The Weekly Top 3 are the three most relevant news stories for the week that are related to phishing scams and activities reported in the media, security blogs and security magazines on the Internet. This week, we look at phishing activities related to Adobe, Edinburgh Council and Zeus (not the God of Thunder).
An APT hacking group by the name of Wekby has been reported as using phishing e-mails to exploit a zero-day bug found in Adobe Flash. Security researchers stated that spear phishing e-mails were sent to their intended victims, indicating that they needed to download and update their Adobe Flash. The e-mail contained a malicious link that would forward the victim to a website containing a '.swf' file that exploits the Adobe Flash Player. This exploit allows the hacker group to execute commands on the victim's computer and allows for further remote access to the computer. Click the link below to read more.
https://threatpost.com/apt-group-exploiting-hacking-team-flash-zero-day/113715
The Edinburgh City Council stated earlier this week that hackers were able to obtain over 13,000 e-mail addresses from their computer systems. They have indicated that no other personal information was stolen during the cyber attack. The hackers gained access by bypassing the security of one of their web service providers. They are expecting that users will get an increase in phishing e-mails as a result, but have asked users of the Council's website to change their passwords. This is to ensure that the hackers do not gain access their online account. Click the link below to read more.
Bank customers in the United Kingdom have been warned of a major phishing campaign by hackers that makes use of the Dyre malware to steal financial information. Security researchers from BitDefender stated that almost 20,000 customers were targeted. The cyber criminals use compromised servers to send phishing e-mails with the Dyre banking trojan. Once a victim has allowed the malware to install itself on their computer, it waits still the user logs into the online banking website of a well known bank. Using malicious code, the malware will inject this code into the browser and covertly steal credentials, and manipulate user's accounts. Click the link below to read more.