It is the oldest and easiest bit of email social engineering – promise you something that is too good to be true. Your tempted and the hackers have got you. You think this would have gone the way of “princes offering to share millions with you, if you will just …
Anatomy of a RAT attack using a password protected Excel attachment
This is the classic way a hacker gets their payload into your business – send you a spreadsheet that needs your immediate attention. Include the password in the email, this makes it more likely for you to open the file – make it look official and your cyber security threat …
Continue reading “Anatomy of a RAT attack using a password protected Excel attachment”
Do you know what “business email compromise” is? Better still do you know how to combat this cyber security attack?
Research from the FBI shows how costly this type of cyber attack is to businesses: FBI: Business Email Compromise attacks led to more than $43 billion in losses since 2016 – The Record by Recorded Future At Smart Thinking and Octagon, we have had to investigate and deal with several …
Remember paying the ransom will not always bring back the data – take steps now
If your back-up and incident response plan is completely useless, you could always fall back on just paying the ransom that the cyber criminals demand. A Sophos study showed 46% of businesses did this: Study: 90% of organizations say ransomware impacted their ability to operate | TechRepublic But this study …
Continue reading “Remember paying the ransom will not always bring back the data – take steps now”
Malware in the wild – Emotet
Check Point Research shows a steady increase in the circulation of malware in March 2022, with a surge around Easter and Easter scams. March 2022’s Most Wanted Malware: Easter Phishing Scams Help Emotet Assert its Dominance – Check Point Software The highly disruptive malware, Emotet was the most distributed malware. …