Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Summer Cyber-Crime to Soar
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Summer Cyber-Crime to Soar
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
FeaturedTrends

Summer Cyber-Crime to Soar

Now that the travelling season is very much upon us, executives and key personnel at all levels will be deciding whether to pack a tablet or a slim laptop or just rely on their smartphone.

Hildegard Johnson
August 7, 2023 at 9:05 AM
By Hildegard Johnson Hildegard Johnson
Share
SHARE

Now that the travelling season is very much upon us, executives and key personnel at all levels will be deciding whether to pack a tablet or a slim laptop or just rely on their smartphone.

Contents
Cybersecurity problems acerbated in July and AugustBeware weaponized QR codes in cafes and bars

In today’s precarious jobs market, very few professionals feel confident enough of their position to be completely cut off from their colleagues for weeks on end, even when travelling on holiday. Irrespective of any potential psychological harm that today’s remorseless ‘always-on’ culture causes, there are seasonal dangers of which every Ciso and CIO should be acutely aware.

Travelling executives and techies are always a nightmare for security departments. Laptops stolen from unlocked cars or rooms, smartphones misplaced on a night out and other physically compromising events are only the tip of the cybersecurity iceberg. For example, an executive checking their emails in a hotel lobby on the hotel Wi-Fi is open to an old-fashioned “Pineapple” attack, where someone also the lobby has a portable device in their bag that effectively takes over the local Wi-Fi allowing criminal full access to whatever online activity the others in the room are engaged in. Anyone compromised in this fashion is likely to remain unaware of it until it is too late.

Cybersecurity problems acerbated in July and August

But these problems are exacerbated during the holiday-season months of July and August. For example, someone relaxing on the beach is more likely to have a panicked reaction to an urgent-sounding message from their workplace. Squinting at the screen in bright sunlight, they may not remember to stop and check the URL from where the message was sent before clicking on a link. If the fake message sounds sufficiently convincing and appears to come from a trusted colleague and contains personal references, a travelling executive can easily be duped into opening a link and inadvertently downloading a malicious payload or supplying confidential access codes.

According to a report published last year by the US Cybersecurity and Infrastructure Security Agency: “Cyber actors have conducted increasingly impactful attacks against US entities on or around holiday weekends over the last several months…In some cases, this tactic provides a head start for malicious actors conducting network exploitation and follow-on propagation of ransomware, as network defenders and IT support of victim organizations are at limited capacity for an extended time.”

The report added that, in 2021, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) both observed an increase across the United States in highly impactful ransomware attacks occurring on holidays and weekends, when offices are normally closed, as recently as the Fourth of July holiday of that year.

Beware weaponized QR codes in cafes and bars

But, this year there are even more opportunities for determined cybercriminals. Most cafes, restaurants and bars, even in fairly undeveloped regions, now have free wi-fi with poor or almost non-existent cybersecurity for the use of customers. Many also have a QR code printed on the table rather than a regular menu to be scanned with the customer’s smartphone. Unfortunately, QR codes can be designed to operate in in a similar way to an innocent-looking weaponized link in a phishing email. The diner can still see only the menu on their smartphones and are unaware of the poisoned payload they have accidentally downloaded that will expose any confidential data held on the diner’s smartphone. A weaponized QR code is impossible to spot without highly sophisticated software.

The only real solution is for staff to leave any devices carrying sensitive data or passwords at home and use a purely private device for things like scanning QR codes or hopping onto the bar’s Wi-Fi network to make a WhatsApp call.

The same thing applies to other mobile devices such as tablets and laptops. All these devices are proving irresistible to cybercriminals anxious to make a killing during the travel season. According to a survey from Forbes Advisor conducted at the start of this year, 43% of respondents had their online security compromised while using public Wi-Fi. Forbes Advisor recommends ensuring that any Wi-Fi network accessed is secured with encryption technology and that you use a strong password on your device. It also suggests using a virtual private network (VPN) when connecting to public Wi-Fi.

The widespread adoption of artificial intelligence (AI) by cybercriminals at all levels means that this summer is likely to be particularly dangerous for travelling executives and key staff. Professionally executed, spear phishing, the process of targeting a specific executive or key member of staff involved what was previously a tedious process called ‘social engineering’, which meant trawling social networking sites, conference announcements, corporate websites, industry journals and other sources to build a detailed profile of the targeted individual and their travel plans. What might have taken a relatively inexperienced hacker days or even weeks can be achieved in minutes using publicly-available AI platforms such as Microsoft-backed ChatGPT.

It is essential that cybersecurity teams immediately educate all staff on the dangers of accessing online services while travelling. They should also take pains to ensure that there is restricted access to confidential data while staff are on leave. Those key members of staff who potentially may need access to the corporate network while travelling or at a holiday location should be taught to use a VPN and to carry their own wifi hotspot, a common feature on many smartphones, and use that to log in rather than joining an open network at an airport, hotel or café.

Hildegard Johnson August 7, 2023 August 7, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Irresistible Rise of The Middle-Class Cybercriminal
Next Article New Spoofing Tools Target Smartphones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

Generative AI Disappointment
AINewsTrends

Businesses turn their back on GenAI

The reaction of businesses to the introduction of generative AI (GenAI) in the year since the launch of Microsoft-backed ChatGPT is one of increasing suspicion and disappointment. Over one in four organizations have banned the use of GenAI outright. The majority of companies are now also refusing to trust a technology that has already gained a reputation for making errors and even entirely fabricating information, a failing that is referred to as “hallucinating”. According to Cisco’s newly-released 2024 Data Privacy Benchmark Study, 68 percent of organizations mistrust GenAI because it gets results wrong and 69 percent also believe it could hurt their company’s legal rights. The study draws on responses from 2,600 privacy and security professionals across 12 geographies. 

January 30, 2024
Ransomware gangs
NewsransomwareTrends

Ransomware gangs start to fight dirty

According to cybersecurity company SecureWorks’ annual State of the Threat Report, over the last 12 months, attackers have shortened the time between the initial penetration of the corporate network to the ransomware demand itself from 4.5 days to less than one day. This period, known in the cybersecurity industry as ‘dwell time’, offers well-equipped cybercriminals a leisurely opportunity to drain the company of funds and its most sensitive secrets. In 10 percent of cases, ransomware was even deployed within five hours of initial access.

October 13, 2023
AnalysissextortionTrends

Sextortion scams soar by 178%

Security researchers, ESTET reports a 178% increase in sextortion emails between the first half of 2022 and the first six months of 2023, marking the category out as a top email threat. The company ranks sextortion emails third among all email threats in H1 2023.

August 26, 2023
AnalysisThreat IntelligenceTrends

Companies slow to take the fight to cybercriminals

According to a study conducted in June, “Threat intelligence: Eyes on the enemy,” by threat intelligence firm Cyber Risk Analytics (CRA), vulnerability priority is the chief use of threat intelligence for 70 percent of the study’s respondents; 65 percent of those respondents also stated that they are starting to use threat intelligence to aid them with reactive incident response. By contrast, proactive measures still rank low on the list of primary uses for threat intelligence where most organizations are concerned, with 50 percent of respondents using threat intelligence for threat hunting and 46 percent, fewer than half, using actionable threat intelligence providing advanced warning against future attacks.

August 17, 2023

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?