Dispersive Posts White Paper Called “How Cybercriminals Are Using AI: Exploring the New Threat Landscape”

Posted in Commentary with tags on January 16, 2025 by itnerd

Cybersecurity expert Lawrence Pingree, VP of Technical Marketing with Dispersive (former Vice President at Gartner’s Technology and Service Provider research practice) has just published the concise white paper “How Cybercriminals Are Using AI: Exploring the New Threat Landscape.”

Key elements of the white paper are summarized in the Dispersive blog post “Addressing the AI ARMS Race: Why Preemptive Defense is Essential”. Topics covered include:

  • AI driven methods and techniques such as automated attacks; phishing, social engineering and automated auth bypass, knowledge acquisition and polymorphic malware; and auth layer bypass such as CAPTCHA cracking and voice biometrics exploitation.
  • Examples of AI exploiting vulnerabilities and evasion strategies.
  • Deepfakes and types of AI used by attackers.
  • Anticipating AI’s future cybercrime impacts.
  • Practical steps for winning the AI ARMS (Automation, Reconnaissance, and Misinformation) race between attackers and defenders, including preemptive cyber defenses such as:
    • Automated Moving Target Defense (AMTD) – randomization and preemptive changes to IP addresses, system configurations, etc.,
    • Threat Simulation and Predictive Intelligence – leveraging AI to simulate potential attack scenarios and predict adversary behavior enables defenders to stay one step ahead, and
    • Generative AI Runtime Defenses – using AI to detect and neutralize generative AI-based threats in real time enhances security resilience.

I read the white paper this morning and even though I work in this space, it was eye opening for me. It was also a bit scary to be honest as well. If you are responsible for defending your organization from cyberthreats, I would read the blog post and sign up to get the white paper as I think it will get your attention and make you rethink how you defend your organization.

Biden administration’s drops a cybersecurity executive order on America

Posted in Commentary with tags on January 16, 2025 by itnerd

Today, President Biden laid out an executive order that proposes to strengthen and promote Innovation in the nation’s cybersecurity efforts. This builds on previous executive orders and I encourage you to give this one a read.

Dr. Marc Manzano, general manager for cybersecurity at SandboxAQ had this comment:

“The Biden administration’s emphasis on requiring software vendors to provide proof of security is a significant step toward strengthening the software supply chain and ensuring greater accountability. This focus on security aligns with the critical need for improved compliance, auditing, observability, and agility in managing modern cybersecurity challenges. With this new EO, I am delighted to see additional efforts to push the current status quo and establish a more regulated framework, as this will ultimately improve IT resilience and safeguard critical systems across industries.”

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 adds this comment:

“This is a huge, widely varying cybersecurity EO that covers dozens of technologies and initiatives. There is a lot to love in it. Here’s what I like:

  • It focuses on software security (although not firmware, strangely), stating that vendors to the US government must prove they are following secure development practices and secure software chain procedures.
  • It’s going to add how to secure deploy patches and updates to NIST SP 800-53.
  • It promotes strong open-source security practices.
  • It is prioritizing investment in PHISHING-RESISTANT MFA.
  • It is increasing the focus on threat hunting and threat identification, empowering CISA to do more of it.
  • It is creating working groups around supported Endpoint Detection and Response (EDR) products to improve them.
  • It is requiring the encryption of civilian space-related commands.
  • It is creating new policies for cloud vendors in the FedRAMP program.
  • It is increasing the security of Border Gateway Protocol (BGP) and the government’s IP address space (decades overdue).
  • Promotes encrypted DNS.
  • Requires email to be encrypted.
  • Requires end-to-end encryption on email and other messaging apps (this is HUGE!!!).
  • Promotes post-quantum cryptography protections.
  • Sets aggressive 90-, 180-, and 270-day deadlines for each.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech follows with this comment: 

“I suspect the federal government was already vetting the security of its software in this way to some extent, but this executive order codifies the process and makes the results of that vetting available to everyone. Many of Biden’s efforts to strengthen cybersecurity have been about improving threat intelligence and transparency, and this EO is in line with those efforts.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy concludes with this:

“I am particularly happy to see that cloud providers will be required to publish information to clients on how to operate securely. Too many data breaches have been due to misconfigured data buckets, many times leaving the data stored in those buckets open to anyone with an internet connection and a little bit of knowledge. While it is not certain whether incoming U.S. President Donald Trump’s new administration will uphold the executive order, we can hope that they see the value in this executive order. Software companies should be required to demonstrate the security protections of their software.”

As one of the commenters above said, this is a big deal. My only question is if this will actually get carried out or will it be killed by the incoming Trump administration. Hopefully not.

UPDATE: Christian Geyer, CEO and founder of Actfore adds these comments:

“The US needs to remain at the forefront of AI adoption and innovation because that will significantly strengthen national security. While it’s crucial to recognize the expanding attack surface that AI may bring, we can be optimistic about the incredible potential it holds for enhancing security and efficiency. The main challenge lies in navigating the complexities of government processes, but with the right approach, these challenges can be overcome, ensuring that technology initiatives are both effective and secure. For example, international data transfer laws in the EU are way ahead compared to the US. One thing we need to be cautious about is stepping on the gas too hard to accelerate AI adoption before we have our legislative foundation settled. That could do more harm and be more of a national security threat.

The growing focus on AI integration is a positive sign of progress, but it’s essential to approach this with a clear commitment to cybersecurity and robust legislative protections. With careful planning and due diligence, we can ensure that AI adoption is not only rapid but also responsible, safeguarding against vulnerabilities and data risks for US-based companies and the government. Although the pace of technological advancement may sometimes outstrip current legislation, this presents an opportunity for the US to strengthen its regulatory frameworks and stay ahead of potential threats.

These executive orders signal a forward-thinking, proactive strategy for incorporating AI into national security. The focus must remain on integrating AI securely, with ongoing vigilance and the development of strong safeguards. The long-term success of these initiatives will depend on the ability of future policymakers to adapt swiftly to technological changes and prioritize both implementation and legal protections for the American people and their sensitive data. It will be very interesting to see what the incoming administration does with these executive orders from President Biden.”

UPDATE #2: Saviynt Chief Trust Officer, Jim Routh provided this comment:

“Today’s Executive Order on Cybersecurity provides additive guidance to the previous Executive Order primarily for federal agencies, those that provide product & services to federal agencies, and also includes guidance for the private sector. There is greater emphasis on resilience in cloud computing, which is timely as enterprises in the federal sector and private sector dedicate more resources to the consumption of SaaS and PaaS. Digital identity management is also a dominant theme in the Order with a clear direction toward the maturity of interoperability standards for easier management of digital identities with less dependence on storing credentials. This is more of a 10-year view on the maturity of digital identity standards but important nonetheless. 

“Third-party risk management is another dominant theme in the Order and appropriately so. My blunt assessment is that existing third-party risk management functions are woefully insufficient to meet today’s needs for all types of enterprises. Conventional third-party risk management (TPRM) practices evolved from the creation of an annual cyber security risk assessment originating from a response to a security questionnaire updated annually for high risk vendors. Regulatory requirements and compliance activities promote the continued use of this obsolete framework. 

The right approach for TPRM is to conduct vendor risk assessments daily through the aggregation of data derived from near real time sources/feeds across multiple domains such as:

1.      cyber resilience

2.      financial resilience

3.      geographic/political risk

4.      extreme weather events

5.      supply chain disruption

6.      environmental sustainability

7.      legal liability

Limited resources dedicated to TPRM can and should focus on the highest risk third parties on any particular day based on real data vs. self-attestations produced annually. Managing third-party risk should include the establishment of digital identities for third parties requiring access to cloud and on prem systems essential to perform their function reducing the risk of credentials being harvested and used maliciously. 

Another threat vector covered in the Order is the increased threat of a ransomware attack. Ransomware as a service has increased the probability of extortion through the exfiltration and dissemination of sensitive data. Nation state sponsored threat actors are using this attack vector to fund third-party resources to perform cyber espionage. Sanctions have been used as a tool to combat the spread of ransomware, but the results are mixed. Authoritative regimes continue to proliferate the use of extortion for funding purposes of other cyber-criminal activity.  Enterprises are forced to make extortion payments when existing recovery methods fail to restore core business functions in a timely manner. 

How impactful the Order will be remains to be seen in addition to its shelf life as an Executive Order given the new administration taking over the Executive Branch. The role of CISA will likely evolve as will the security requirements for federal agencies. The private sector will continue to be prodded toward a more effective model of building resilience into the delivery of IT products and services for all enterprises and consumers in addition to federal agencies.” 

UPDATE #3: Jonathan Gill, CEO at Panaseer provided me with this comment:

“It’s great to see such a detailed executive order relating to cybersecurity. This reflects the importance of cybersecurity at the highest levels – it is an issue of national security and should be treated as such. One of the big themes coming out of the order is the need to implement the right controls, and being able to provide evidence. Section two really underscores the need for secure software development. If it is followed through, software publishers will need to open their kimonos to show they have the right controls in place and that these are working effectively. It is also interesting to see in section seven that NIST will be issuing guidance on “minimum cybersecurity practices”, considering common cybersecurity practices and security controls.”

“Moving forward, we can expect to see even greater emphasis not just on encouraging companies to implement controls, but on providing evidence of such. However, many companies will struggle here. IT infrastructures and ecosystems have become incredibly complex. Most large organizations do not even have visibility of what assets they have, let alone the status of their security controls across those assets. This isn’t due to a lack of effort or care from cybersecurity professionals. The challenge lies in the fact that most large organizations rely on 50+ cybersecurity tools to protect their fast-moving IT environments. These tools operate in silos, disconnected from one another and informed by incomplete configuration management databases (CMDB). As we move into an era of ‘trust, but verify’, organizations will be under increasing pressure not only to outline what controls they have, but to demonstrate their effectiveness. Most large organizations already possess the data they need to understand their assets, controls coverage, and controls effectiveness, but it’s scattered and inaccessible. This data must be transformed into actionable, trusted intel, enabling security leaders to identify gaps, enforce accountability, and ensure stakeholders meet agreed-upon standards of controls.”

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

Posted in Commentary with tags on January 16, 2025 by itnerd

 HP Inc. today issued its latest Threat Insights Report, highlighting how threat actors are using malware kits and generative artificial intelligence (GenAI) to improve the efficiency of their attacks. Such tools are reducing the time and skill needed to create attack components, enabling attackers to focus on experimenting with techniques to bypass detection and trick victims into infecting their endpoints, such as embedding malicious code inside images. 

The report provides an analysis of real-world cyberattacks, helping organizations to keep up with the latest techniques cybercriminals are using to evade detection and breach PCs in the fast-changing cybercrime landscape. Based on data from millions of endpoints running HP Wolf Security1, notable campaigns identified by HP threat researchers include: 

  • Malware-by-numbers kits: HP threat researchers observed large campaigns spreading VIP Keylogger and 0bj3ctivityStealer malware that leverage the same techniques and loaders, suggesting the use of malware kits to deliver different payloads. In both campaigns, attackers hid the same malicious code in images on file hosting websites like archive.org, as well as using the same loader to install the final payload. Such techniques help attackers circumvent detection, as image files appear benign when downloaded from well-known websites, bypassing network security like web proxies that rely on reputation.
  • GenAI helping to create malicious HTML documents: Researchers also identified an XWorm remote access trojan (RAT) campaign initiated by HTML smuggling, which contained malicious code that downloads and runs the malware. Notably, similar to an AsyncRAT campaign analyzed in the previous quarter, the loader bore hallmarks that indicate that it may have been written with the help of GenAI, for example, including a line-by-line description and the design of the HTML page.
  • Gaming cheaters never prosper: Attackers are compromising video game cheat tools and modification repositories hosted on GitHub, adding executable files containing Lumma Stealer malware. This infostealer scrapes victims’ passwords, crypto wallets, and browser information. Users frequently deactivate security tools to download and use cheats, putting them at greater risk of infection without isolation technology in place.

By isolating threats that have evaded detection tools on PCs – but still allowing malware to detonate safely – HP Wolf Security has specific insight into the latest techniques used by cybercriminals. To date, HP Wolf Security customers have clicked on over 65 billion email attachments, web pages, and downloaded files with no reported breaches.  

The report, which examines data from calendar Q3 2024, details how cybercriminals continue to diversify attack methods to bypass security tools that rely on detection, such as: 

  • At least 11% of email threats identified by HP Sure Click bypassed one or more email gateway scanners.
  • Executables were the most popular malware delivery type (40%), followed by archive files (34%).
  • There was a notable rise in .lzh files, which made up 11% of archive files analyzed – with most malicious .lzh archive files targeting Japanese-speaking users.

HP Wolf Security runs risky tasks in isolated, hardware-enforced virtual machines running on the endpoint to protect users, without impacting their productivity. It also captures detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into intrusion techniques and threat actor behavior.  

About the Data

This data was gathered from consenting HP Wolf Security customers from July-September 2024

Guest Post: Major leak exposes 1.5 billion Weibo, DiDi, Shanghai Communist Party, and others’ records

Posted in Commentary with tags on January 16, 2025 by itnerd

The Cybernews research team recently discovered one of the largest data leaks mainly involving Chinese nationals. One unknown server exposed 1.5 billion records of users’ sensitive data, such as full names, government ID numbers, and more.

The unprotected server, which contains hundreds of millions of records, houses data from several major brands, such as JD.com, Weibo, DiDi, various Chinese banks, and many others.

Cybernews researchers believe the dataset is likely a mix of known and completely new data leaks collated on a single now-closed Elasticsearch server. While not all 1.5 billion records were exposed for the first time, some undoubtedly were, as we’ve found no indication of previous data leaks from companies included in the list.

“Saying the magnitude of this leak is alarming is an understatement. The leaks’ volume alone is mind-boggling. Worse so, the exposed server had data from essential sectors like healthcare and finance, amplifying the potential harm,” Cybernews researchers said. 

As the database’s owner remains unknown, it raises serious concerns about data privacy and security.

Key findings:

  • While nearly 1.5 billion records were exposed, that doesn’t mean the same number of individuals had their details leaked online. Since details come from different platforms, organizations, and economic sectors, some users may have had their data leaked several times.
  • The largest number of identifiable records were grouped in a collection credited to QQ messenger, Tencent’s instant messaging software. 
  • The second largest collection of leaked records, 504 million, was credited to Weibo, sometimes called China’s Twitter.
  • The exposed instance our team discovered had a whopping 142 million JD.comrecords exposed.
  • The third largest exposed dataset, with over 25 million records, was credited to China’s largest courier service, SF Express. 
  • The team discovered tens of thousands of leaked records titled Sichuan Nurse, another million titled Doctor and Patient, and 400k more credited to pharmacies.
  • Collections like Securities (243k), China Provident Fund (531k), China Union Pay Users (1.1 million), China Merchants Bank (1 million), Bank of China (985k), as well as a collection named Cryptocurrency (100k), strongly suggest a massive financial data exposure.
  • The collection of Zhejiang Student Records (9 million) and Graduate data (366k) points to the exposure of educational data likely involving millions of Chinese students.
  • There’s also the addition of the Zhilian collection (1.1 million), which likely refers to Zhillian Technology, an automotive R&D company.
  • 2.6 million records were credited to vehicle owners, and another 3.5 million were credited to an unnamed driving school, pointing to the server owners’ interest in Chinese motorists.
  • Another 65k records were attributed to customers of an unknown mobile carrier, residents of Beijing (196k), KFC China (5 million), and Household registration data (5.4 million)
  • Some collections were ominously dubbed ‘friendly nations’ (313k) and ‘data of multiple neighboring countries’ (2 million), signaling at least some level of political motivation for whoever’s behind the dataset.
  • The inclusion of 1.6 million records in a collection titled The Communist Party of Shanghai only strengthened the impression.
  • Another 74 million records were included in collections that we could not reliably translate or name using random collections of numbers and letters.

What data was exposed?

  • Full names
  • Email addresses
  • Platform ID numbers
  • Usernames
  • Phone numbers
  • Healthcare data
  • Financial records
  • Transportation-related details
  • Education-related records

To read the full research, please click here.

The World’s Most Digitalized Countries According To Safety Detectives

Posted in Commentary with tags on January 16, 2025 by itnerd

Here’s some new research done Safety Detective’s team that examines three areas of digitalization: connectivity, digital health, and e-government, highlighting critical areas of digital interconnectivity: mobile infrastructure, health-related services, and the extent of government influence on citizens’ lives.

Key findings at a glance:

  • According to DataReportal and GSMA Intelligence, worldwide, 5.35 billion people (66% of the global population) use the internet, while 5.61 billion (69.4%) individuals are mobile subscribers, highlighting a growing shift toward mobile-first connectivity.
  • Furthermore, social media users grew from 4.2 billion in 2021 to 5.04 billion in 2024, indicating worldwide adoption has increased by 20% in just 3 years.
  • Countries, like Saudi Arabia, Portugal, UAE and Brazil excel across multiple GDHM categoriesincluding Leadership and Governance, Strategy and Investment, Infrastructure and Services and Applications, showcasing comprehensive digital health strategies.
  • European and North American nations dominate the EGDI rankings, showcasing their robust digital infrastructure and governance. South Korea in particular, is the only country that has achieved 100% OSI score, providing government services.

Digital advancements offer significant potential to improve quality of life. However, they also bring potential challenges, such as data misuse, surveillance, and privacy concerns. Addressing these issues through thoughtful policies as well as promoting equitable access will likely help shape the future impact of these technologies.

You can access their report here: https://www.safetydetectives.com/blog/digitalized-countries-research/

Ransomware Victims and Threat Groups Have Reached An All-Time High, GuidePoint Security Finds

Posted in Commentary with tags on January 16, 2025 by itnerd

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced today the release of the GuidePoint Research and Intelligence Team’s (GRIT) annual Ransomware & Cyber Threat Report.

The GRIT 2025 Ransomware & Cyber Threat Report provides exclusive in-depth research, insights and analysis on the evolving ransomware ecosystem, exploring who cybercriminals are targeting (and why), the top tactics threat actors are using and what the future may hold for emerging ransomware groups in 2025. 

Noteworthy findings from this year’s report include: 

  • A record high of ransomware victims, with 1,600+ ransomware victims in Q4 2024 alone—the largest number recorded in a single quarter since the report’s inception. 
  • A 40% YoY increase in active threat groups, illustrating a continually-developing threat landscape. GRIT identified 88+ total active threat groups in 2024, including 40 newly observed adversaries.
  • An average of 92 ransomware victims were posted per week on the dark web. RansomHub claimed the largest number of victims in 2024, displacing LockBit as the most active ransomware group for the first time since 2021.
  • The United States remains a top geographic target for ransomware attacks. In 2024, more than half (52%) of ransomware victims were based in the U.S. 
  • An average of 110 Common Vulnerabilities and Exposures (CVEs) published per day,underscoring the overwhelming volume and velocity of information which cybersecurity teams are facing. Almost 40,000 CVEs were reported in 2024, a 43% increase from 2023.
  • Nearly 44% of vulnerabilities were rated “High” or “Critical” severity. However, threat actors continue to rely on historical vulnerabilities from preceding years.
  • The Manufacturing industry was most heavily impacted by ransomware, followed by the Technology and Retail/Wholesale industries. Interestingly, despite several high-profile attacks in 2024, the Healthcare sector dropped out of the top three most affected industries by the end of the year.

The report also explores the impacts of ransomware on critical infrastructure, examines threat actor deception and misinformation efforts in 2024 and examines major ransomware events throughout the year, including the continued fallout from Operation Cronos. 

The GRIT 2025 Ransomware & Cyber Threat Report is based on data obtained from publicly available resources, vendor threat research, internal incident response case data and open-source intelligence collected from illicit forums and marketplaces.

For more information:

Netcraft Publishes Details About A New Scam via Trump’s Social Media Platform

Posted in Commentary with tags on January 16, 2025 by itnerd

Netcraft has published a new blog post detailing its initial analysis of threat actors and malicious campaigns deployed using Truth Social, the social media platform created by Trump Media & Technology Group (TMTG) in 2022, to target its users. 

Key findings include:

  • Threat actors immediately target new Truth Social users — Netcraft received over 30 messages within hours of creating an account.
  • Truth Social’s group structure gives threat actors easy access to target groups with more than 100,000 members.
  • Advance Fee Fraud scams average $250, with some scammers asking for as much as $1,000 at once on Truth Social.
  • Central European, French-speaking threat actor targets global victims by impersonating trusted brands, including Spotify, Disney+, EasyPark, Sky, Netflix, and Google.

You can read the blog post here.

CIRA unleashes the fierceness of the Canada goose in a new ad campaign

Posted in Commentary with tags on January 16, 2025 by itnerd

With more than eight million people protected by CIRA Cybersecurity Services, the organization is looking to encourage more Canadians to join the flock by launching its first major cybersecurity advertising campaign. The digital campaign is inspired by the country’s most fearsome foe, the Canada Goose, who is ferocious in defence of its goslings, its place on the sidewalk, or a crust of bread. The mighty goose reflects CIRA’s fierce commitment to protecting Canadian institutions, small businesses and individuals who are at risk of cyber attacks.

CIRA practices cyber protection the Canadian way, which means building a flock of partners and institutions across the country to implement effective, adaptable, accessible and robust cybersecurity solutions tailored for families and organizations without compromising customers’ data safety and sovereignty.

With increased cyber incidents across all sectors of the economy including schools, municipalities, universities and hospitals, Canadian organizations need to assume a defensive formation to protect against cyber criminals with increasingly complex and effective tactics. This campaign showcases how CIRA is using its 20 years of expertise in technology, Canada-wide infrastructure, and partnerships with organizations and governments across the country to help fight back against cyber threats. CIRA is proud to offer services and solutions designed to tackle evolving Canadian and international online security threats while reinvesting in free tools such CIRA Canadian Shield to protect all Canadians and make the internet a safer place.

Developed by award-winning Toronto-based agency, Agnostic, the campaign will run across social media and digital platforms.

Learn more about CIRA cybersecurity services

UK considers ban on public sector ransomware payments 

Posted in Commentary with tags on January 15, 2025 by itnerd

On Tuesday, the UK government published a Home Office-led consultation proposing a ban on the public sector and critical infrastructure organizations making ransomware payments with the hope of disrupting ransomware gangs’ financial models and gather intelligence to help law enforcement target their operations.

The Home Office said that expanding an existing ban on ransomware payments would help make critical services such as hospitals, schools, railways, and other essential public services less attractive targets for ransomware attacks.

In addition to the ban, ransomware incident mandatory reporting has also been proposed aiming to boost UK law enforcement agencies’ access to intelligence on attacks and support international law enforcement operations targeting ransomware gangs.

“With an estimated $1bn flowing to ransomware criminals globally in 2023, it is vital we act to protect national security as a key foundation upon which this Government’s Plan for Change is built.

“These proposals help us meet the scale of the ransomware threat, hitting these criminal networks in their wallets and cutting off the key financial pipeline they rely upon to operate,” UK Security Minister, Dan Jarvis, commented.

Furthermore, the consultation will explore the implementation of ransomware payment prevention regime, offering victims guidance on how to respond to cyber incidents. It would also help block payments to known criminal groups and sanctioned entities.

The consultation will run for 12 weeks, ending on April 8.

Evan Dornbush, former NSA cybersecurity expert had this to say:

  “Something needs to change. The economics of cybercrime favor the aggressor. Until solutions can effect an increase in attackers’ costs and/or a decrease in attackers’ revenues, there is nothing to suggest the increasing rates of attack will diminish.”

I have said for a while that nobody should ever pay a threat actor who is holding their data hostage or is threatening to leak their data. Or perhaps both. It emboldens them to do more of this which is bad for all of us. This is a start, but more needs to be done to make sure that crime doesn’t pay.

UPDATE: Lawrence Pingree, VP, Dispersive adds this:

  “The benefit of this approach is that the reward for doing the ransom goes away. Australia did a similar mandate. I think it will likely have a positive effect on larger entities where the targeting often happens.”

Happy New Year…. A BMO Text Message Scam Is Making The Rounds

Posted in Commentary with tags on January 15, 2025 by itnerd

A reader of this blog sent me a screenshot of a text message scam that he just received:

Now this is an easy to spot scam for the following reasons:

  1. The text message states “We’ve detected unusual activity on your BMO client card starting with 551029.” The thing is, more recent BMO client cards start with that number. There’s nothing unique about that, which means that this text message is being sent to thousands of people and the threat actors are hoping to get 1% to fall for it because they’re not paying attention to a detail like that. For the record, BMO along with any other bank would use the last 4 digits of your credit or debit card in a situation like this. Assuming that they would send you a text message like this. More on this in a moment.
  2. The website that is mentioned isn’t “bmo.com” or something like that. This is clearly a website that has been set up to phish your banking details so that they can steal your money. And it goes without saying that you should not click on the link.
  3. BMO, nor any other bank would alert you to fraud via a text message. That never, ever happens.

I’m not going to go down the rabbit hole in terms of looking at the website or anything like that. Because we already know that this is a scam and should be avoided. Thus if you get a text message like this, delete it and move on with your day.