NO problem, it seems that targeted phishing ( aka Spear Phishing) is on
the rise again, I have seen quite a few attempts and been looking at
email and other items targeting our users, a lot more lately. 

 

Sincerely

EZ

 

Edward E. Ziots

CISSP, Network +, Security +

Security Engineer

Lifespan Organization

Email:[email protected]

Cell:401-639-3505

 

 

From: John Cook [mailto:[email protected]] 
Sent: Wednesday, June 08, 2011 2:21 PM
To: NT System Admin Issues
Subject: RE: Template Phishing Alert Email?

 

I'll add those to the template EZ, thanks. I actually got several
replies from our older, less computer literate staff praising how clear
this made it for them so whoever posted the original gets a great big
thanks!

 

From: Ziots, Edward [mailto:[email protected]] 
Sent: Wednesday, June 08, 2011 1:29 PM
To: NT System Admin Issues
Subject: RE: Template Phishing Alert Email?

 

Very nice, maybe adding links to phishtank (www.phishtank.com) ( which
you can seach to see if the URL is a phish) or the Antiphishing Working
Group ( APWG) at http://www.antiphishing.org/ for more information. (
http://www.antiphishing.org/resources.html) 

 

This is a good article for the more technically inclined from SANS

http://www.sans.org/reading_room/whitepapers/privacy/phishing-pharming-e
vil-twins_1731

 

Z

 

Edward E. Ziots

CISSP, Network +, Security +

Security Engineer

Lifespan Organization

Email:[email protected]

Cell:401-639-3505

 

 

From: John Cook [mailto:[email protected]] 
Sent: Wednesday, June 08, 2011 12:49 PM
To: NT System Admin Issues
Subject: RE: Template Phishing Alert Email?

 

My slightly altered version

 

Some of you may have heard about Sony's recent troubles with hackers
getting into the PlayStation and Online Entertainment networks.  If you
haven't been following the story, you may not be aware that other Sony
services are also experiencing breaches.   I expect Sony to have
difficulty for some time.  If you have any Sony account ID's (they also
own BMG Music) you need to be extra vigilant.

 

It's a good time to point out some things you should be doing or need to
know.

1.       Don't recycle passwords, use different, complex passwords on
every site, at least as complex as the site will allow.  Doing this is
the #1 item to protect yourself.

2.       Use a password management app that allows you to securely
manage an ever growing list of passwords.  Smart phone users have a
large array of choices, many of them free.  See your Appstore,
marketplace, etc.

3.       If a site has access to a credit card #, as the Sony sites do,
keep a watchful eye on that card.  There have been some reports of
fraudulent charges and phishing scams breaking out to get the Security
Code from the back of credit cards.

4.       If an email comes to you asking for login information, or other
personal information, you should contact the company that is supposedly
represented by the email, or just ignore it, because it's 99% probable
that it is a phishing attempt.

a.       Do not automatically click on links within the email.  Hover
over the links, if it takes you to some place that doesn't look correct
it probably isn't.

b.      For example you bank with Chase, emails should be from 
[email protected] <mailto:[email protected]>  or sent on behalf of 
[email protected] <mailto:[email protected]> .  Website links should
have chase.com before any page links, example www.chase.com/default.aspx
<http://www.chase.com/default.aspx>  would be a good valid page www is a
computer at the chase.com internet domain default.aspx is the name of a
specific web page.  
www.chase.com.differentdomain.info/changepssword.aspx
<http://www.chase.com.differentdomain.info/changepssword.aspx>  is
actually an address not going to a Chase owned website.  In this example
www.chase.com <http://www.chase.com/>  is actually a specific computer
at the internet domain diferentdomain.info.  The clue is working from
right to left from the slash, separating the website address from the
page selection.  All internet domains are denoted by the two words,
separated by a period immediately to the left of the / character.

5.       Wherever possible make sure that a site that  you to login is
using https:// as the beginning of the address in the address bar.  The
"s" denotes secure and the channel between you and the website has been
encrypted.  If it isn't encrypted anyone else on that WiFi hotspot is
able to listen to the traffic and could easily acquire your username and
password code.

a.       Also be wary of sites that have problems with a website
security certificate.  For example, our sites for external access to
email and the vpn do have a problem with our security certificate,
because we use a self-signed one for private use.  It's ok to do that,
in this instance, because it is for private use, not public use.  Public
use should be using certificates signed by a certificate authority, and
wouldn't create the same warnings.  

 

As we put more of ourselves online with social networks, Facebook and
LinkedIn being the two most prominent,  it is important to follow some
of these basic security practices.  The more information out there, the
more carefully crafted phishing attempts we will see.  #1 defense is to
use complex and different passwords at every site you have login
credentials.  #2 is to not respond to email purporting to come from a
trusted authority asking for personal identifying information.

 

 

From: Sam Cayze [mailto:[email protected]] 
Sent: Wednesday, June 08, 2011 11:43 AM
To: NT System Admin Issues
Subject: Template Phishing Alert Email?

 

Some kind soul posted a template we could send out to our users here,
regarding identifying Phishing and passwords.  Can't find it.

 

Can someone repost it please?

 

Thanks,
Sam

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

 

________________________________

CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
attached to or with this Notice is intended only for the person or
entity to which it is addressed and may contain Protected Health
Information (PHI), confidential and/or privileged material. Any review,
transmission, dissemination, or other use of, and taking any action in
reliance upon this information by persons or entities other than the
intended recipient without the express written consent of the sender are
prohibited. This information may be protected by the Health Insurance
Portability and Accountability Act of 1996 (HIPAA), and other Federal
and Florida laws. Improper or unauthorized use or disclosure of this
information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you
really need to.

This email and any attached files are confidential and intended solely
for the intended recipient(s). If you are not the named recipient you
should not read, distribute, copy or alter this email. Any views or
opinions expressed in this email are those of the author and do not
represent those of the company. Warning: Although precautions have been
taken to make sure no viruses are present in this email, the company
cannot accept responsibility for any loss or damage that arise from the
use of this email or attachments.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

 

________________________________

CONFIDENTIALITY STATEMENT: The information transmitted, or contained or
attached to or with this Notice is intended only for the person or
entity to which it is addressed and may contain Protected Health
Information (PHI), confidential and/or privileged material. Any review,
transmission, dissemination, or other use of, and taking any action in
reliance upon this information by persons or entities other than the
intended recipient without the express written consent of the sender are
prohibited. This information may be protected by the Health Insurance
Portability and Accountability Act of 1996 (HIPAA), and other Federal
and Florida laws. Improper or unauthorized use or disclosure of this
information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you
really need to.



This email and any attached files are confidential and intended solely
for the intended recipient(s). If you are not the named recipient you
should not read, distribute, copy or alter this email. Any views or
opinions expressed in this email are those of the author and do not
represent those of the company. Warning: Although precautions have been
taken to make sure no viruses are present in this email, the company
cannot accept responsibility for any loss or damage that arise from the
use of this email or attachments.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

<<image002.jpg>>

<<image003.jpg>>

Reply via email to