Bidvert-advert

Stay Update - ICT Security

Enter your email address:

We hate spam as much as you do and we will never sell, barter, or rent your email address to any unauthorized third party.

Most Frequently Used Software


CURL / XPertMailer / AutoBlogger / (Parser - PHP Simple HTML DOM)



domenica 22 gennaio 2012

Readiness team warns of spoofed US-CERT email addresses in phishing campaign

The U.S. Computer Emergency Readiness Team has issued a warning a few new phishing campaign that uses spoofed US-CERT email addresses.

Reports in regards to the phishing campaign were received by US-CERT on Tuesday. more than a few organizations had been targeted within the attack, including private sector businesses, government contractors and federal agencies.

The message includes a zipped attachment with a phony report.  The attachment is an executable file with the name “US-CERT Operation CENTER Reports,” consistent with the united states-CERT phishing campaign advisory. There isn't a information regarding the malware inside the attachment.

The primary email address being spoofed is SOC@US-CERT.GOV, but other invalid email addresses are getting used . US-CERT said it'd provide additional details as they become available.

The common advice from experts is to coach end users to prevent opening attachments in email messages from unknown sources, however the cybercriminals behind the phishing campaigns are getting more successful. Spear phishing is the typical explanation for many high-profile data breaches, including the RSA SecurID breach. Security awareness training is a superb step to minimize the chance to enterprises, consistent with David Sherry, chief information security officer of Brown University. So one can be triumphant, training ought to be sustained and may include everyone on the company, including executive management. 

Technology is on the market to defend against phishing. Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) authentication technology could be effective, however the authentication technologies should be more widely adopted to be truly effective, in line with application security expert Michael Cobb.


Dig Deeper
  • Those who read this also read...


Nessun commento:

Posta un commento

Comments links could be nofollow free