Skip to main content
News

Cyber News Rundown: Phishing campaigns taking advantage of COVID back on the rise

Cyber News Rundown: Phishing campaigns taking advantage of COVID back on the rise
Forum|alt.badge.img+7
  • Threat Research Analyst
  • 4 replies

Phishing campaigns have doubled over the previous 3 months since the groups behind COVID-based phishing scams have started distributing again. In other cybersecurity news, over 300,000 Toyota customers have been affected by a leak that was open for over 5 years.

Toyota reveals data leak for 300,000 customers

Officials for Toyota Motor Corp have recently discovered an access key to an internal data server was publicly exposed on GitHub when a portion of source code was mistakenly posted. The key was accessible for almost 5 years and may have been used to compromise some personal information for roughly 300,000 customers. Officials are also warning any T-Connect users to be wary of possible phishing attempts on email accounts that were tied to T-Connect.

Everest ransomware group offers full access to South African electricity company

Nearly 7 months after the Everest ransomware group first claimed responsibility for compromising the South African state-owned electricity company, Eskom, the group has updated the demanded price from $125,000 to $200,000 in cryptocurrency. Alongside the increased price, the group is offering full root access to most of Eskom’s servers for Windows and Linux systems, and many of the POS (Point of Sale) systems that are used to take customer payments.

Hackers compromise Australian telecom subsidiary

Just weeks after the Optus hack exposed the sensitive information of 2.1 million Australians, officials for the telecommunications firm Singtel have revealed that one of their subsidiary companies had been breached. The subsidiary in question is the IT firm Dialog, which was acquired by Singtel earlier this year, and began noticing unauthorized activity in their systems over the weekend of September 10th. This is not the first cyberattack that Dialog has faced in recent years, but Singtel staff have confirmed that this breach didn’t spread to any of their systems.

AI system uses finger heat to guess passwords

Researchers have created a new AI computer system that uses machine learning and thermal imaging to identify login credentials based on the heat signatures found on keyboards after being used. By using thermal imaging to see the heat on the different keys, the AI can make assumptions based on how warm each key is and use that to determine the order each key was pressed and compare that to a previously input list of passwords. While using longer passwords made the process take a bit longer, the AI was able to correctly identify most passwords if the thermal image was taken within 20 seconds of making the keystrokes.

COVID-related malspam campaigns back on the climb

After several months of relative silence, the groups behind COVID-19 phishing campaigns have begun distributing again, with numbers doubling from the prior 3 months. This latest campaign is exploiting Google Forms to create phishing pages under the guise of the U.S. Small Business Administration (SBA), with the hopes of stealing credentials and other sensitive information from business owners. Many of these emails include relief keywords to entice recipients into giving up any information that would be needed to enroll in such a program.

Did this help you find an answer to your question?

20 replies

tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • October 14, 2022

Hackers go to great lengths to crack passwords. I wouldn’t think keyboards would hold heat signatures long enough to allow a hacker to come in and guess the password. This is probably a rare method based on the conditions required. 

 

Here is an excerpt from the article: 

“Using ThermoSecure to analyse images using AI, 86% of passwords were revealed when thermal images were taken within 20 seconds, 76% could be guessed using images within 30 seconds, and 62% could be discovered after 60 seconds. 

The longer the password, the more difficult it was to reveal, but it still proved possible in the majority of cases. ThermoSecure could crack two-thirds of passwords of up to 16 characters and, as passwords get shorter, the more success the system had – 12-character passwords were guessed up to 82% of the time and eight-character passwords were guessed up to 93% of the time.  “

 

I assume a user would have to log in with their password and then walk away for this method to work. I can say I rarely enter my password and then walk away from my computer. 


Jamesharris85
New Voice
Forum|alt.badge.img+4

Sensitive info of 2.1 million Australians?? Jeez not a small number then. 

Great rundown summary, thank you for sharing


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • October 15, 2022
tmcmullen wrote:

Hackers go to great lengths to crack passwords. I wouldn’t think keyboards would hold heat signatures long enough to allow a hacker to come in and guess the password. This is probably a rare method based on the conditions required. 

 

Here is an excerpt from the article: 

“Using ThermoSecure to analyse images using AI, 86% of passwords were revealed when thermal images were taken within 20 seconds, 76% could be guessed using images within 30 seconds, and 62% could be discovered after 60 seconds. 

The longer the password, the more difficult it was to reveal, but it still proved possible in the majority of cases. ThermoSecure could crack two-thirds of passwords of up to 16 characters and, as passwords get shorter, the more success the system had – 12-character passwords were guessed up to 82% of the time and eight-character passwords were guessed up to 93% of the time.  “

 

I assume a user would have to log in with their password and then walk away for this method to work. I can say I rarely enter my password and then walk away from my computer. 

 

This is like something out of Mission Impossible. Tom Cruise dangling overhead, using some spy gadget to detect heat signatures and crack the password.

 

Amazing stuff. I wonder if you can take the photos and come back later with some guesses. I’m with you, I wouldn’t normally walk away right after logging in.


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • October 15, 2022

Thanks for the rundown. Good to have a heads up on the COVID-related phishing attacks. Guess the pandemic isn’t over after all.


russell.harris
Popular Voice
Forum|alt.badge.img+5
kleinmat4103 wrote:
tmcmullen wrote:

Hackers go to great lengths to crack passwords. I wouldn’t think keyboards would hold heat signatures long enough to allow a hacker to come in and guess the password. This is probably a rare method based on the conditions required. 

 

Here is an excerpt from the article: 

“Using ThermoSecure to analyse images using AI, 86% of passwords were revealed when thermal images were taken within 20 seconds, 76% could be guessed using images within 30 seconds, and 62% could be discovered after 60 seconds. 

The longer the password, the more difficult it was to reveal, but it still proved possible in the majority of cases. ThermoSecure could crack two-thirds of passwords of up to 16 characters and, as passwords get shorter, the more success the system had – 12-character passwords were guessed up to 82% of the time and eight-character passwords were guessed up to 93% of the time.  “

 

I assume a user would have to log in with their password and then walk away for this method to work. I can say I rarely enter my password and then walk away from my computer. 

 

This is like something out of Mission Impossible. Tom Cruise dangling overhead, using some spy gadget to detect heat signatures and crack the password.

 

Amazing stuff. I wonder if you can take the photos and come back later with some guesses. I’m with you, I wouldn’t normally walk away right after logging in.

Yes. I thought it sounded more like something from a spy movie! All these finger print copies they manage to replicate perfectly for biometrics!

covid ones are cheeky as a lot of people won’t be surprised to get a notification. Same with the energy bill scams here in the uk. My sister in law got caught out with one of those recently 


AsadP
New Voice
Forum|alt.badge.img+1
  • New Voice
  • 56 replies
  • October 17, 2022

It’s not even just COVID now - with all the DWP payments and payments that help low income households, there’s always just something new that tempt these scammers and low lifes!


Just got to be vigilant at all costs, it doesn’t matter how busy you are, if you are on an unsolicited call from someone you don’t know, then it most likely is bogus!

I once spoke to a client on Helpdesk and they had fallen for a common scam where they had a scammer pose as their own family member, had to prevent them from paying more money to a “PC health check” scam... it’s crazy how they will go through all lengths.


tmcmullen
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 177 replies
  • October 18, 2022

@AsadP I agree...unfortunately they will never run out of topics to use to lure in their next victims. 


Great read.

 

It is scary to think that the Everest ransomware group have root access to the Eskom servers 😮


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • October 18, 2022

Everest ransomware group offers full access to South African electricity company As if South Africa is not already really in a jam with Electricity Supply. This will make things even worse for all of us here. :-) 


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • October 18, 2022
tmcmullen wrote:

@AsadP I agree...unfortunately they will never run out of topics to use to lure in their next victims. 

@tmcmullen  the old saying, curiosity killed the cat is unfortunately true with the human race as well. That why you still get  people clicking on wrong links etc. “Lets just see what this is all about” and boom, your company is compromised. 


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • October 18, 2022
AsadP wrote:

It’s not even just COVID now - with all the DW 

I once spoke to a client on Helpdesk and they had fallen for a common scam where they had a scammer pose as their own family member, had to prevent them from paying more money to a “PC health check” scam... it’s crazy how they will go through all lengths.

@AsadP  not just crazy, it is sad as well to think that people loose so much due to others being just to lazy to put in the effort to earn an honest income themself. 


russell.harris
Popular Voice
Forum|alt.badge.img+5

I still don’t know how these people can do such things. How can you be so free of guilt and humanity?!


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • October 18, 2022
Jamesharris85 wrote:

Sensitive info of 2.1 million Australians?? Jeez not a small number then. 

Great rundown summary, thank you for sharing

That is scary, but what is even more “scary” is if you think that our state owned electricity provides in SA has been compromised. As if we are not already having enough issues with Electricity supply here. 


tasystems
New Voice
Forum|alt.badge.img+8
  • New Voice
  • 156 replies
  • October 18, 2022

So much sophistication, yet we know that for many, you merely get an end user to send through their password via a simple web site… This week along the amount of people nearly resetting their Microsoft passwords because of issues, was really worrying, but thankfully, on my side most are savvy enough to ask before doing anything!

 


MunkeyMan
New Voice
Forum|alt.badge.img+4
  • New Voice
  • 304 replies
  • October 18, 2022

COVID related scams were always going to pick up at this time of year. It goes hand in hand with the increased cases.


FasteasyPhil
New Member
Forum|alt.badge.img+3
  • New Member
  • 39 replies
  • October 18, 2022
tmcmullen wrote:

Hackers go to great lengths to crack passwords. I wouldn’t think keyboards would hold heat signatures long enough to allow a hacker to come in and guess the password. This is probably a rare method based on the conditions required. 

 

Here is an excerpt from the article: 

“Using ThermoSecure to analyse images using AI, 86% of passwords were revealed when thermal images were taken within 20 seconds, 76% could be guessed using images within 30 seconds, and 62% could be discovered after 60 seconds. 

The longer the password, the more difficult it was to reveal, but it still proved possible in the majority of cases. ThermoSecure could crack two-thirds of passwords of up to 16 characters and, as passwords get shorter, the more success the system had – 12-character passwords were guessed up to 82% of the time and eight-character passwords were guessed up to 93% of the time.  “

 

I assume a user would have to log in with their password and then walk away for this method to work. I can say I rarely enter my password and then walk away from my computer. 

 

 

Surely they are just filming the keyboard anyway or have access to do so.  If you allow cameras everywhere data is easy to grab without thermal imaging.


Forum|alt.badge.img+4
  • New Voice
  • 56 replies
  • October 18, 2022
tmcmullen wrote:

Hackers go to great lengths to crack passwords. I wouldn’t think keyboards would hold heat signatures long enough to allow a hacker to come in and guess the password. This is probably a rare method based on the conditions required. 

I assume a user would have to log in with their password and then walk away for this method to work. I can say I rarely enter my password and then walk away from my computer. 

I agree that there would have to be some well-timed social engineering to go along with this technical hack to get a “clean” shot of a keyboard just after password entry but without hands in the way nor other keypresses having taken place.  This would, however, be killer for physical security entry keypads or the like. A camera hidden in a non-secure portion of the building aimed at an entry door keypad would pick up not only the visible image of keying the code but the thermal image in case someone was hiding their keystrokes. A door, safe, secure file cabinet, etc are all excellent targets because once you enter the code you’re done interacting with the keypad.


Jamesharris85
New Voice
Forum|alt.badge.img+4
tasystems wrote:

So much sophistication, yet we know that for many, you merely get an end user to send through their password via a simple web site… This week along the amount of people nearly resetting their Microsoft passwords because of issues, was really worrying, but thankfully, on my side most are savvy enough to ask before doing anything!

 

“So much sophistication, yet we know that for many, you merely get an end user to send through their password via a simple web site… “ I think this is the most alarming part really, I am unsure how you change that without just constant user education


FasteasyPhil
New Member
Forum|alt.badge.img+3
  • New Member
  • 39 replies
  • October 19, 2022
gru_dyates wrote:
tmcmullen wrote:

Hackers go to great lengths to crack passwords. I wouldn’t think keyboards would hold heat signatures long enough to allow a hacker to come in and guess the password. This is probably a rare method based on the conditions required. 

I assume a user would have to log in with their password and then walk away for this method to work. I can say I rarely enter my password and then walk away from my computer. 

I agree that there would have to be some well-timed social engineering to go along with this technical hack to get a “clean” shot of a keyboard just after password entry but without hands in the way nor other keypresses having taken place.  This would, however, be killer for physical security entry keypads or the like. A camera hidden in a non-secure portion of the building aimed at an entry door keypad would pick up not only the visible image of keying the code but the thermal image in case someone was hiding their keystrokes. A door, safe, secure file cabinet, etc are all excellent targets because once you enter the code you’re done interacting with the keypad.

I think this is obviously 1 factor authentication.  Its easier to get a password in other ways as people have said. We are not yet at the blade runner steal the right eye level of hacking, so that sort of 2FA is still hard to beat, I’m sure they will discover phone fingerprint access is flawed as well (without stealing fingers), Everything is crackable (brute force or now via social engineering) and passwords are now getting more and more easy to defeat even without an infrared camera.  Maybe the fact that opentext owns a DR company as well (carbonite) says something.


mmaner
New Voice
Forum|alt.badge.img+6
  • New Voice
  • 64 replies
  • October 19, 2022

Heat signatures!!!  Holy crap BatAdmin, who would've thought?


Reply