SEARCH
  • [:en]Recent Posts[:af]Onlangse bydraes

  • [:en]Categories[:af]Kategorieë

  • [:en]Archives[:af]Argiewe

spear phishing

[:en]Phishing and whaling[:af]Phishing en whaling[:]

Friday, February 5th, 2016

[:en]

Recently we gave you some pointers on identifying phishing e-mails. So now that you know all the signs and how to outwit the criminals, there’s another variant – spear phishing. But don’t panic, it’s almost the same, with a bit of a twist.

Spear phishing is an e-mail that seems to be sent from an individual or business you know. Of course it’s really from hackers attempting to obtain you credit card, bank account numbers, passwords and financial information.

These types of attacks focus on a single user or department within an organisation and use another staff member from the organisation’s name to gain the victim’s trust. (Also see our recent article on the incident at Finance.)

They often appear to be from your company’s human resources or IT department, requesting staff to update information, for example passwords or account details. Alternatively the e-mail might contain a link, which will execute spyware when clicked on.

But wait, there are even more fishing comparisons.

When a phishing attack is directed specifically at senior executives, other high profile staff or seemingly wealthy people, it’s called whaling. By whaling cyber criminals are trying to catch the “big phish”, or whale.

phishing

[SOURCE: http://www.webopedia.com]

 
 
 
 

[:af]

Ons het onlangs vir jou `n paar wenke gegee hoe om `n phishing e-pos uit te ken. So noudat jy gereed is om enige krimineel uit te oorlê, het ons vir jou nog `n weergawe van phishingspear phishing. Maar moenie paniekbevange raak nie. Dis amper dieselfde, net ʼn bietjie anders. 

Spear phishing is wanneer ʼn e-pos lyk of dit gestuur is vanaf ʼn individu of besigheid wat jy ken. Inderwaarheid kom dit van kuberkrakers wat probeer om jou kredietkaart, bankrekening, wagwoord en finansiële inligting te aas.

Hierdie tipe aanvalle fokus op ʼn enkele gebruiker of departement binne `n organisasie. Deur die e-pos te stuur vanaf iemand binne die organisasie se e-pos, word jou vertroue gewen en gee hy makliker die inligting. (Sien ook ons berig oor die onlangse insident by  Finansies)

Die e-posse lyk dikwels asof dit gestuur word deur jou menslike hulpbronne of IT-afdeling en versoek gewoonlik dat personeel hulle inligting (byvoorbeeld wagwoorde of rekeninginligting ) opdateer of heraktiveer. Alternatiewelik bevat die e-pos ʼn skakel wat spyware aktiveer indien daarop gekliek word. 

 

Maar dis nie al nie – daar is selfs nog meer visvang-analogieë.

Wanneer `n phishing-aanval direk geloods word op senior uitvoerende hoofde, hoë-profiel personeel of skynbaar finansieël welaf persone, word dit whaling genoem. Deur whaling probeer kuberkrakers een “big phish”, of te wel die walvis, vang.

phishing

 
[BRON: http://www.webopedia.com]

[:]

[:en]New cyber crime e-mail targets individuals[:af]Nuwe kubermisdaad e-pos teiken individue[:]

Wednesday, January 13th, 2016

[:en]

Over the past two weeks a new e-mail scam has reared its head on campus. Scammers use contact information, available on the internet, to target individuals at the university.

One example is an e-mail which has been sent to various staff at the Finance department with a request to transfer money. (see e-mail with inactive addresses below)

The e-mail is sent from a gmail address, but the display name is a SU staff member’s name. Since the cyber criminal also saw the contact person’s name on the website (in this case Finance’s website), they address the receiver personally as, for example, Karin.

Similar scams use fax numbers available on the internet and then a fax is sent directly to the contact person.

Do not, under any circumstances, react to these e-mails. It is clearly an attempt to attract your attention and convince you to conduct a financial transaction. Delete and ignore the e-mail.

Report suspicious e-mail to sysadm@sun.ac.za and also read our articles on security on our blog, as well as the fortnightly newsletter, Bits & Bytes.


 

FROM: Stellenbosch University staff member name<example@gmail.com>
TO: Stellenbosch University staff member name<example@sun.ac.za>

Karin, 

Let me know if you can process a same day domestic bank transfer to a client. You will code it to professional services

The amount is R870,000, kindly confirm so i can forward the appropriate beneficiary details to enable instant clearance.

Regards

Sent from my iPhone

[:af]

Daar is die afgelope twee weke `n nuwe tendens op kampus waar kubermisdadigers kontakinligting wat op die internet beskikbaar is, gebruik om individue te teiken.

Een voorbeeld hiervan is `n e-pos wat aan verskeie personeel van Finansies gestuur is met `n versoek vir die oorbetaling van gelde. (sien e-pos onder met onaktiewe adresse)

Die e-pos word gestuur vanaf `n gmail adres, maar die display name is `n US personeellid se naam. Omdat die kubermisdadiger die kontakpersoon se naam ook op die internet (in die geval Finansies se webwerf) kon kry, rig hy die e-pos persoonlik aan byvoorbeeld Karin. 

Soortgelyke gevalle gebruik ook faksnommers wat op die internet beskikbaar is en stuur dan `n faks aan `n spesfieke persoon.

Moet onder geen omstandighede op hierdie e-posse reageer nie. Hierdie is duidelik `n e-pos wat poog om u aandag te trek en te oortuig om `n finansiële transaksie uit te voer. Verwyder en ignoreer dit bloot.

Meld verdagte e-posse aan by sysadm@sun.ac.za en lees ook artikels oor sekuriteit op ons blog, sowel as die twee-weeklikse nuusbrief, Bits & Bytes.


 FROM: Stellenbosch University staff member name<example@gmail.com>

TO: Stellenbosch University staff member name<example@sun.ac.za>

Karin,

Let me know if you can process a same day domestic bank transfer to a client. You will code it to professional services 

The amount is R870,000, kindly confirm so i can forward the appropriate beneficiary details to enable instant clearance.

Regards

Sent from my iPhone

[:]