FBI Tech Tuesday: Building a Digital Defense Against Travel Scams
It is that travel-filled time of year again folks. Whether you are behind the curveball and trying to squeeze in some last minute summer vacations or completely on top of it and already planning for fall and winter trips, everyone is always on the lookout for a good deal at a great price. However, scam artists know this and will try to take advantage of it as much as they can.
If you are like me, you are constantly getting calls and emails from people telling you that you are the “lucky winner” of an all-expense paid for vacation. Although the offer is tempting, don’t fall for it! How often do you hear of people actually getting their entire trip paid for by a random stranger? Not that often, because it is yet another scam with expensive strings attached. So before you book that discounted hotel room or flight reservation, be sure to keep these travel tips from our friends at the Federal Trade Commission in mind:
In the 2011 report to Congress on Foreign Spies Stealing U.S. Economic Secrets in Cyberspace, the Office of the National Counterintelligence Executive provided a baseline assessment of the many dangers facing the U.S. research, development, and manufacturing sectors when operating in cyberspace, the pervasive threats posed by foreign intelligence services and other threat actors, and the industries and technologies most likely at risk of espionage. The 2018 report provides additional insight into the most pervasive nation-state threats, and it includes a detailed breakout of the industrial sectors and technologies judged to be of highest interest to threat actors. It also discusses several potentially disruptive threat trends that warrant close attention.
Attackers are conducting reconnaissance by phone to increase the effectiveness of their Business Email Compromise (BEC) campaigns. A high level summary of the BEC concept along with some easily actionable recommendations to combat this type of attack are included in this very short document.
“Protecting the interests of the maritime community across South Carolina”
(have you joined yet?)
A shipwreck waiting to happen. Most people see technology and ask “what does it do?”, “how does it do that?” Adversaries see technology and ask “what can I make it do?” Case in point, making navigation systems do something different than they are designed to do can be damaging.
An Adobe vulnerability actively being exploited needs to be patched or removed immediately.
Researchers have discovered a new vulnerability in technology widely used to operate critical services such as oil and electric systems that they warn hackers could exploit.
Cyberattack hits Atlanta computers 'Everyone who has done business' with city may be at risk.
In a story first reported by 11Alive, city of Atlanta computers have been cyber attacked by ransomware that has encrypted some personal and financial data. "We don't know the extent of the attack," said Atlanta Mayor Keisha Lance Bottoms in a Thursday afternoon press conference. New Atlanta COO Richard Cox said public safety, water and airport operations departments have not been affected.
Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors
Since at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.
Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign.
This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.”
The Maritime Association of South Carolina on behalf of the Port of Charleston seeks to establish an Information Sharing and Analysis Organization (ISAO) for Maritime Transportation System (MTS) stakeholders operating in the Port of Charleston. The mission of MTS-ISAO: Charleston is to increase cyber-threat protection, detection, and response capabilities of its membership by collecting, analyzing, and sharing threat indicators within the local MTS community. Over the course of an initial 2-year pilot, MTS-ISAO: Charleston will establish the management and technical framework for the ISAO, begin activities to fulfill its mission, and collect regular metrics to gauge the effectiveness of those activities. The pilot will culminate in a final report that analyzes the metrics and documents a framework for repeatability in other maritime communities (e.g. MTS-ISAO: [community]). After the pilot, MTS-ISAO: Charleston will continue operating and ultimately transition to a self-sustaining organization.