{"id":9061,"date":"2017-09-01T10:10:25","date_gmt":"2017-09-01T18:10:25","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/01\/news-2834\/"},"modified":"2017-09-01T10:10:25","modified_gmt":"2017-09-01T18:10:25","slug":"news-2834","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/09\/01\/news-2834\/","title":{"rendered":"Insider threats in your work inbox"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 01 Sep 2017 16:52:23 +0000<\/strong><\/p>\n<p>Recently,\u00a0our friends at Barracuda\u00a0found\u00a0a new phishing campaign\u00a0that banks on the popularity of cloud\u00a0services\u00a0used in most businesses,\u00a0such as Microsoft Office 365.<\/p>\n<p>According to\u00a0<a href=\"https:\/\/blog.barracuda.com\/2017\/08\/30\/threat-spotlight-office-365-account-compromise-the-new-insider-threat\/\" target=\"_blank\" rel=\"noopener\">their blog post<\/a>,\u00a0this latest scheme\u00a0takes advantage of the natural trust\u00a0employees\u00a0place on messages they receive from colleagues using the\u00a0correct\u00a0email address.\u00a0Dear reader, this campaign\u00a0is beyond impostor email or\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2015\/08\/business-email-scams-a-growing-threat\/\" target=\"_blank\" rel=\"noopener\">business email compromise (BEC)<\/a>. Barracuda is calling it\u00a0the &#8216;new insider threat.&#8217;<\/p>\n<p>BEC phishing campaigns usually originate outside the target organization. The threat actor creates an email address that may appear like the real thing, just like what we&#8217;ve seen\u00a0<a href=\"http:\/\/blog.kleczynski.com\/2015\/07\/poor-communication-can-cost-you-52140-60\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, and then uses it to convince someone in the organization\u00a0to wire money their way. If a threat actor successfully infiltrates\u00a0an organization&#8217;s\u00a0email platform on the cloud, then the threat becomes something else. The threat actor has become an identity thief and an insider who is now the biggest threat to any organization. At that point, the possibilities of abuse are endless.<\/p>\n<p>Businesses can combat this new attack by continuous education and awareness efforts. It also pays to add multifactor authentication for additional ways employees can verify their identities before being allowed to access their work emails.<\/p>\n<p>&nbsp;<\/p>\n<p><em>The Malwarebytes Labs Team<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/09\/insider-threats-in-your-work-inbox\/\">Insider threats in your work inbox<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/09\/insider-threats-in-your-work-inbox\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 01 Sep 2017 16:52:23 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/09\/insider-threats-in-your-work-inbox\/' title='Insider threats in your work inbox'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/shutterstock_49511821.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/business-security-world\/\" rel=\"category tag\">Business<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bec\/\" rel=\"tag\">bec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/business-email-compromise\/\" rel=\"tag\">Business Email Compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cloud\/\" rel=\"tag\">cloud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/insider-threats\/\" rel=\"tag\">insider threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-actor\/\" rel=\"tag\">threat actor<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/09\/insider-threats-in-your-work-inbox\/' title='Insider threats in your work inbox'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/09\/insider-threats-in-your-work-inbox\/\">Insider threats in your work inbox<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14347,1001,11140,11728,14348,3924,10497,12309],"class_list":["post-9061","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bec","tag-business","tag-business-email-compromise","tag-cloud","tag-insider-threats","tag-phishing","tag-security-world","tag-threat-actor"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9061"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9061\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}