Blog
Topic
All
AIoT
Products and technologies
Industries
All
Logistics
Building
Sustainability
Business trends
Cybersecurity
Events
Trends
Industry News
Company News
Product Announcement
Search blog
Blog
Filter
Cancel
All
AIoT
Products and technologies
Industries
All
Logistics
Building
Sustainability
Business trends
Cybersecurity
Events
Trends
Industry News
Company News
Product Announcement
Reset
Submit

Trends in Phishing, Ransomware, Credential Stuffing and Other Security Concerns from Hikvision’s Senior Cybersecurity Director, Plus Using a Password Manager to Reduce Risk

 

Hikvision Senior Director of Cybersecurity Chuck Davis today blogs about trends in phishing, ransomware, credential stuffing and other security concerns. And he talks about password managers to prevent credential stuffing and reduce risk.

Google Services Used for Phishing
Phishing campaigns have long used cloud services like Google Docs, Google Forms, and Office 365, to host malicious content. It is not always malware being hosted on these platforms. Often it is an online form that looks like a login page for a bank, a store, or other online service that allows the attacker to harvest login credentials from unaware victims. Once the attacker gets the victim’s login credentials, they can use them in a credential stuffing attack.

According to research by cloud provider Amorblox, there is “a sharp uptick in attackers using Google services to help them get emails past binary security filters based on keywords or URLs.” As security tools review your incoming email, they might flag a link with a gibberish domain name as potentially malicious, but possibly not a link from a well-known and popular domain name.

Credential stuffing—when an attacker takes a long list of usernames and passwords and, using an automated script, tries each pair on many popular websites—is on the rise. In September, the FBI warned of an increase in credential stuffing attacks and stated, “41 percent of all financial sector attacks between 2017 and 2020 were due to credential stuffing, resulting in the theft of millions of dollars.”

According to a 2019 Google/Harris poll, 65 percent of respondents reuse passwords on some, or all of their accounts. To reduce your risk of becoming the victim of credential stuffing, never reuse passwords. That means you likely need to use a password manager.

Ransomware Prints Ransom Notes
Modern ransomware tends to infect a computer, then exfiltrate data and encrypt the contents of that computer, leaving nothing readable by the computer operator except a ransom note on the screen. That is a pretty dramatic approach, but at least one ransomware attacker thought that she needed an additional method of delivering the ransom note that includes repeated printing of these notes after an attack.

As reported by Tripwire, the South American retail giant Cencosud was infected by an Egregor ransomware attack which, “stole sensitive files that it found on the compromised network, and encrypted data on Cencosud’s drives to lock workers out of the company’s data.” Then “printers at the checkouts of numerous retail outlets in Chile and Argentina were suddenly churning out the ransom demand as well.”

In Bleeping Computer’s review of this malware, they state, “To increase public awareness of the attack and pressure a victim into paying, the Egregor operation is known to repeatedly print ransom notes from all available network and local printers after an attack.”

While this tactic might just seem like a novel addition to a ransomware attack, remember that many of our Internet of Things (IoT) devices, such as smart doorbells, light bulbs, cameras and thermostats, do not have display screens. Therefore, sending the ransom note to a printer on the same network as the target device, gives the attacker a means of communicating with IoT device owners and collecting a ransom for encrypted IoT devices.

Tip: Use Password Managers for Added Security
As you read earlier in this blog, credential stuffing is on the rise. It is also becoming more automated, with botnets attempting logins from different IP addresses all over the Internet. Now more than ever, we all need to use a password manager to protect us from these rapid, advanced credential stuffing attacks.

A password manager is a software tool that is used to store all of your passwords in an encrypted file so that you, and no one else, have very easy access to them, helping to minimize security concerns. Most modern password managers have additional features such as cloud storage, auto-filling fields, and password generators that make very good passwords.

The most important feature of your passwords is this: You should have a unique password for every account that you own. Yes, they should be long and strong, but if they are not unique, you not only put one of your accounts at risk of attack, you put every account at risk that reuses a password.

Read this Hikvision blog to learn more about how password managers can help you reduce security concerns.

Cybersecurity

Subscribe to newsletter

Subscribe to our email newsletter to get the latest, trending content from Hikvision

Hikvision.com uses strictly necessary cookies and related technologies to enable the website to function. With your consent, we would also like to use cookies to observe and analyse traffic levels and other metrics / show you targeted advertising / show you advertising on the basis of your location / tailor our website's content. For more information on cookie practices please refer to our cookie policy.

 

Contact Us
Hik-Partner Pro close
Hik-Partner Pro
Security Business Assistant. At Your Fingertips. Learn more
Hik-Partner Pro
Scan and download the app
Hik-Partner Pro
Hik-Partner Pro
back to top

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.