Happy New Year…. A BMO Text Message Scam Is Making The Rounds

Posted in Commentary with tags on January 15, 2025 by itnerd

A reader of this blog sent me a screenshot of a text message scam that he just received:

Now this is an easy to spot scam for the following reasons:

  1. The text message states “We’ve detected unusual activity on your BMO client card starting with 551029.” The thing is, more recent BMO client cards start with that number. There’s nothing unique about that, which means that this text message is being sent to thousands of people and the threat actors are hoping to get 1% to fall for it because they’re not paying attention to a detail like that. For the record, BMO along with any other bank would use the last 4 digits of your credit or debit card in a situation like this. Assuming that they would send you a text message like this. More on this in a moment.
  2. The website that is mentioned isn’t “bmo.com” or something like that. This is clearly a website that has been set up to phish your banking details so that they can steal your money. And it goes without saying that you should not click on the link.
  3. BMO, nor any other bank would alert you to fraud via a text message. That never, ever happens.

I’m not going to go down the rabbit hole in terms of looking at the website or anything like that. Because we already know that this is a scam and should be avoided. Thus if you get a text message like this, delete it and move on with your day.

Watch Out For Scams Related To The Los Angeles Wildfires

Posted in Commentary with tags on January 15, 2025 by itnerd

The wildfires in Los Angeles and surrounding areas have left residents and businesses vulnerable to exploitation by scammers looking to take advantage of them for financial gain, to steal their identities, and other fraudulent activities. Here’s a few examples from the news that illustrate what I am talking about.

Jim Routh, Chief Trust Officer at cybersecurity company Saviynt, commented:

“Enterprises with geo-location settings used for authentication validation purposes should adjust their models to acknowledge those employees forced to evacuate their home.

“Major catastrophic events like the fires in California bring out kindness and empathy from many people who are not victims for days following the event. Unfortunately, these events also bring out cyber criminals seeking to capitalize on the victim’s misfortune by designing phishing emails supposedly from FEMA, fire officials or other state and local agencies offering relief options. We recommend:

1.      Review your passwords for key accounts/sites and consider improving the complexity of the password (use a password manager and ensure that you have access to it from all devices)

2.      Read email messages closely and identify the origin of the sender’s email address

3.      Avoid clicking on links in email messages unless you are certain of the validity of the sender

4.      Print a list of emergency numbers to keep handy and include the FEMA Fraud Hotline:

1.      To protect yourself from fraud and identity theft, we encourage you to be careful when sharing your personal information.

If you believe you are a victim of identity theft, or someone applied to FEMA using your personal information, please call 800-621-3362. Do not contact the FEMA Fraud Investigations and Inspections Division, DHS Office of Inspector General, or the National Center for Disaster Fraud for the purpose of reporting identity theft.

Report any other types of disaster fraud by emailing StopFEMAFraud@fema.dhs.gov. For more information, visit the disaster fraud page.

5.      Employees and third parties will be forced to access networks from different locations using potentially different devices. Increase staffing levels of IAM ops staff to address the needs of storm victims and expand call coverage

6.      Advise employees to consider donations to the American Red Cross and other disaster relief organizations that are well established vs. newly formed entities specific to the California fires.”

James McQuiggan, security awareness advocate at cybersecurity company KnowBe4:

“The fires in Los Angeles County have caused significant loss of homes and property, leaving many residents vulnerable to exploitation. Scammers often prey on homeowners facing challenges with their insurance providers, posing as fake adjusters, offering fraudulent services, or ways to get money fast to start rebuilding. These schemes often involve promises of quick resolutions in exchange for upfront payments or steep fees. Some may claim they can prevent insurers from dropping coverage, adding to the stress of an already difficult situation. 

“Homeowners should confirm the identity of any insurance representative by contacting their provider directly and avoid making hasty decisions or signing agreements without proper verification. Outside of LA, individuals moved by the destruction will be targeted by fake donation campaigns or fraudulent grassroots donation platforms. Scammers create convincing appeals, often using AI-generated synthetic images to portray fabricated victims or destroyed homes. These scams manipulate people’s emotions and ask for donations quickly. 

“People looking to help should prioritize verified charities with established reputations and avoid sharing financial information through requests or unverified crowdfunding campaigns. Careful research and communication with the proper and recognized organizations can ensure that contributions are used for legitimate relief efforts.

“Disaster-related scams are not new and have appeared after hurricanes, floods, and earthquakes, following a similar pattern of urgency and emotional manipulation. The tactics remain consistent: leveraging heightened emotions and telling stories to exploit our human nature. It’s essential to remain cautious and somewhat skeptical during such events. Taking the time to verify claims, conducting research, and educating others can significantly reduce the effectiveness of these schemes. Awareness is critical to prevent fraud from happening based on the devastation of these events and ensure that support reaches those who need it most during their time of need.”

So the question becomes how can you help and not get scammed. Here’s a list that I’ve complied:

California Community Foundation

California Fire Foundation

L.A. Fire Department Foundation

Pasadena Humane Society

Ventura County Community Foundation

American Red Cross of Greater Los Angeles

Center for Disaster Philanthropy

Direct Relief

World Central Kitchen

Any assistance to any of these organizations is appreciated.

DOJ Discloses Operation That Deleted PlugX Malware from 4,250 Hacked Computers

Posted in Commentary with tags on January 15, 2025 by itnerd

The DOJ has disclosed that a multi-month law enforcement operation allowed the FBI to delete PRC-associated PlugX malware from over 4,250 infected computers:

The Justice Department and FBI today announced a multi-month law enforcement operation that, alongside international partners, deleted “PlugX” malware from thousands of infected computers worldwide. As described in court documents unsealed in the Eastern District of Pennsylvania, a group of hackers sponsored by the People’s Republic of China (PRC), known to the private sector as “Mustang Panda” and “Twill Typhoon,” used a version of PlugX malware to infect, control, and steal information from victim computers.

According to court documents, the PRC government paid the Mustang Panda group to, among other computer intrusion services, develop this specific version of PlugX. Since at least 2014, Mustang Panda hackers then infiltrated thousands of computer systems in campaigns targeting U.S. victims, as well as European and Asian governments and businesses, and Chinese dissident groups. Despite previous cybersecurity reports, owners of computers still infected with PlugX are typically unaware of the infection. The court-authorized operation announced today remediated U.S.-based computers infected with Mustang Panda’s version of PlugX.    

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 had the following comment on this news:

“It’s always a good day when the good guys get a win! As simple as it seems for anyone to go in and proactively remove malware, it really isn’t easy to do. First, you’ve got to make sure you can do it legally. That often takes lawyers and legal review, and in most cases, lawyers with experience in global cybercriminals and laws. It takes someone in law enforcement who cares enough to push it. They’ve got to make a case and get it approved by senior management. Then, the removal process has to be tested.” 

“In this case, the FBI relied upon the bot’s own removal instructions, but it isn’t always this easy. Historically, there have been instances of less mature and capable but well-meaning defenders who have less elegantly removed malware and caused more problems than the malware did. The solution has to be tested and retested. Then, it has to be globally coordinated to happen as quickly as it can before the attackers know something is up and implement defenses.” 

“The overall process is more difficult than it first sounds. There’s a reason why proactive removal isn’t that common. With that said, it does seem like we are seeing just a bit more of these proactive removal projects than we used to see. Of course, expect to see the hackers respond by making it harder for unauthorized removal schemes to take place. It’s a business, and the bad guys see the good guys as adversaries and will respond accordingly. The bad guys won’t sit back and stay defeated. They will respond. They will make it harder for future efforts to be as successful. But for today, let’s celebrate the win!”

Wins seem to be hard to come by these days. Thus I will take this one. But realistically what needs to happen is prevention and detection means need to be better so that actions like these are the exception.

Nearly 250,000 Records Exposed by Fintech Company 

Posted in Commentary with tags on January 15, 2025 by itnerd

A significant data exposure involving Willow Pays, a payment software company offering AI software solutions was recently uncovered by cybersecurity researcher Jeremiah Fowler.

What happened:

A database containing nearly 250,000 records was exposed. The exposed database includes customer names, emails, home addresses, partial debit and credit card numbers, scanned bills and loan payment documents and more.

Why it matters: 

This exposure presents serious risks, such as invoice fraud, phishing schemes or social engineering attempts.

To learn more, read the detailed report here: https://www.websiteplanet.com/news/report-willowpays-breach/

Elon Musk Gets Sued By The FTC Over Twitter Takeover

Posted in Commentary with tags on January 15, 2025 by itnerd

This lawsuit was guaranteed to happen, and it finally has. The SEC has finally sued Elon Musk over his takeover of Twitter:

The US Securities and Exchange Commission sued Elon Musk on Tuesday for allegedly failing to properly disclose his ownership of X, then known as Twitter, as required by federal law, which allowed him to buy shares of the platform at “artificially low prices.”

Before he closed his $44 billion deal to buy Twitter in October 2022, Musk began to acquire a “significant number” of Twitter shares. By mid-March 2022, he owned more than 5% of the company’s common stock and was required to disclose that to the SEC within 10 calendar days. The filing alleged that Musk failed to disclose that information until April 4, 2022.

Had Musk and his wealth manager disclosed his ownership as required, the stock price would likely have increased significantly,” the suit alleged.

Now of course Elon is denying all of this. And I bet he’s hoping that his buddy Donald Trump does him a big favour and makes this go away. But if that doesn’t happen, Elon is in a whole lot of trouble here. Especially since he’s flipped off the SEC on multiple occasions, which isn’t a good idea if you ask me. But I think he’s about to find that out. And I am here for it.

OneBlood confirms personal data stolen in July ransomware attack

Posted in Commentary with tags on January 14, 2025 by itnerd

Blood-donation not-for-profit OneBlood last week confirmed that a ransomware attack last summer has resulted in donors’ personal information being stolen, including names and SSNs. 

On or around July 28, 2024, OneBlood became aware of suspicious activity within its network. We began an investigation to determine the full nature and scope of the event. Our investigation determined that between July 14 to July 29, 2024, certain files and folders were copied from our network without authorization. We conducted a comprehensive review of the affected files to identify the types of information contained in them and to whom the information relates. On or about December 12, 2024, we completed our review and determined that the affected files contained your information.

What Information Was Involved? The investigation determined that your name and Social Security number was included in the relevant files and folders.

Erich Kron, Security Awareness Advocate at KnowBe4 had this to say: 

“Ransomware attacks are pretty much synonymous with data breaches, and this was certainly no exception. Modern ransomware groups put a lot of effort towards stealing data because they know that it can often be used as leverage to force organizations to pay ransoms in exchange for not leaking the data, so when we hear about a ransomware attack taking down systems, we can safely assume most of the time that personal data was stolen as well.”

“The attack on OneBlood is especially frustrating because the organization does have a great mission and does good things to provide blood to those in desperate need. The attack last year impacted a number of clinics and increased the likelihood of human errors when computerized systems were taken offline. For the volunteers that already gave their time and blood to help the cause, the news that their personal information was lost to bad actors is certainly unwelcome.”

“Unfortunately, OneBlood took a long time to determine what data was lost and to inform victims of the breach. When information like this is leaked, it is extremely beneficial for potential victims to be able to take steps to protect their identity from theft and to protect themselves from potential social engineering attacks, and delays such as this can put them at even higher risk of negative consequences.”

“Organizations that collect or store personal and medical information need to ensure the highest standards of protection are met, and that potential victims of data theft are notified quickly and given information they can use to protect themselves from the misuse of their private data. Delays in notification leave victims vulnerable to additional attacks and identity theft.”

Rebecca Moody, Head of Data Research at Comparitech adds the following: 

According to our data, OneBlood is one of 128 US healthcare providers confirmed to have been hit by a ransomware attack in 2024. These attacks affected nearly 21.8 million records in total and saw an average ransom of just over $1 million.”

“We don’t yet know how many people have been involved in this breach but at least 608 residents in Massachusetts have received notifications. Those impacted should take up OneBlood’s offer of 12 months free credit monitoring and identity theft protection services while also being on high alert for any phishing messages and monitoring accounts for unauthorized activity.”

Besides being yet another health care related hack, this really took way too long to be brought to the attention of victims. That’s not cool and OneBlood really needs to do better.

KnowBe4 Research Confirms Effective Security Awareness Training Significantly Reduces Data Breaches 

Posted in Commentary with tags on January 14, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today released a new white paper that provides data-driven evidence on the effectiveness of security awareness training (SAT) in reducing data breaches. 

Over 17,500 data breaches from the Privacy Rights Clearinghouse database were analyzed along with KnowBe4’s extensive customer data to quantify the impact of SAT on organizational cybersecurity. This research provides an in-depth perspective on the effectiveness of security awareness training in preventing data breaches.  

Key findings from the research include: 

  1. Organizations with effective SAT programs are 8.3 times less likely to appear on public data breach lists annually compared to general statistics. 
  2. 97.6% of KnowBe4’s current U.S. customers have not suffered a public data breach since 2005. 
  3. Customers who experienced breaches were 65% less likely to suffer subsequent breaches after becoming KnowBe4 customers. 
  4. 73% of breaches involving current KnowBe4 customers occurred before they implemented the company’s SAT program.  

KnowBe4 advises organizations to implement SAT programs with at least quarterly training sessions and simulated phishing tests, noting that more frequent engagement can lead to even greater risk mitigation. The study addresses a critical question in cybersecurity: Does security awareness training measurably reduce an organization’s risk of real-world cyberattacks? The analysis demonstrates that organizations practicing regular and effective SAT see significant decreases in human risk factors and fewer real-world compromises. 

This research provides valuable insights into the substantial role that security awareness training plays in preventing data breaches, particularly given that social engineering and phishing account for 70% to 90% of data breaches. KnowBe4 defines an effective SAT program as one that includes at least monthly training and simulated phishing campaigns.   

The full white paper, “Effective Security Awareness Training Really Does Reduce Breaches,” is available for download here

Leaseweb Launches Highly Efficient VPS Infrastructure, Delivering Exceptional Price-Performance, Fast Local Storage and Easy Deployment

Posted in Commentary with tags on January 14, 2025 by itnerd

Leaseweb Global, a leading cloud services and Infrastructure as a Service (IaaS) provider, today announced thelaunch of a new highly efficient Virtual Private Server (VPS) solution. Designed for businesses that need a combination of exceptional price-performance, fast local storage and easy deployment, 

Leaseweb VPS packages start at just €3.99/month to deliver affordable solutions that don’t compromise on quality.Leaseweb’s new VPS solution provides customers with the flexibility to expand their infrastructure as their business needs grow. Delivered via a low-touch, self-service portal, it requires limited technical expertise for setup or management, enabling users to configure their server, monitor resources and manage snapshots with ease. This makes it ideal for businesses seeking a straightforward, scalable and efficient hosting service, as well as those looking for an entry-level solution to Leaseweb Public Cloud. 

With lightning-fast 10Gbps uplink speed, and powered by high performance processors and local NVMe storage, the Leaseweb VPS solution provides ample compute, RAM and generous traffic across all packages. In addition, built-in security and reliability features, including firewalls, DDoS protection and ISO-certified data centers, offer peace of mind and comprehensive protection for all customers. For those customers wanting to include backup, this is available as an add-on service. 

For further information about Leaseweb VPS, please visit https://www.leaseweb.com/en/products-services/cloud/virtual-private-server

Foxit Unveils Game-Changing AI Platform,

Posted in Commentary with tags on January 14, 2025 by itnerd

Foxit, a leading provider of innovative PDF and eSignature products and services, helping knowledge workers to increase their productivity and do more with documents, today announced the launch of Foxit AI, a standalone web-based AI platform that delivers cutting-edge document-centric AI capabilities to users across industries. Available at ai.foxit.com, this innovative platform redefines how individuals and organizations manage and interact with their documents, offering unparalleled flexibility, accessibility, security, and efficiency.

The newly released Foxit AI is a powerful standalone web-based AI platform designed to revolutionize how individuals and organizations manage and interact with their documents. It offers a comprehensive suite of features, including AI-powered chat assistance, document and image analysis, advanced summarization, multilingual translation, text enhancement, and the ability to analyze multiple documents simultaneously. By combining intuitive design, cross-device accessibility, and seamless integration with Foxit’s broader ecosystem, Foxit AI empowers users across industries to streamline workflows, gain actionable insights, and maximize productivity. Whether simplifying complex legal documents, generating concise summaries, or translating content for global audiences, Foxit AI provides an efficient, secure, and user-friendly solution tailored to modern document management challenges.

Foxit AI Features and Benefits:

●     AI-Powered Chat Assistance – Provides instant, conversational support for document-related queries (e.g., quickly locate specific clauses in legal contracts or clarify essay structures).

●     Image-to-Text and Analysis – Upload images (JPEG, PNG, etc.) to extract text, insights, or contextual information from the image (e.g., upload PNG, JPEG, etc. and use “Extract Text” command – for instance, upload a receipt screenshot, and then easily retrieve dollar amounts or other key details.).

●     Text Enhancement Tools – Rewrite text with adjustable tone (e.g., professional, casual) and length (e.g., short, medium, long) (e.g., adapt content for different audiences, polish communications, or refine emails for clarity and tone).

●     Unparalleled Security – Ensures user privacy and data protection through robust security measures and compliance with industry standards (e.g., process sensitive documents with confidence, knowing they are safeguarded against unauthorized access).

●     Document Analysis – Upload documents for in-depth analysis to extract key insights and summarize content (e.g., analyze financial reports to identify critical data points without reading the entire document).

●     Advanced Summarization – Generate concise summaries of large documents or specific sections for easy review (e.g., summarize meeting notes to identify actionable insights).

●     Spelling and Grammar Checks – Ensure polished and error-free writing in seconds (e.g., proofread proposals and reports to improve quality).

●     Text Clarification – Simplify complex or technical language for better understanding (e.g., break down dense legal or technical terms for students or professionals),

●     Multilingual Translation – Translate text into multiple languages to bridge communication gaps (i.e., convert marketing materials for international audiences).

●     Multi-Document Analysis – Review and compare multiple documents simultaneously to save time (e.g., compare contracts or analyze multiple reports in one session).

●     Cross-Device Accessibility – As it is web-based, accessible on desktop, mobile, and tablet browsers without needing a PDF Editor license (e.g., Work efficiently across devices with cloud-based functionality).

●     User-Friendly Design – Intuitive interface with product tours and real-time support (e.g., easily navigate features with minimal learning curve).

●     Enterprise Scalability – Includes admin-controlled licenses and compliance tools for organizational use (e.g., manage access and ensure security across a team or enterprise).

To learn more about Foxit AI, please visit: ai.foxit.com.

Guest Post: 75% of Fortune 500 technology companies scored a D or lower for their cybersecurity efforts

Posted in Commentary with tags on January 14, 2025 by itnerd

The increasing sophistication of cyberattacks and the expanding attack surface due to cloud adoption, remote work, and complex supply chains have made robust cybersecurity risk assessment more critical than ever.

Unfortunately, with the threat of cyberattacks growing, most organizations haven’t raised their security standards accordingly. Cybernews Business Digital Index shows that 84% of analyzed Fortune 500 companies scored a D or worse for their cybersecurity efforts.

The Cybernews research team analyzed 466 companies on the Fortune 500 list. Thirty-four companies could not be analyzed to evaluate an organization’s cybersecurity posture. The report evaluates risk across seven key areas: software patching, web application security, email security, system reputation, SSL Configuration, system hosting, and data breach history. 

Below is detailed data collected from multiple sources, including IOT search engines, IP and Domain name reputation databases, and custom scanners, that show Fortune 500 companies’ digital security posture.

Technology and IT companies are some of the most vulnerable 

Although the biggest U.S. companies by revenue are responsible for sensitive customer data, the results show they have major shortcomings in corporate customer data security.

According to the index, which grades businesses based on their online security measures, 84% of Fortune 500 companies scored D or worse, with 43% falling into the F category. Only 6% of analyzed organizations earned an A rating for security measures. 

Research shows that 75% of analyzed Technology and IT category companies scored a D or worse in their cybersecurity efforts. Overall, this sector received an average security score of 71.

With 57 companies on the list, the Technology and IT category is the fourth biggest Fortune 500 category. 35% of the scored companies received a D rating, and 40% received an F rating. Just 7% of companies received C and 17.5% of companies A ratings.

Only 1% of finance and insurance companies scored an A 

The biggest Fortune 500 category is Finance and Insurance, with 102 companies on the list. 63% of the scored companies received a D rating, and almost 24% received an F rating. Overall, this sector received an average security score of 71.

Finance and Insurance category companies are the most vulnerable. Only 1% of them gained an A-level security score.

The second-biggest category, with 88 companies, is Manufacturing. This category’s average security score is 65. According to The Business Digital Index, 81% of companies analyzed received a security rating of D or worse, with 53% falling into the F category. Only 3% of companies earned an A rating for their security measures.

61% of analyzed Energy and Natural Resources category companies worldwide scored F, and 24% got a barely passing grade of D. Only 7% of these organizations were worthy of an A rating for their security measures.

The healthcare industry is also particularly vulnerable, with 55% of the scored companies receiving a D rating and 31% an F rating. Only 10% of the companies analyzed in the Healthcare and Pharmaceuticals category achieved an A grade. Overall, the healthcare sector received an average security score of 70.

Also, 50% of the scored Retail and Wholesale category companies received a D rating and 40%  an F rating. In contrast, Construction and Engineering category companies fared better, with 73% earning a D and F grade for their security.

33% of Transportation and Logistics category companies received D and F scores equally. Most (43%) of Consulting and Business services category companies were rated D, and 57% got an F. Meanwhile, Real estate and Development category companies received 30% for D and 60% for F ratings. 

Among all industries, the Transportation and Logistics category has the highest share of A-level companies (20%). 

Researchers found nearly 671 critical or high-risk vulnerabilities

The Business Digital Index shows that the most common security issue is related to Secure Sockets Layer (SSL) configurations, with over 490 issues found in 466 analyzed companies

Furthermore, researchers found nearly 671 critical or high-risk vulnerabilities that hackers can exploit to enter networks and steal information.

Researchers also found that analyzed Fortune 500 list companies have 254 email security issues and 480 total data breach incidents.

Research Methodology

You can review the report’s Methodology here. It provides detailed information on how researchers conducted this analysis.

Image
Image
Image