Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Russian-Backed Attackers Spear Phish U.S. Car Company
Facebook   X   LinkedIn   Email

Russian-Backed Attackers Spear Phish U.S. Car Company

June 9, 2024

Spear phishing attacks by a notorious Russian-backed threat group were launched against a large U.S. car manufacturer, who is currently unnamed. The group known as FIN7 used the highly targeted phishing campaign to attack IT department employees and others with top levels of system access.

The Russian cybercrime syndicate FIN7, aka Carbanak, came to prominence in 2015. The threat group is also known for ransomware attacks against the gambling and hospitality industries. In this latest attack, FIN7 directly targeted IT employees and those in upper levels of the company, often referred to as “whales.”

FIN7 used typosquatting, aka URL hijacking, a type of social engineering attack. Threat actors create a fake URL, often with a slight change in spelling from the legitimate website that goes unnoticed. The bogus, malicious website is used for fraud, or in the case of the car manufacturer, spreading malware.

The group also used socially engineered phishing tactics that can target victims by name, title, and other PII to lure the victims to click on a typosquatting website. Just one click downloads malware, which is especially dangerous when a device is connected to a corporate network. Having that network access gave FIN7 the ability to compromise the car manufacturer’s security and run amok in its system.

Safety First

Lessons to learn from FIN7’s attack is that no employee is immune from being targeted, especially those from management to C-suite. Even though we tend to think phishing attacks target lower-level employees, which they do, the reality is every level staff is fair game. That’s especially true since attacks against upper-level personnel offer attackers higher levels of system access.

For things we can control, red-flagging socially engineered attacks, or those using personal information to lure us, is something we should all be aware of. These attacks can use our job and title, and also arrive in our personal email accounts. They often use lures like urgency and other ways of prompting a quick response.

Using fake URLs (typosquatting) is another trick up a hacker’s sleeve. They know we rarely, if ever, check a URL spelling. Thanks to that, hackers sneak in a slightly different spelling that often goes unnoticed and brings you to their fake website. So, always carefully check the URL spelling more than once because our eyes can deceive us.

Keep PII Under the Hood

Oversharing information on social media and networking websites is still a nail in the tire. Limit the information you post on these websites. On business-related sites such as LinkedIn, use general terminology to describe your duties, rather than titles or other specifics.

Taking a bit of time to learn how to identify phishing and taking care of what you put on the internet can help to keep the air in your tires.


Typosquatting And Fake Pop-ups Detailed

Security Education Videos

Video Icon Typosquatting And Fake Pop-ups Detailed

Cyber criminals continue to update how they target and attack people and organizations.  In this video you will learn about ransomware, a favorite of cyber criminals and a common way systems become infected.  In addition, you will learn about new cyber extortion techniques that will become far more popular in the near future. With a little research and a cautious approach to links and attachments, chances are you can avoid being a victim of cybercrime. READ FULL STORY

Wanted! Nighttime Bandit Steals PII Using Google Ads

Scams & Phishing

Wanted! Nighttime Bandit Steals PII Using Google Ads

Users that are searching for popular software have recently become the targets of malvertising which leverages Google Ads to install Trojan versions of Raccoon Stealer and Vidar. These malware versions are sneakily hidden within Google advertising…you know; those advertisements you see on the side of your browser window or plastered all over social media. This bandit, if clicked, will then proceed to install malware on your device. Guardio Labs has dubbed this "MasquerAd." Clever, isn't it? READ FULL STORY

A Whale of a Hack-Targeting High-Level Execs Through Azure

Scams & Phishing

A Whale of a Hack-Targeting High-Level Execs Through Azure

According to Proofpoint, a recent phishing campaign exploits Microsoft Azure, a cloud computing platform specializing in the business community. Data privacy, collaboration, and disaster recovery are just a few benefits of using this cloud. As such, hackers are using Azure to phish a range of high-ranking employees and whales, from CEO's and Vice Presidents to Finance and Account Managers. There's an ongoing malicious campaign targeting them. READ FULL STORY

Bank of America Customers Caught In Vendor Hack

Identity Theft

Bank of America Customers Caught In Vendor Hack

Breaches of third-party vendors are a growing security threat. Bank of America advised customers that a vendor security breach compromised a blockbuster amount of PII. The stolen data was the result of a breach of one of the bank’s service providers, Infosys McCamish Systems (IMS). The vendor announced the breach, and by extension it led to the sensitive data of Bank of America customers being accessed. It’s estimated that more than 57,000 B of A customers were victims. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...