Weekly Top 3 – ED #14.2015


The Weekly Top 3 are the three most relevant news for the week that are related to phishing scams reported in the media, security blogs and security magazines on the internet. This week, we look at phishing scams related to TRICARE, Apple and a Dyre Wolf.

 

TRICARE Warns Military Veterans And Public About Phone Scams

Another medical insurer received reports that military personnel and their families had fallen victim to a phishing phone scam. The victims were called by persons appearing to be TRICARE employees. The scammers were using the victim’s personal information to trick them into handing over their Social Security numbers. The scam required the fake TRICARE representative to confirm the victim’s personal information and offer them new coverage for their existing plan. However, this would only be provided if the victim gave them the Social Security number. Click the link below to read more.

http://www.abcactionnews.com/money/consumer/taking-action-for-you/phishing-phone-calls-target-military-members-and-their-families

 

Apple Users Become Victim To Phishing E-mails

The security firm BitDefender stated that Apple users were being targeted though phishing e-mails for access to their online accounts with Apple. The phishing e-mail does not directly address the recipient, but claims that the user must perform a verification on their billing information. The e-mail contained a “Reset Page” link that forwarded the user to a webpage that requested the user to enter their My Apple login credentials, payment card information and address. Click the link below to read more.

http://www.spamfighter.com/News-19547-Bitdefender-Users-of-Apple-Become-Victims-of-Phishing-Emails-Again.htm

 

IBM Spots A Dyre Wolf

Earlier this week, IBM Security uncovered and had been following a malware by the name of Dyre. However, a recent variant of Dyre called Dyre Wolf had managed to take between half a million and $1.5 million from organizations in recent incidents. What made this malware dangerous was the fact that it exploited a vulnerability in two-factor authentication with the use of social engineering. Dyre monitored banking websites visited on infected computers. When it detected a user attempting to login, it would replace the webpage with one informing the user of technical difficulties and provide a number to get help. Once the victim called the number, the scammer would trick the victim into divulging their login credentials for the purpose of stealing money through wire transfer. Click the link below to read more.

http://paymentweek.com/2015-4-3-ibm-spots-new-malware-attack-the-dyre-wolf-6962/

Leave a comment

Your email address will not be published. Required fields are marked *