers, steal credentials, and obtain money from victims’ bank accounts.

Other sophisticated threats
Various data breach methods can be combined to extract data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATMs of cash.

Additionally, with the rise of cryptocurrency, cybercriminals are utilizing cryptojacking, a method that involves the secret use of devices to mine cryptocurrency.

The creation of defensive measures requires extensive knowledge of the lurking threats, and our team of experts is up to date on the latest security information. If you have any questions, feel free to contact us to find out more about TTPs and other weapons in the hacker’s toolbox.

Published with permission from TechAdvisory.org. Source.

The post Cyberthreats and the finance sector appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/cyberthreats-and-the-finance-sector/feed/ 0
Fantom: the latest cybersecurity spectre https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/ https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/#respond Thu, 08 Sep 2016 00:00:10 +0000 https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/ It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]

The post Fantom: the latest cybersecurity spectre appeared first on TechSolutions, Inc..

]]>

2016September7_MicrosoftWindowsNewsAndTips_AIt’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like many other things, these technologically menacing forces are like “a wolf in sheep’s clothing” — impending danger lurks beneath the most seemingly innocent guises.

AVG security researcher Jakub Kroustek recently spotted Fantom coded atop an EDA2, a ransomware-building kit that was open-sourced but eventually taken down. EDA2 contained certain flaws that allowed researchers to obtain decryption keys from its C&C server, yet these flaws have since disappeared, indicating that Fantom coders might have found and fixed them before anyone else had a chance to.

Very little is known as to how Fantom is distributed. As for the method of deployment, cybercriminals plant the file onto the target’s computer via spam email or exploit kits. Fantom-infected files are named criticalupdate01.exe; they utilize a “Windows Security Update” to prompt targets into running the file.

After activation, the ransomware starts by locking the user’s screen while displaying fake Windows Update graphics, complete with a fully-functioning percentage-based loading timer that mirrors the original Windows Update screen. However, beneath this pleasant facade, Fantom is encrypting your files right before your eyes. Luckily, the temporary lock screen is removable before it reaches 100% — simply press CTRL+F4. Unfortunately, the encryption process remains intact.

The MalwareHunterTeam states, “The ransomware uses classic ransomware encryption by locking files using an AES-128 key and then encrypting this key with a dual RSA key, with the private key stored on the crook’s server, and a public key left on the user’s PC.”

In order to retrieve the private key to unlock your files, you must contact the perpetrators by email. The email address is listed in the ransom note that appears after the process of encryption is complete. Fantom displays ransom notes in the form of HTML and TXT files, while changing the user’s desktop with a custom screenshot that lists the contact details. Lastly, after completing all its operations, Fantom cleans after itself by running two batch scripts wiping all the installation files clean.

Ransomware isn’t new, but the ways that cybercriminals utilize them are. Who would’ve thought that the ever so familiar Windows Update window has fallen prey to malicious intent? Pretend that you’re the Little Red Riding Hood and that the wolf is the ransomware that cybercriminals have disguised as your grandmother. They no longer wait to trap you, instead, they wait for you to walk straight into one instead.

The issue of ransomware is as extensive as it is meticulous. If you have any questions about Fantom or would like to request more information, feel free to get in touch with us! Give us a call or send us an email. Our dedicated staff are more than happy to help.

Published with permission from TechAdvisory.org. Source.

The post Fantom: the latest cybersecurity spectre appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/fantom-the-latest-cybersecurity-spectre/feed/ 0
Cyber threats and the finance sector https://www.techsolutionsinc.com/blog/cyber-threats-and-the-finance-sector/ https://www.techsolutionsinc.com/blog/cyber-threats-and-the-finance-sector/#respond Tue, 01 Mar 2016 02:00:24 +0000 https://www.techsolutionsinc.com/blog/cyber-threats-and-the-finance-sector/ The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and […]

The post Cyber threats and the finance sector appeared first on TechSolutions, Inc..

]]>

2015Feb29_Security_AThe financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them. Here are 7 new threats and tactics, techniques and procedures (TTP’s) that security professionals should know about.

Extortion

The cyber criminal Armada Collective gained notoriety for being the first to utilize distributed denial-of-service (DDoS) attacks. This occurs when multiple systems flood a targeted system to temporarily or completely disrupt service. They evolved the idea further and started to extort Bitcoins from victims who were initially notified of their vulnerability. If they didn’t comply with the ransom demands of the criminals, they would flood their systems until the victim’s network would shut down completely.

Social media attacks

This involved criminals using fake profiles to gather information for social engineering purposes. Fortunately, both Facebook and Twitter began to proactively monitoring for suspicious activity and started notifying users if they had been targeted by the end of 2015. However, you should still have your guard up when someone you don’t know, or even a friend or colleague, starts asking you suspicious questions.

Spear phishing

Phishers thrive off familiarity. They send out emails that seem to come from a business or someone that you know asking for credit card/bank account numbers. In 2015, phishers went to the next level and began whaling. This normally involved spoofing executives’ emails (often CEO’s) to dupe the finance departments to transfer large sums of money to fraudulent accounts.

Point-of-sale malware

POS malware is written to steal customer payment (especially credit card) data from retail checkout systems. They are a type of memory scraper that operates by instantly detecting unencrypted type 2 credit card data and is then sent to the attacker’s computer to be sold on underground sites.

ATM malware

GreenDispenser is an ATM-specific malware that infects ATM’s and allows criminals to extract large sums of money while avoiding detection. Recently reverse ATM attacks have also emerged, this is when compromised POS terminals and money mules to reverse transactions after money being withdrawn or sent to another bank account.

Credential theft

Dridex, a well known credential-stealing software, is a multifunctional malware package that leverages obfuscated macros in Microsoft Office and extensible markup language files to infect systems. The goal is to infect computers, steal credentials, and obtain money from victims’ bank accounts. It operates primarily as a banking Trojan where it is generally distributed through phishing email messages.

Other sophisticated threats

Various TTP’s can be combined to extracted data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATM’s of cash.

The creation of defensive measures requires extensive knowledge of the lurking threats and our team of experts is up-to-date on the latest security information. If you have any questions, feel free to contact us to find out more about TTP’s and other weapons in the hacker’s toolbox.

Published with permission from TechAdvisory.org. Source.

The post Cyber threats and the finance sector appeared first on TechSolutions, Inc..

]]>
https://www.techsolutionsinc.com/blog/cyber-threats-and-the-finance-sector/feed/ 0