Tag Archive for: Corporate

Credential Theft, O365 Lures Dominate Corporate Inboxes in Q1


Credential Theft O365 Lures Dominate Corporate Inboxers in Q1

 

In Q1, PhishLabs analyzed and mitigated hundreds of thousands of
phishing attacks that targeted corporate users. In this post, we break down these attacks and shed light on the phishing emails that are making it into corporate inboxes.

 

Threats Found in Corporate Inboxes 

 

Credential Theft

Credential theft attacks continue to be the most prolific threats observed in corporate inboxes. In Q1, nearly two-thirds of all reported email threats attempted to steal credentials. This was an 11.6% increase from Q4 2020. 

 

Eighty-four percent of credential theft phishing attacks contained a link that led to a web page with a login form designed to harvest credentials. The remaining 16% delivered attachments similarly designed to lead victims to fake sites and steal sensitive information. Both tactics rely heavily on brand impersonation. 

 

O365

Corporate credentials for
Microsoft Office 365  continued to be targeted heavily in Q1. More than 44% of credential theft email lures targeted O365 logins. This is a 10.4% increase from Q4 2020. 

 

Response-Based

Response-based attacks such as BEC and 419 scams continued to thrive during Q1, contributing to 31% of total phishing emails that targeted corporate users. Advanced-Fee or 419 scams contributed to 60.6% of reported response-based threats. 

 

Breakdown of response-based threats:

 

  1. 419 (60.6%)
  2. BEC (19.7%)
  3. Job Scams (7.7%)
  4. Vishing (6.3%)
  5. Tech Support (5.7%)

 

Although BEC attacks contributed to less than a quarter of response-based attacks Q1, they continue to be a top threat to enterprises. Last year, losses attributed to BEC totaled more than
$1.8 Billion.  

 

Malware

In Q1, 6% of reported phishing lures delivered attachments or links to malware. This suggests email security controls are far better at detecting malicious code in email traffic than they are at detecting social engineering techniques. 

 

ZLoader accounted for 62% of all reported email-based payload activity. This was driven by a
one-day spike in attacks in February that represented one of the largest surges of a single payload we have seen in a 24-hour period.

 

ZLoader and…

Source…

Amazon Invests in Nine New Renewable Energy Projects in Canada, the U.S., Spain, Sweden, and the UK and Becomes Europe’s Largest Corporate Buyer of Renewable Energy


Amazon (NASDAQ: AMZN) today announced nine new utility-scale wind and solar energy projects in the U.S., Canada, Spain, Sweden, and the UK. The company now has 206 renewable energy projects globally, including 71 utility-scale wind and solar projects and 135 solar rooftops on facilities and stores worldwide, which will generate 8.5 GW of electricity production capacity globally. With this latest announcement, Amazon is now the largest corporate purchaser of renewable energy in Europe, with more than 2.5 GW of renewable energy capacity, enough to power more than two million European homes a year.

These projects supply renewable energy to Amazon’s corporate offices, fulfillment centers, Whole Foods Market stores, and Amazon Web Services (AWS) data centers, which power Amazon and millions of AWS customers globally. The renewable energy from these projects also helps Amazon meet its [url=”]commitment[/url] to produce the clean energy equivalent to the electricity used by all consumer Echo devices. All of these projects put Amazon on a path to power 100% of its activities with renewable energy by 2025—five years ahead of the original target of 2030. Investing in renewable energy is one of the many actions Amazon is taking as part of The Climate Pledge, a commitment to be net-zero carbon by 2040, 10 years ahead of the Paris Agreement.

“Amazon continues to scale up its investments in renewable energy as part of its effort to meet The Climate Pledge, our commitment to be net-zero carbon by 2040,” said Jeff Bezos, Amazon founder and CEO. “With these nine new wind and solar projects, we have announced 206 renewable wind and solar projects worldwide, and we are now the largest corporate buyer of renewable energy in Europe and globally. Many parts of our business are already operating on renewable energy, and we expect to power all of Amazon with renewable energy by 2025—five years ahead of our original target of 2030.”

The nine new wind and solar projects announced today in the U.S., Canada, Spain, Sweden, and the UK include:

  • Our first solar project paired with energy storage: Based in California’s Imperial Valley, Amazon’s first solar project paired with energy storage…

Source…

Microsoft says the Chinese hacking group is targeting security flaws in the corporate email app


News Highlights: Microsoft says the Chinese hacking group is targeting security flaws in the corporate email app

Microsoft warned Tuesday that a hacking group backed by the Chinese government is exploiting vulnerabilities in an email program popular among US companies.

The company said in one blog post that the group, called Hafnium, is trying to take advantage of previously unknown vulnerabilities in the Exchange Server email application. Microsoft called on customers to update Exchange Server to fix four vulnerabilities in the program.

Microsoft said it determined Hafnium was behind the hack “based on observed victimization, tactics and procedures.”

“While we worked quickly to implement an update for the Hafnium exploits, we know that many nation-state actors and criminals …

Read more from Source
Copyright @ thehill.com

  • Check the latest Hacking news updates and information.
  • Please share this news Microsoft says the Chinese hacking group is targeting security flaws in the corporate email app with your friends and family to support us your one share helps us a lot.
  • Follow us on Facebook and Twitter if you need more updates like this.

Disclaimer: If you need to edit or update this news from compsmag then kindly contact us Learn more


Source…

WatchGuard: Hackers Target Corporate Networks Despite Shift to Remote Work


Despite the shift to remote work, hackers continue to aggressively target corporate networks. Moreover, the rise of COVID-19-related malicious domains and phishing campaigns continues, WatchGuard said in its recent Internet Security Report for Q3 2020.

Key findings from the report include:

Network attacks. Rose by 90% from Q2 to 3.3 million, the highest level in two years. Unique network attack signatures also hit a two-year high in Q3. Takeaway: Businesses must prioritize maintaining and strengthening protections for network-based assets and services even as work forces become increasingly remote.

COVID-19. In Q3, a COVID-19 adware campaign running on websites used for legitimate pandemic support made WatchGuard’s list of the top 10 compromised websites. WatchGuard also uncovered a phishing attack hosting a bogus login page with an email lure around small business COVID-19 relief from the United Nations. Takeaway: Attackers will continue to exploit fear, uncertainty, and doubt from the pandemic to victimize organizations.

Phishing attacks and malicious links. In Q3, WatchGuard’s DNSWatch service blocked a combined 2.8 million malicious domain connections, or roughly 500 blocked connections per organization in total. Takeaway: A closer look shows that each organization would have reached 262 malware domains, 71 compromised websites, and 52 phishing campaigns.

Industrial control systems. In Q3, attackers exploited a previously-patched authentication bypass vulnerability in a popular supervisory control and data acquisition (SCADA) control system. Takeaway: Attackers targeted nearly 50% of U.S. networks with SCADA threats in Q3, a sign that bad actors could focus on industrial control systems in 2021.

LokiBot look-a-like. Farelt, a password stealer that resembles LokiBot was one of the most widespread malware detections in Q3. It’s not clear if the Farelt botnet uses the same command and control structure as LokiBot but it’s likely the SilverTerrier malware group created both malware variants. Takeaway: WatchGuard found solid evidence that Farelt has likely targeted many more victims than the data shows.

Emotet. The infamous banking…

Source…