If you are having trouble viewing this email, click here to view this online



   ISSUE 74

28 September 2017

Article of the Month Around the World

Social Engineering Fraud

�Social engineering fraud� is a scam used by hackers or fraudsters to manipulate their victims into giving out confidential information and funds. They may exploit a person�s trust to find out their banking details, passwords or other personal data. This can happen in so many ways and some of these techniques are explained in this article,

Email scams

There can be two types of Email scams.
One of these is called Pretexting which is used to target a specific victim in order to get their personal information such as account numbers or passwords. Some of the similar scenarios are when the attackers impersonate the bank managers and send Emails to their clients with the intention of gaining their trust as the bank to get the bank account information.
Phishing is another type of scam which can be done using an Email. This email might act as an email from a legitimate organization involving in an online transaction business but although it looks as if it can be trusted it might not be.


Ransomware is a type of malware that locks users from accessing their data in their computer or any mobile device. In order to unlock their data, the users must pay a certain amount of ransom, this is mainly done by the payment method which uses Bitcoin. Although paying is an option for recovering your data, we do not recommend payment because there is no guarantee the attackers will keep their promise.
Hackers targets to install malicious software on their computer that will encrypts all their data. But the victim might not be able access since hacker has locked them, and the software then also explains that the computer is now locked and demands a ransom before the hacker will unlock the computer for you. Victims are directed to a particular site or to call one particular number, and blackmailing the victims for money. Payments are demanded by credit card, bank transfer, a money transfer service. But sometime the hacker will not unlock the computer even though the hacker has received the money which was demanded, so finally they will have both your money and your data which will harm you.

Manager Fraud

Fraudsters might want to gather information of company employers or employees through the internet to use them for an illegal activity. These fraudsters might specifically target employees who handle sensitive or fund information in the company. This collected information can be used to damage the reputation of the company, employer or employees and other damages such as transfer of funds to another bank account for their benefit.


Sweepstakes or lotteries

If you get a message to your computing device as �Congratulations, you are the grand prize winner! To claim your prize, all you need to do is pay a processing fee.� It is not recommended to pay the requested fee as this might only be a trick to get your bank account details or the fee, the victim might never get the prize. This is a very common form of a social engineering technique used to get the trust of the internet users.


Minoza Mohamed

Minoza is an undergraduate of Sri Lanka Institute of Information Technology who is currently following BSc(Hons) IT Specializing Information Technology. Currently he is working as Intern - Information Security Engineer at Sri Lanka CERT|CC

























1 Statistics on the Internet growth in Sri Lanka
2.The Dragon Research Group (DRG)
3.TSUBAME (Internet threat monitoring system) from JPCERT | CC
4.Shadowserver Foundation
5. Team Cymru



"....A cryptocurrency miner surfaced on the world�s largest torrenting site for a day over the weekend, raising the ire of users unaware the tool was there, let alone leveraging their machine�s computing power.

Users noticed the miner Friday night on The Pirate Bay, a site that acts as a treasure trove of links to torrents, mostly illegal....."


(Un)documented Word feature abused in phishing campaigns.


"...Attackers are using an undocumented Word feature in the wild to perform reconnaissance on user devices to gather sensitive configuration details for future attacks...."

  Google/HTC deal is official, Google to acquire part of HTC�s smartphone team

'...The Google and HTC deal is official, it's just not quite what we expected. Google isn't buying HTC outright, � la Motorola. Instead, Google and HTC have signed an agreement to send some of HTC's employees over to Google, while HTC gets a $1.1 billion cash infusion. The deal also includes a non-exclusive license for HTC's intellectual property.....'

Cryptocurrency web mining: In union there is profit



'...In the last months, we stumbled upon some JavaScript files apparently used to mine cryptocurrencies directly within the browser. For a long time now, cybercriminals have taken advantage of cryptocurrency mining in order to make a profit. However, they generally use malware or potentially unwanted applications they install on the victim�s machine in order to turn a dishonest penny.....'

Three things to know about the dark web


'....One of the more curious aspects about the dark web is that it didn�t start out as such a dark place: it began with bulletin boards in the 80s and 90s � the markets of that day � and continued in the early 2000s, when Freenet launched as a private peer-to-peer network for sharing content. At about the same time, the United States Naval Research Laboratory came up with what would be called The Onion Routing project, or Tor, with the intention of shielding US intelligence communications online.....'

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in August 2017
  Statistics - Sri Lanka CERT|CC


'...From dense city centers to remote islands, Google has made an attempt to map the entire world at the street level. Now, the tech giant is improving those street views and it will be sending a new fleet of Google Street View cameras out into the world.....'

State of Cybercrime 2017: Security events decline, but not the impact

"...The past year has been tough for enterprise security teams. Attacks like Petya and NotPetya suggest that the impact scale is increasing dramatically. The recent leak of government-developed malware and hoarded vulnerabilities has given cybercriminals greater capabilities. .."

�..This week, the Defense Department granted the cloud computing giant a provisional authorization to host Impact Level 5 workloads, which are the military and Pentagon�s most sensitive, unclassified information. ...�
Darktrace: Security teams are too busy battling internal complexity to fight off hackers

."...Enterprises are now so complex, with multiple systems housed in various clouds, both internal and external, on top of an often large volume of legacy applications and infrastructure to manage, that security teams are hampered in their efforts to protect their organisations....."

Notice Board
  Training and Awareness Programmes - September  2017

Brought to you by: