<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/phishing/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #phishing</title><description>Cloud 9 Advisers - News #phishing</description><link>https://www.cloud9advisers.com/News/tag/phishing</link><lastBuildDate>Wed, 25 Feb 2026 06:46:39 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[CrowdStrike and Microsoft]]></title><link>https://www.cloud9advisers.com/News/post/crowdstrike-and-microsoft</link><description><![CDATA[The time is nigh! Work with Cloud 9 to help you understand the implications of the Microsoft/CrowdStrike outage, and the importance of prioritizing your resiliency plans.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_BW-RdzRUStqn2tRLQvnrKw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MfwtWHzqS4i06DgSeIZlJg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PiF5NKGWRGeW44UAlIQGTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cUtSUoCHTFOKeh66rQkEjw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">CrowdStrike and Microsoft Outage: Next Steps</span></h1></div>
<div data-element-id="elm_dbLpWrgG9btKNkhqk2nLKQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dbLpWrgG9btKNkhqk2nLKQ"] .zpimage-container figure img { width: 1110px ; height: 719.65px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/premium_photo-1661891469578-7fd063fe8b65" size="fit" alt="Gone Phishing" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_IdzSgC0MTNC5XShoJCB8Jg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><span style="font-style:italic;">The CrowdStrike and Microsoft Outage Aftermath: Next Steps b<span style="color:inherit;">y Jeff Hathcote, Solution Architect – Security</span></span></div></div></div>
</div><div data-element-id="elm_MdL4iZ4qne1puUXWMdajig" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eRIypUhC9s_awHRfxYQN8g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
<div data-element-id="elm_xKZasdZni9_lsW8XyXOObA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9hQYD5CF1cF_TMQMWrpOqw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">CrowdStrike and Microsoft: Hard at work</span></h2></div>
<div data-element-id="elm_47d_fKZjIEvJJO2ScyCcEw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>While unintentional in nature, the recent CrowdStrike outage caused disruptions that reverberated throughout the globe. While CrowdStrike and Microsoft are hard at work to rectify an estimated 8.5 million computers affected worldwide, guess who’s hard at play taking advantage of the situation? The bad guys and their phishing schemes.&nbsp;</div><br><div>Now is the time to work with Cloud 9 to help you understand the implications of the outage, and the importance of prioritizing your resiliency plans.&nbsp;</div></div></div>
</div><div data-element-id="elm_zcOcY4hv52Ci7fnEu35jeg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>The vital role of Cloud 9 Advisers and Essential Discussion Points:&nbsp;</div></div></h3></div>
<div data-element-id="elm_IuIQOFNClESqgHUVAciBeg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">In the aftermath of the CrowdStrike outage, Cloud 9 has a critical role to play as your trusted adviser. We can help with guidance on navigating this crisis in two ways: 1) Helping you comprehend the situation, and 2) Advising you on how to strengthen your defenses to avoid a similar disaster from impacting your organization (any sized company is vulnerable to modern cyber threats.)</span><br></div></div></div>
</div><div data-element-id="elm_x9HNJnuJpRm6d1cv2hvRYQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">1. Understanding the Outage</h3></div>
<div data-element-id="elm_n7qc4uPbI4NAln0tIN4aVQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It is important to note that the CrowdStrike/Microsoft outage was NOT a cyberattack. The incident began with a software update. As part of its ongoing threat protection, CrowdStrike regularly updates its sensor with the latest threat data. In this instance, the update violated a protected memory address within the Microsoft Windows environment, causing the operating system to encounter a critical error, resulting in the ubiquitous “blue screen of death” where an affected device is unable to recover on its own.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">The workaround to the issue involved a very manual process, requiring users/admins to log in to each machine under “safe mode” and remove the registry key that contains the faulty code. This event shows just how connected technology products are within our ecosystem, and one failure can cause a cascade of devastating impact on an entire infrastructure.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">While both CrowdStrike and Microsoft are working diligently to assist in recovery efforts, we all need to be aware of the potential for secondary attacks from cybercriminals based on information collected via a phishing attack.</span><br></p></div>
</div><div data-element-id="elm_NcoAZHm8B-oI2l1yW9c2DQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Learning from the Incident: How to Outsmart the Bad Guys&nbsp;</span></h3></div>
<div data-element-id="elm_C6GfVnZQRaUrMM9LWCcJ-A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Within hours of the incident on July 19, 2024 CrowdStrike warned of malicious activity trying to exploit the outage. One primary method that cybercriminals are using is to send phishing emails purportedly from CrowdStrike (or Microsoft) using “spoofed” addresses (i.e., somebody@crowdstrikeoutage.com) with malicious attachments or simply to gather information for a later compromise.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">CrowdStrike and Microsoft are working around the clock to provide guidance as well as potential tools to assist with recovery. Some good, free advice: DO NOT OPEN any emails from unofficial addresses posing as CrowdStrike or Microsoft support and thoroughly questioning any potential phone calls you may get from CrowdStrike staff; they are likely impersonators.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Additionally, this unfortunate incident opens up the conversation for developing (or revisiting) a robust cybersecurity prevention and recovery plan. With access to a breadth of cybersecurity providers, solution architects, and managed services, Cloud 9 has the opportunity to help you with your entire strategy – from organization-wide cyber training, to IT outage response plans, to infrastructure automation for disaster recovery, to third-party risk management and consulting programs.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Or, if you’re a maverick and really want to stir the pot, we can even help you switch it all over to Google and Chromebooks!</span><br></p></div>
</div><div data-element-id="elm_PvWE-YmOmiQ74IecKqfNJA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_EetI2UTqO1dxKV4cI0ZcHA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Final Thoughts&nbsp;</span></h2></div>
<div data-element-id="elm_v8SsmFVdGuladHKvWgLe9g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>“This high-impact event emphasizes the urgency to keep resiliency plans current, communicated, and understood within the organization to avoid the types of customer disruptions experienced since July 19. Like other industry disruptions this year, this event creates conversational opportunities about how to best prepare organizations for these inevitabilities.” – Koby Phillips, VP of Advanced Solutions</div><div><br></div><div>While the CrowdStrike outage presents significant challenges, Cloud 9 is ready, willing, and able to offer expert guidance. We can assist you in navigating this crisis and help you emerge stronger and more resilient. To that end I ask: Which components or upstream service providers in your environment are you dependent on? Are you considering additional resiliency around your mission critical vendors?&nbsp;</div></div></div>
</div></div><div data-element-id="elm_P9DpTgzYPFu6ERx7hBJIeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_fzuNUrktQPefn_tpyo1leQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 09 Aug 2024 14:22:27 -0500</pubDate></item><item><title><![CDATA[Gone Phishin']]></title><link>https://www.cloud9advisers.com/News/post/gone-phishin</link><description><![CDATA[How do you make sure they get it? Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built it. This article breaks down the benefits, from measuring your employees' security awareness to creating a robust culture of security within your organization]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yh9E0qS8QRCLVOhOZBtECQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cmTvcBk5R6qCrTN0a_-mMA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FYfILkFASHilE4nIBFxXLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pGAEwMj4Qw-X2BsHWSsGbw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">SATs plus Phishing Simulation,&nbsp; A No-Brainer</h2></div>
<div data-element-id="elm_ZC_GRSvORHOj8Q0u6ZAvUQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZC_GRSvORHOj8Q0u6ZAvUQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Arm yourself with knowledge and enhance your organization's cyber resilience.&nbsp;</span>Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built in.&nbsp;<span style="color:inherit;">Uncover the power of testing your team's resilience against the ever-evolving threat of phishing attacks.</span></p></div>
</div><div data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width: 1110px ; height: 740.23px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Fichinggear.jpg" width="415" height="276.75" loading="lazy" size="fit" alt="phishing: get the right gear " data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Ut-IXSwHsErvU-q96vfiJA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ut-IXSwHsErvU-q96vfiJA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ErohqKevIZpCbCpNfYy8yg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ErohqKevIZpCbCpNfYy8yg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_rdkX4Y-1dSyg7QqF7NvHjg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rdkX4Y-1dSyg7QqF7NvHjg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strengthening Cyber Defenses</span></h2></div>
<div data-element-id="elm_nK3v7DYVyKxyhK40QmXdnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nK3v7DYVyKxyhK40QmXdnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In the ever-evolving landscape of cybersecurity, where human error remains the leading cause of incidents, the significance of robust Security Awareness Training (SAT) cannot be overstated. A recent study by IBM revealed that a staggering 95% of cybersecurity breaches stem from human error, emphasizing the critical need for proactive measures. In our previous exploration of SAT, we delved into the pivotal role it plays in mitigating these errors. Now, let's journey further into the realm of cyber resilience and focus on a key augmentation to SAT – the indispensable Phishing Simulation.</div></div>
</div></div><div data-element-id="elm_1bLPKzhlrFEGJNIHmFAMiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1bLPKzhlrFEGJNIHmFAMiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">The Power of Security Awareness Training:</span></div><div>Security Awareness Training (SAT) acts as a shield against the inadvertent actions and decisions that can lead to security breaches. It equips your staff with the knowledge to navigate the intricate web of scams, tactics, and evolving security threats. This empowerment, in turn, aids in fostering a security-conscious culture within the organization, reducing the exposure to potential risks.</div></div></div>
</div><div data-element-id="elm_Q1Egef7ApYLavdkL8b6LVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q1Egef7ApYLavdkL8b6LVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Enter Phishing Simulation:</span></div><div>While SAT lays the groundwork for understanding security principles, the integration of phishing simulation takes your cybersecurity strategy to the next level. It serves as the litmus test for your employees' comprehension of security threats, specifically their ability to identify and thwart phishing attempts.</div></div></div>
</div><div data-element-id="elm_6vqCB8i9oG56Alja-1nHig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6vqCB8i9oG56Alja-1nHig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Putting Knowledge to the Test:</span></div><div>Phishing simulation operates on the premise of realism. By deploying lifelike phishing scenarios, organizations can gauge the reactions of their employees in real-time. Do they recognize the subtle signs of a phishing email, or do they inadvertently open the door to potential threats? The simulation provides invaluable insights into the efficacy of your SAT program and identifies areas that may require additional attention.</div><div><br></div><div><span style="font-weight:bold;">Creating a Cyber-Resilient Workforce:</span></div><div>The true value of phishing simulation lies in its ability to fortify your workforce against the ever-persistent threat of phishing attacks. It goes beyond theoretical knowledge, allowing employees to apply their learning in a practical setting. As they face simulated phishing attempts, the training becomes a dynamic experience, honing their instincts and enhancing their ability to make informed decisions.</div></div></div>
</div><div data-element-id="elm_s-tZ3ZYGSTPbe5DG7EwIIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s-tZ3ZYGSTPbe5DG7EwIIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Strategic Benefits of Phishing Simulation:</span></div><div><ol><li><span style="font-weight:bold;">Measuring Security Awareness:</span>&nbsp;Phishing simulation becomes a litmus test for your employees' security awareness. Identify those who may be more susceptible to falling victim to a phishing attack, enabling a targeted and effective SAT program.</li><li><span style="font-weight:bold;">Enhancing Phishing Identification Skills:</span> Practical exposure to realistic phishing emails sharpens your team's ability to discern the telltale signs of a scam. This, in turn, empowers them to avoid clicking on malicious links or opening potentially harmful attachments.</li><li><span style="color:inherit;"><span style="font-weight:bold;">Fostering a Culture of Security:</span> Beyond individual training, phishing simulation contributes to creating a broader culture of security within your organization. When employees witness the organization's commitment to rigorous testing, they are more likely to embrace and adhere to security precautions.</span><br></li><li><span style="font-weight:bold;">Reducing the Risk of Data Breaches&nbsp;</span>By reducing the number of employees susceptible to phishing attacks, organizations can significantly lower the risk of data breaches. This proactive approach safeguards against financial losses, reputational damage, and potential regulatory fines.</li></ol></div></div></div>
</div><div data-element-id="elm_Czr4XaK8rSVoZWTVt1LPeA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Czr4XaK8rSVoZWTVt1LPeA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In the intricate dance between cybersecurity and human behavior, the synergy between SAT and phishing simulation emerges as a formidable defense. Together, they empower your workforce to navigate the digital landscape with confidence and resilience. As we continue to unravel the layers of cyber resilience, the integration of these two components stands as a testament to the proactive measures organizations can take to secure their digital future.</span><br></p></div>
</div><div data-element-id="elm_D3JY2olThnNIJPyTecDpMg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_D3JY2olThnNIJPyTecDpMg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div><div data-element-id="elm_asEEiIWQCazHW3X3kMnKxw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_asEEiIWQCazHW3X3kMnKxw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_wIxa3v2SMdOUWFlYbpa1jQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wIxa3v2SMdOUWFlYbpa1jQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_X8m4xCwJtbkfaBfFpez5Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X8m4xCwJtbkfaBfFpez5Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Let us help you find the right SAT and Phishing simulation solutions and providers. Our only job in this world is to help organizations buy &quot;cool&quot; and important stuff: i.e. cybersecurity.&nbsp;</p></div>
</div><div data-element-id="elm_G4p6T1TmsxQw_TRfzwakAQ" data-element-type="buttonicon" class="zpelement zpelem-buttonicon "><style> [data-element-id="elm_G4p6T1TmsxQw_TRfzwakAQ"].zpelem-buttonicon{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-icon-align-left " href="/contact-us"><span class="zpbutton-icon "><svg viewBox="0 0 512 512" height="512" width="512" xmlns="http://www.w3.org/2000/svg"><path d="M500 224h-30.364C455.724 130.325 381.675 56.276 288 42.364V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v30.364C130.325 56.276 56.276 130.325 42.364 224H12c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h30.364C56.276 381.675 130.325 455.724 224 469.636V500c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-30.364C381.675 455.724 455.724 381.675 469.636 288H500c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zM288 404.634V364c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v40.634C165.826 392.232 119.783 346.243 107.366 288H148c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12h-40.634C119.768 165.826 165.757 119.783 224 107.366V148c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40.634C346.174 119.768 392.217 165.757 404.634 224H364c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40.634C392.232 346.174 346.243 392.217 288 404.634zM288 256c0 17.673-14.327 32-32 32s-32-14.327-32-32c0-17.673 14.327-32 32-32s32 14.327 32 32z"></path></svg></span><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 04 Dec 2023 11:53:38 -0500</pubDate></item><item><title><![CDATA[Wuhan Virus Phishing Attacks]]></title><link>https://www.cloud9advisers.com/News/post/wuhan-virus-phishing-attacks</link><description><![CDATA[I just got an e-mail from the WHO asking for a donation to help fight coronavirus. It looked good. It sounded good. It was a fake. Asking for a donation in Bitcoin set off my alarm. We may get sick, but phishing, the art of conning people via email or texts, is as healthy as ever.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nEHdzGikQo-YjjAEbrK9ww" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9ZedyRO4Sd-RTf7fqCwvlg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_9ZedyRO4Sd-RTf7fqCwvlg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FAkggxIPSpCmePxw4wAhaQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LVEuWmU8SiCN4t2wt5ohEg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LVEuWmU8SiCN4t2wt5ohEg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How to protect yourself from coronavirus phishing threats</span></h1></div>
<div data-element-id="elm_tru_er2VGTTcxl5G1lVKfg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_tru_er2VGTTcxl5G1lVKfg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Wuhan-virus-phishing-attacks.jpg" size="fit" alt="Andreus / Getty Images / Clker-Free-Vector-Images I just got an e-mail from the World Health Organization (WHO) asking for a" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_LYoRRuPHROauMmHceJDxNg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LYoRRuPHROauMmHceJDxNg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div>The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and avoid COVID-19 phishing attacks.&nbsp; &nbsp;By:&nbsp; Steven J. Vaughan-Nichols. see the article <a href="https://www.idginsiderpro.com/article/3535411/how-to-protect-yourself-from-coronavirus-phishing-threats.html?utm_source=Adestra&utm_medium=email&utm_content=Title%3A%20How%20to%20protect%20yourself%20from%20coronavirus%20phishing%20threats&utm_campaign=IDG%20Insider&utm_term=Editorial%20-%20IDG%20Insider&utm_date=20200415213806" title="here" target="_blank">here</a></div></div>
</div><div data-element-id="elm_A0GPgra78MKSrG7DmIwzLQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_A0GPgra78MKSrG7DmIwzLQ"].zprow{ border-radius:1px; margin-block-start:135px; } </style><div data-element-id="elm_k9E0E23F1ho9Xiz7zr50VQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_k9E0E23F1ho9Xiz7zr50VQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_9uBFa23-_pwkFwDeXkiF3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9uBFa23-_pwkFwDeXkiF3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>I just got an e-mail from the World Health Organization (WHO) asking for a donation to help fight coronavirus. It looked good. It sounded good. It was a fake. Asking for a donation in Bitcoin set off my alarm. Anytime, anyone asks you for Bitcoin in an email they're trying to scam you. We may get sick, but phishing, the art of conning people via email or texts, is as healthy as ever.</div><p><br></p><div>&quot;In addition to identifying generic phishing attempts, there are also ways of spotting coronavirus-specific phishing messages.&quot;</div><p><span style="color:inherit;"><br></span></p><div>So, as we face the deadly threat of coronavirus, you should know that there's no situation so awful that someone won’t take advantage and make it even worse by using it to steal from people. According to network security firm Barracuda Networks, there's been a steady rise in the number of COVID-19-related email attacks since January. But, in March, Barracuda researchers say they've seen a recent spike, 667%, in Coronavirus phishing messages.</div><p><br></p><div>To be exact, from March 1 to 23, researchers detected 467,825 spear phishing email attacks, and 9,116 of those detections were related to COVID-19, representing about 2 percent of attacks. That doesn't sound like much, but in February, 1,188 coronavirus-related email attacks were detected and only 137 were detected in January.</div><p><br></p><div>Phishing thrives on fear. &quot;Although the overall number of these attacks is still low compared to other threats, the threat is growing quickly,&quot; Barracuda said in a statement.</div><p><br></p><div>Paul Walsh, CEO of Metacert, which makes a web browser extension that warns you of dubious websites, agreed. &quot;For malicious people, preying on collective fear and misinformation is nothing new. Mentioning national headlines can lend a veneer of credibility to scams. We've seen this tactic time and again, so it's no surprise that COVID-19 themed social media and email campaigns have been popping up online.&quot;</div><p><br></p><p>Simultaneously, cybersecurity company Check Point announced that crooks are registering malicious coronavirus-themed websites. Since January 2020, there are over 4,000 new sites containing words like “corona” or “covid.” Check Point estimates these new Coronavirus-themed domains are 50 percent likely to be dangerous. I’m surprised the percentage isn’t higher.<br></p><p><br></p><div>That said, they're not all bad sites. Rob Ragan, principal researcher at Bishop Fox, a security firm specializing in offensive security testing, said, &quot;[Although] thousands of new domains are being registered to opportunistically garner COVID attention online. A lot of them are legit, a lot are trying to make money from selling merchandise or supplies.&quot; That said, many of these &quot;are fraud or phishing sites.&quot;</div><p><br></p><div>Another security firm, RiskIQ, found no fewer than 317,000 new dubious websites were created with coronavirus-related keywords during the two-weeks between March 9 and 13. And, it's not slowing down any. RiskIQ is providing a constantly updated list of suspicious coronavirus sites. The company is spotting tens of thousands of new dubious sites every day.</div><p><br></p><div>Does that sound paranoid? It's not. As the saying goes, &quot;You're not paranoid if they really are out to get you.&quot;</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">COVID-19 phishing basics</span></div></div><div>Most, but not all, phishing messages tell a story. Anytime you get an email, text, or instant message (IM) with any of the following traits, be very careful.</div><p><br></p><div>First, don't trust any message that looks like it's from a company you already do business, which tells you your account has had suspicious activity, needs an updated credit-card number or has had unauthorized login attempts. All that may be true, but if the message then asks you to login in via a website within the message to resolve the issue, odds are you're being scammed. Other variations of this include presenting you with a demand you click on a link to make an immediate payment, get a refund, or offer you free stuff.</div><p><br></p><div>You should also never follow up on an email asking for your personal information. No honest email is going to ask for your Social Security number or login information. Never, ever respond to such an email with your personal data.</div><p><br></p><div>Some phishing messages will appear real because they sound like it's from someone or some company that already knows facts about you. That's because with numerous corporate data hacks, such as 2017's Equifax breach, most of us already have much of our personal data out there on the dark web.</div><p><br></p><div>For example, many extortion messages will tell you that they have incriminating video or information about you and &quot;prove&quot; it by showing you an old password. They didn't get it by hacking your computer. They got it from one of those many data breaches.&nbsp;</div><p><br></p><div>And, let's not forget, if you're on Facebook or the like, it's not hard at all to find out where you went to school, that your dog's name is Spot, and what your favorite flavor of ice cream is. Remember, a message that looks questionable probably is, just because it contains a random fact or two about you, doesn't mean it's trustworthy.</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">Spotting phishing messages</span></div></div><p>The easiest way to spot phishing messages is if they start with &quot;Dear user” or “Dear [your email address].&quot; Real business emails either skip a salutation or address you by your first and last names or by your business name. Any &quot;dear user&quot; message is from a loser.<br></p><p><br></p><div>Another quick way to spot bogus messages is to look at the From email address field. Usually, but not always, the address is subtly wrong. For example, PayPal, the most frequently abused company by phishers, proper email address ends with &quot;paypal.com.&quot; But, you'll often see phishing messages from fake addresses such as paypal@notice-access-275.com. If an address doesn't look exactly right, delete it.</div><p><br></p><div>Next, look at the message's web link. Hover over the link with your mouse pointer. Does the address look right? If, for example, you get a message from Amazon warning you that your account is about to be suspended, and when you hover the link instead of amazon.com you see something like amazon.com.xyz. Those are always fake, dangerous websites and you should never click on them.</div><p><br></p><div>Worried that maybe a message that looks a bit dodgy was real? Then, contact the company via a normal route. Just, whatever you do, do not connect via a link within the message.</div><p><br></p><div>Another way to spot a scam email is if it contains poor spelling and grammar. I subscribe to the theory that these blunders are a ‘filtering system.’ If you can't spot the mistake, the idea goes, you're likely to miss the attack hidden within the message as well. Be that as it may, if a message looks like the sender failed high-school English, don't open it.&nbsp;</div><p><br></p><div>Still, another common way of messing you is to include an attachment containing some kind of malware. Lately, I've been seeing a lot of fake invoices containing a dose of poison. Any time you get an attachment from anyone, unless you know for certain it's safe, don't open it. Instead delete the message and move on.</div><p><br></p><div>Not sure about a message that looks like it's from a coworker or friend? Ask yourself, &quot;Were we expecting an email from them?&quot; Or, ask them via a different medium, such as a phone call, Slack message, whatever, to verify that they had indeed emailed you.</div><p><br></p><div>Finally, Walsh warns that simply because a site is encrypted with HTTPS doesn't mean it's a trustworthy site. &quot;Over 93 percent of all phishing sites classified by MetaCert start with HTTPS.&quot;&nbsp; All HTTPS means is that data transmission to and from the site is encrypted. It has nothing to do with being able to trust the site's data.</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">Detecting coronavirus phishing</span></div></div><div>In addition to identifying generic phishing attempts, there are also ways of spotting coronavirus-specific phishing messages.</div><p><br></p><div>First, as the Electronic Frontier Foundation (EFF) points out, if &quot;an email sounds too good to be true (“New COVID-19 prevention and treatment information! Attachment contains instructions from the US Department of Health on how to get the vaccine for FREE”), it probably is.&quot; Let me get even more specific. There will be no cure, no vaccine, no miracle fix, no radical new treatment from a local doctor, for coronavirus. Anyone telling you otherwise is lying or trying to sell you something.</div><p><br></p><div>If you get an email demanding you do something about coronavirus right now -- (URGENT: COVID-19 medication shipment blocked. Please accept order here to receive medication) -- it's not real. If someone needs to do something immediately about the virus, they're not likely to be doing it via an email.</div><p><br></p><div>There are also many phishing messages purporting to be from the World Health Organization (WHO), Center for Diseases Control (CDC), and US Centers for Disease and Prevention warning you of new dangers or wonderful cures and to learn more just click &lt;Here&gt;. I won't say they're all fake, but I haven't seen a real one yet.</div><p><br></p><div>What makes this particularly villainous is such messages, claiming, for instance to provide vital information about how to prevent and treat COVID-19, are being directed at doctors, nurses and other medical professionals. They, like you, must be wary of messages that appear real, but aren't.</div><p><br></p><div>An especially insidious version of this appears to be from medical suppliers. These claim a delivery can't be made without some action by a hospital staffer to complete the order. With hospitals running out of ordinary, but vital medical supplies such as rubber gloves and N95 masks, and looking for them from any possible source, this kind of phishing has much too high a chance of succeeding.</div><p><br></p><div>Such messages typically contain links that lead to malicious code. Malwarebytes Labs reports that some Coronavirus phishing messages will give you a case of AzorUlt malware. Once in place, it will scan your computer for more data, pass it along to a botnet command and control server. Then, once it has information it can use, it can then download and execute more malicious code, such as ransomware</div><p><br></p><div>So far, so normal, but Krebs On Security has found some attackers use the Johns Hopkins University coronavirus map to make its poisoned messages look trustworthy. The moral of the story is that coronavirus phishing messages are especially good at fooling even the practiced security eye.</div><p><br></p><div>Finally, it's not just your computer that's in danger. DomainTools recently reported a new&nbsp; Android ransomware app that pretends to be a coronavirus update application. This one came with a mistake, which rendered it mostly harmless. Others won't. When someone sends you a message containing a link to a great new COVID-19 phone app, be careful of it. Don't download it via the message. Go to your app store and get it from there.&nbsp;</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">4 tools to help you beat coronavirus phishing</span></div></div><p>If you can't trust your own eyes -- and with as much stress as we're now under you can't -- you need other tools to keep you safe. These include the following:<br></p><ol><li><span style="font-weight:bold;">PC security software</span>: Antivirus programs can help block phishing attacks. Set your program to update automatically, so it can deal with any new security threats. As I pointed out, there's a constant flood now of new coronavirus phishing sites.<br></li><li><span style="font-weight:bold;">Use email server anti-phishing services</span>: These can stop bad messages before users are ever exposed to them. Among others check out GFI MailEssentials, Sophos Phish Threat and Barracuda Email Security Gateway.<br></li><li><span style="font-weight:bold;">Use cloud-based services</span><span style="font-weight:bold;">to scan for and detect phishing</span>: Such services include INKY and Metacert. These use white-listing approaches, which block unknown and potentially dangerous messages and sites, while letting traffic from known trustworthy sites through.&nbsp;</li><li><span style="font-weight:bold;">Switch your Domain Name Server (DNS) setting to a DNS service which provides filtering</span>: Some DNS systems, including CleanBrowsing, OpenDNS, SafeDNS and Quad9, automatically attempt to block questionable sites. With these, you literally can't go to a bad site.</li></ol><div><br></div><div><span style="color:inherit;">Armed with these tools you should be OK. This is a rough time, but with care and due diligence, you and your systems will make it through OK. Good luck and stay safe.</span><br></div></div>
</div></div><div data-element-id="elm_JcAIz-pSmgnf11Fny1AvfQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_JcAIz-pSmgnf11Fny1AvfQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JdukN19eWcvNk8UJpkscvQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_JdukN19eWcvNk8UJpkscvQ"] div.zpspacer { height:445px; } @media (max-width: 768px) { div[data-element-id="elm_JdukN19eWcvNk8UJpkscvQ"] div.zpspacer { height:calc(445px / 3); } } </style><div class="zpspacer " data-height="445"></div>
</div><div data-element-id="elm_d4cZzzib8n-okvMU_kJqQQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d4cZzzib8n-okvMU_kJqQQ"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p>Skip to the end of the article to see the top four tips, tircks, and tools to help stop coronavirus and other phishing attacks. Contact Cloud 9 to get independent, vendor-agnostic, expert help and find the right security solutions for your business</p></div>
</div></div><div data-element-id="elm_Dc1a62GAL9hXiNLSqxSA0A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Dc1a62GAL9hXiNLSqxSA0A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about email and phishing security" title="consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div><div data-element-id="elm_eTJk02capeS51oi4qJA19g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_eTJk02capeS51oi4qJA19g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_BX08X193-mnbXTpqmgxAWQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BX08X193-mnbXTpqmgxAWQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about email and phishing security" title="consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 15 Apr 2020 19:51:56 -0500</pubDate></item></channel></rss>