Social Engineering threats, Email threats. Zero Day threats… With so many threats these days, keeping a computer system or network clean can be a full time job. Wouldn’t it be nice if there was an Early Warning System that could prepare you before the attack actually hits? Is this a pipe dream? To some it is, but if you know how to prepare, you can get ahead of the threats and protect yourself and your networks from these dangers. How, you ask? It will involve some old school techniques combined with new cutting edge technology. Let me explain!
1) The U.S. Post Office does not send an email unless you sign up for tracking on a package. “Customers would receive notification via postcard that they needed to pick up a parcel or it would be posted on the door,” said Tammy Mayle, Postal Inspector. No matter what — always be wary of any email claiming to come from the Postal Service. “The Postal Service doesn’t have an email address for every postal customer available,” said Mayle.
2) The IRS does not communicate with anyone via email for tax bills, etc.
http://www.irs.gov/uac/Don%E2%80%99t-be-Scammed-by-Fake-IRS-Communications
3) This also holds true for UPS and FedEx. Recent scam emails from FedEx used the following ‘from’ email address:
From: FedEx Online Team Management. <wednailofficer@gmail.com
Real email from FedEx would NOT be from a Gmail account!
Another thing to keep in mind is that an estimated 90% of .doc and .xls files contain a macro virus. If the customer is attaching a deprecated Word document with the now unsupported .DOC extension or a deprecated Excel document with the now unsupported .XLS extension, it is suspect. The .DOC and .XLS formats have been officially retired and are unsupported by Microsoft and are now known to be harbors for Macro-related viruses. If you are going to email files, then the files should be zipped. Regardless, many people still open emails containing .XLS file extensions, simply because they do not pay attention. It is the same reason some might get drive by infections from installing a program simply because they clicked next, next, next without reading the text in the box. This is Social Engineering in action.
Most people like to get packages, especially if they contain free stuff! When you receive an email announcing your order is en route or you need to claim your package, it may be too big of a temptation not to open it. Curiosity often gets the best of us. Another great example of social engineering can be found in the “I Love You” virus from a few years ago. Based on the simple fact that all (well most) of us want to be loved, users were urged to open, not a warm message from a loved one, but a virus that infected their entire machine and turned it into an email server that dished up a similar email to everyone in their address book. This particular virus spread like wildfire. Patches were built for most email clients to help stop this and most anti-virus programs no longer allow individual machines to become ‘email servers’. Rather than fixing the problem after it has occurred, however, it is best to stop these social engineering attacks from wreaking havoc in the first place by using a combination of common sense and security.
Security and privacy issues can only be resolved if users take a more careful approach to what and how much information they share. Until everyone learns what to watch out for, there will be issues with infection and hijacking of systems. You may also find many websites containing good information on prevention and protection from infection by simply googling“preventing social engineering”. If you have questions or comments about this article, contact me.
All product names / logos, company names / logos are copyrights of their respective holders. John Boline is an MCSE, MCTS, CNE, USE and a member of the Network Professional Association.The content herein is often based on late-breaking events. Much of the material is based on information from sources that are believed to be reliable. Hagerman & Company, Inc. disclaims all warranties as to the ultimate accuracy or completeness of the information. Hagerman & Company, Inc. and its employees shall have no liability for errors, omissions or inadequacies in the information contained within this article or for any interpretations thereof. The recommendations, positions and best practice policies outlined herein represent Hagerman & Company, Inc. initial analysis and therefore are subject to change as further information which may have bearing on these positions is made available. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice. Hagerman & Company, Inc. assumes no obligation to update the forward-looking statements made in this newsletter to reflect any change in circumstances, after the date of publication.Entire contents © 2015 Hagerman & Company, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden.