Insightful &
Helpful Articles

Here is what we're working on and
thinking at Hedgehog security.

In this week's news roundup, we look at new figures that shed light on UK board members' level of cyber security knowledge, a fraudulent Facebook campaign targeting over 100 brands, insights from black hat hackers and more:

Fraudulent Facebook Campaign Gathers Users’ Info     

A new ‘typosquatting’ campaign has been discovered on Facebook that uses over 100 different well-known brands to steal users’ information.
Tim Helming, Product Management Director for DomainTools, was the first to spot the fraud when seeing an advert for an EasyJet boarding pass to celebrate a ’22 anniversary special’. Once the user clicks on the message they are redirected to a website that asks for personal information; and occasionally, to connect to your social media accounts. This information is potentially then sold on underground forums and sites and can lead to ransomware attacks.
Helming discovered 113 separate fraudulent domains set up to look like many popular brands such as British Airways, Ryanair and Tesco.
If you have concerns over the validity of a link you are encouraged to click, hovering your mouse over the suspect URL will help you to identify if it is genuine. Typos and change in the brand’s ‘tone of voice’ may also be indicators of a typosquatting campaign. As the saying goes, if it looks too good to be true – it probably is.

Survey Reveals Hackers' Common Approaches

The results from Thycotic’s 2017 Black Hat survey are in and after quizzing over 250 hackers, 32% say privileged accounts make the most attractive targets to hackers for gaining access to critical data while 27% said email was the easiest way.
80% of hackers say humans are still the most responsible for security breaches, even more than inadequate security and unpatched software. This will likely come as no surprise to those in information security who have seen numerous data breaches as the result of staff who are unaware of the fundamentals of cyber security.
Taking a more people-centric approach that is simple and straightforward for staff to follow will vastly improve your level of security. Thycotic recommends implementing multi-factor authentication and encryption as these were voted as the biggest obstacles for hackers to overcome when attempting to gain access to data.

UK Firms and Charities must “Urgently” Improve Level of Cyber Security

The Government has recently warned that the UK’s top businesses and charities must “urgently” improve their ability to respond effectively to online attacks. This is following a Government survey of the FTSE 350 that revealed almost 70% of board members have not had appropriate training to deal with security breaches.
Over 50% of board members recognise that online threats are a top risk to their business but 69% of them do not receive an adequate amount of information on these risks.
In response to these findings, the Government is encouraging businesses to consider cyber security a top priority and to develop methods to protect themselves from the economic damage that cyber attacks can inflict on businesses.
Matt Hancock MP, the minister for digital, said that recent attacks had shown "the devastating effects of not getting our approach to cyber security right" and that the UK has "a long way to go until all our organisations are adopting best practice".
If you would like to develop an effective cyber security plan of action for your business, get in touch with us today to discuss how you can be one step ahead of your competition.

NHS Trust Hit by Cyber Attack

NHS Lanarkshire, Scotland’s third-largest NHS trust, has asked patients not to attend the hospital unless it is essential after being hit by a cyber attack.
While a spokesperson insisted there were “no concerns around emergency treatments”, operations and appointments have been cancelled since the attack hit on Friday afternoon.
The trust was also affected by malware back in May during the global WannaCry ransomware. Officials did not confirm the type of virus the trust has been hit by but announced that hospitals and GP practices were experiencing IT difficulties.
Chief Executive Calum Campbell stated, "We have detected some incidences of malware.
“We took immediate action to prevent this spreading while we carried out further investigations.
"We are now putting in place a solution from our IT security provider.
"While the issue is being resolved our staff have been working hard to minimise the impact on patients and we apologise to anyone who has been affected".

Ukraine Detects New Malware Similar to NotPetya

The Ukrianian cyber security firm ISSP said this week it may have detected a new “computer virus distribution campaign” which could lead to Ukraine facing similar cyber attacks to NotPetya.
As with NotPetya, this new malware seemed to originate in accounting software with the intent to take down networks.
“This could be an indicator of a massive cyber attack preparation before National Holidays in Ukraine,” ISSP said in a statement.
NotPetya affected many Ukrainian government agencies and businesses, which then hit corporate networks of multinationals with business connections throughout Eastern Europe.
ISSP’s claim was supported by the state cyber police who said they had also detected new malicious software and stated the incident is “in no way connected with global cyber attacks like those that took place on June 27 of this year and is now fully under control”.
What are your thoughts on the news topics covered in this week's roundup? Let us know on Twitter or Facebook which stories caught your attention.
If you are concerned about your company's level of cyber security, get in touch with us today to discuss how to stay one step ahead of hackers.