Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

Mueller Report Malware Is on The Way, Probably

3/28/2019

 
Picture
A guest article, brought to you courtesy of Emsisoft

Has someone sent you an email with an attachment that claims to be a leaked copy of the Mueller report? Have you been directed to a website where you can supposedly download the Mueller report in full?
No, you shouldn’t click on it. Yes, it’s almost certainly a scam.

Politically Motivated Cyberattacks
Whenever there’s big news, scammers attempt to capitalize on it. By referencing current events, scammers are able to make their attacks seem more believable to increase the chances of their targets clicking on a malicious link, inadvertently giving away their personal information or downloading a malicious file. One of the biggest political events happening right now is the release of the Mueller report.
In case you haven’t been following the story, here’s a quick recap: Almost two years ago, former FBI Director Robert Mueller was tasked with leading an investigation into Russian interference in the 2016 U.S. presidential election.
Along the way, we’ve caught glimpses of various scandals related to the investigation – alleged obstruction, collusion and money laundering, to name but three – but the details of the report have, for the most part, been kept under wraps.
A day ago, Mueller submitted his final report to Attorney General Bill Barr, and to say that people are curious about what the report contains would be a gross understatement. If you’re a citizen of the United States, you’re probably – regardless of where you sit on the political spectrum – eager to see the report.
But here’s the thing: at the time of writing, only the Attorney General has access to the Mueller report. What’s more, there’s no guarantee that Mueller’s findings will ever be made public.
 
Look Out for Mueller Report Malware
Cybercriminals are well aware of the immense public interest in the Mueller report, and there’s a very high chance that the report will be used as bait in scams and attacks over the coming days and weeks. With WikiLeaks joining in on the frenzy by raising $1 million for a leaked copy of the report, attackers may use the report to try and persuade you to open email attachments, visit websites and download files that you would normally ignore. 
 
Be very wary of:
  1. Email attachments that claim to be a leaked copy of the Mueller report.
  2. Dodgy websites where you can supposedly download the Mueller report.
  3. Emails regarding the Mueller report, which contain links to websites that ask for your login credentials or other sensitive information.
  4. Protecting yourself from Mueller report malware

The usual rules apply when it comes to protecting yourself against politically motivated attacks:
  1. Be very suspicious of unsolicited emails and only open attachments that you’re certain are safe.
  2. Avoid phishing attacks by only entering your personal information on known, trustworthy websites.
  3. Install an anti-phishing browser extension such as Emsisoft Browser Security.
  4. Invest in proven antivirus software such as Emsisoft Anti-Malware.

Whether or not the Mueller report is eventually released to the public, it seems very likely that cybercriminals will try and use it to add a layer of legitimacy to their attacks. Being mindful of unsolicited emails and protecting yourself with reliable antivirus software can go a long way toward mitigating these attacks.

Don't Get Hooked by Spear Phishing Attacks

3/21/2019

 
Picture
Phishing attacks have been around for a long time in IT.  Designed to steal your credentials or trick you into installing malicious software, they have persisted in the IT world precisely because they have been so devastatingly simple and effective.  Today, a more modern and more effective version of the same attack is commonly used.
A typical phishing attack involves an attacker sending out a malicious email to hundreds of thousands, if not millions of users.  The attacker's email is designed to look like it comes from a bank, financial service, or even the tax office. Often aiming to trick you into logging in to a fake online service, a phishing attack captures the login details you enter so an attacker may use them to enter the genuine service later.
By sending out tens of thousands of emails at a time, attackers can guarantee that even if only one half of one percent of people fall for it, there is a lot of profit to be made by draining accounts.  Spear phishing is a more modern, more sophisticated, and far more dangerous form of the attack.  It's typically targeted at businesses and their staff.

A Convincing, Dangerous Attack
While a traditional phishing attack throws out a broad net in the hope of capturing as many credentials as possible, spear phishing is targeted and precise.  The attack is aimed towards convincing a single business, department, or individual that a fraudulent email or website is genuine.
The attacker focuses on building a relationship and establishing trust with the target.  By building trust and convincing the target that they are who they are pretending to be, the user is more likely to open attachments, follow links, or provide sensitive details.
Consider how many times you have followed a link or opened an attachment just because it has come from a contact you have trusted before.

A Trusted E-mail
The malicious email can appear to come from a vendor you deal with regularly.  It may even look like an invoice you are expecting to receive.  Often attackers can simply substitute the vendors' banking details for their own, hoping the target will not notice the difference.
Such an attack is very difficult to detect.  It takes a keen eye, strong working knowledge, and constant awareness to keep your company protected.  Even a single small mistake by an unaware member of staff can compromise your business accounts.

Defending Your Business
The key to stopping a spear phishing attack is education.  Learning attack techniques, and how to protect against them is the single biggest thing you can do to enhance business security.
Whenever you deal with a vendor in a business transaction, you should always consider important questions before proceeding.  Are you expecting this email?  Is the vendor attempting to rush you into a quick decision or transaction?  Have you checked all the details are correct and as you expected?  Sometimes a simple query to the vendor can protect you against worst-case scenarios.
In many cases, a phishing attack can be halted in its tracks with a strong IT security package.  Web filtering prevents malicious emails and links from entering the network, shutting attacks down before any damage can be done.

Good Security Practice
As with many types of IT threat, good security practices help mitigate damage.  Locking down security to ensure employees only access the systems they need helps to prevent damage spreading across the network. Enforcing unique and strong passwords prevents leaked credentials from affecting systems related to the one that has been compromised.  Getting employees set up with a password manager and good security policies can do the world of good to boost your security to the level it needs to be. 

Don't Fall Victim to Webcam Blackmail

3/14/2019

 
Picture
Many users have reported recent scam messages from individuals claiming to have intercepted their username and password.  These messages often state they have been watching your screen activity and webcam while you have been unaware.
Typically, attackers threaten to broadcast footage to your contacts, colleagues, or social media channels.  Demanding payment in Bitcoin, malicious hackers blackmail their victims to keep confidential information private.

Where Have the Attacks Come From?
In many cases where hackers have claimed to have a victims' password, this has turned out to be true. 
In the last few years alone, many large websites have suffered enormous hacks which have released confidential details on many of their users.  LinkedIn, Yahoo, and Myspace all suffered massive and devastating hacks.  Some users of these services are still feeling the consequences today.
The details leaked from these sites, and others facing the same issues, are sold online for years after the initial breach.  Hackers buy username and password combinations in the hopes of reusing them to access services, steal money, or blackmail their owners.

How to Respond
If you have been contacted by one of these hackers, it is a scary reality that they could have access to your credentials, data, and online services. The only thing you can do in response to this type of email is to ignore it. This “we recorded you” email is a scam made much more believable because they probably do have one of your real passwords gained from a site hack. That said, accounts that share the same password should be changed immediately.  Security on additional services you use should be updated too.

Self Defense On the Web
When using online services, a unique password for every site is your number one defense.  A good password manager makes this practical and straightforward too. Using a different password for each site you use means that hackers can only gain access to one site at a time.  A hack in one place should never compromise your other accounts by revealing the single password you use everywhere. Often, people think that maintaining many passwords is hard work or even impossible to do.  In truth, it's almost always easier to keep tabs with a password manager than it is to use the system you have in place today.

A high quality and secure password manager such as Dashlane, or 1Password, can keep track of all your logins efficiently and securely.  They often offer the chance to improve your security by generating random and strong passwords that hackers will have a tougher time cracking.
Password management services offer a host of features that help you log in, remind you to refresh your security, and make your safety a number one priority. After using a manager for just a short time, you can be forgiven for wondering how you managed without it.
​
If you think you might have been hacked already, or want to prevent it from ever happening, give us a call to at 715-255-0325 update your security.

Coffee and Cookies!

3/1/2019

 
Picture
Just a quick reminder that next Thursday (3/7/19) is Coffee and Cookies here at Yellowstone Computing! Step in out of the cold and snow and enjoy homemade cookies and specialty coffees from around the world! This week, we have Cameroon "Boyo" Coffee, organically grown in dark, nutrient rich volcanic soil at elevations exceeding 5,000 feet. This family owned estate boasts daily doses of brilliant sunshine which allow the coffee berries to quickly attain their optimal sugar content. This is the secret to the aromatic, mellow, and rich full bodied Cameroon Boyo Coffee. Stop by and try it out!

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.