‘Tis the Season to be…WARY

SecureNU-logo-vsm-xmas

The holiday season is upon us, and you are probably shopping the never-ending sales that have been available since Halloween, especially online. More and more holiday money is being spent online, and this presents hackers and cyber-thieves a unique opportunity to rake in the cash – almost $800 million last year, according to the FBI.

To help protect your money and information, the FBI and other cyber-security watchdogs are highlighting the risks to those who will shop online, and we are taking this opportunity to share our Twelve Tips of Holiday Season Safety.

12. Hark the Herald Angels Sing: “Advertising wondrous things!”
While bargain hunting is great, there are many bogus websites created at this time of year in order to offer amazing bargains on brand-name things. If you see a discount from an unfamiliar online retailer that sounds too good to be true, it probably is. Don’t be tempted.

11. Randolph the Red-Nosed Reindeer
Another favorite trick of cyber-thieves is to use closely matching URLs to catch people who may mistype the address in their web browser. You were aiming for LLBean.com, but somehow you ended up at LBean.com, and instead of getting your flannel PJs, you now have malware on your computer. So type carefully, and pay attention to the addresses of the sites you’re visiting.

10. We Three Kings … All Use the Same Password
If you create an account at a merchant site, avoid using a username and password combination that you have used elsewhere, even if it is one deemed strong by a site you trust. While your banking site may be secure, small vendor sites are often not, and so are often targeted by criminals. If you have used the same username and password combination for your banking site, you just made someone’s Christmas.

9. It’s Beginning to Look a Lot Like….
“Your UPS delivery is on its way. Click here to see shipping details.” Actually, if you click here, you might see your computer infected with malware. Emails you receive detailing shipments you don’t recognize are often attempt to infect your computer with malicious code. Don’t trust shipping details links. The legitimate vendor will always email you a tracking number with your shipment notice – copy and paste the number into the shipping company’s webtracking page.

8. It’s the Gift that Keeps on Taking
Gift cards are a great stocking stuffer, because what’s better than being able to choose what you want to buy for the Holidays? But if you want to give that gift, make sure that you only purchase cards directly from the company or from a well-known retailer. Offers and deals online that claim to give you extra value above what is legitimately on the card are often scams, or possible stolen cards with no value.

7. All I Want … is for My Package to be Received
When you order from a legitimate retailer, try to ensure that your delivery will be at a date and time when someone will be home to receive it. You may also be able to submit a direct request to the shipping company to pick it up at one of their facilities (USPS, UPS, FedEx, and DHL all have the ability to do this online). Incidents of mail theft have quadrupled over the last two years, because knowing the number of deliveries at this time of year, thieves will tour neighborhoods looking for Amazon boxes and other packages left on your doorstep. While you do your shopping online, thieves are doing it at your front door.

6. On the Sixth Day … My True Love Gave to Me…An eCard with a Virus
“Oh look someone sent you an eCard, and it needs to install a new version of FlashViewer.” Most of the time when your computer is compromised, it is because of something that you clicked. Social engineering plays on human desires and social bonds to exploit trust, and ecards are a favorite scam. If you receive holiday ecards or messages from people you do not know, or receive any unexpectedly from people you do know, treat them with suspicion.

5. Dreidel, Dreidel, Dreidel…Public Wifi Just Won’t Play
While a lot of online shopping happens from home, more people than ever will use their mobile devices to price check or even purchase items while out and about. Make sure that your device is not using public wifi when you do anything involving passwords or payment cards unless you are using extra security, such as the Virtual Private Network client for both iOS and Android that is available to all Northeastern faculty and staff. Also don’t let your device automatically connect to unknown wifi, because rogue wifi with familiar names are an easy way for hackers to obtain your information. In the end, to be extra secure if you do want to make a purchase on your mobile device, double check that you are on a known and trusted network, or use your data access.

4. Oh There’s Nobody Home for the Holidays.
Posting on social media that you are at grandma’s house for the holidays, or skiing in Aspen, can be fun to share. However, it also lets people know that your home is empty, and someone might decide to do a little late season shopping while you are gone. Be careful about how many people are aware of your travel plans. Do you really know and trust all the friends or followers that you have on social media?

3. Making a List and Checking it Twice is Sound Advice
Know what you buy and where – make a list of your purchases and check it against your credit card statements when they come, or online when the transactions post. Take the time to ensure that your card isn’t being misused and that you have been charged what you expected to be charged by merchants. The sooner you can detect malicious activity, the easier it is to remedy. It’s also good to make sure you have contact information on file with your credit card companies, so they can contact you if they detect anomalous activity.

2. Blessings Might Come Back to Bite Good King Wenceslas
The holidays are a time for giving, and also, unfortunately, for taking. The number of charity scams increases exponentially during this time of year. If and when you decide to make a charitable donation, check that your donation will be going to the cause you wish it to, and that the highest ratio of your dollar goes to the charity instead of expenses. Use www.charitynavigator.org as a
reputable resource to ensure that your donation finds a good home. And never respond to unsolicited phone calls or door-to-door charity requests from unknown people.

1. It’s a Marshmallow World…Don’t Get Toasted
Many credit card companies offer the ability to create a one-time-use card number through their websites. Use these numbers to protect yourself should your retailer experience a data breach where customer names and card numbers are stolen. Most credit companies do not hold card holders accountable for theft, but doing this reduces the headache you can face in cleaning up the mess. Also, despite what many say about incurring debt at the holidays, avoid using your debit cards – they have less loss protection than credit cards.

Have a Safe and Happy Holiday!

Mark Nardone
CISO

Posted in Malware, Anti-Virus, Phishing, Scams, Safe Computing | Comments closed

Email Etiquette: Lessons from the Sony hack

sonyhack

This past month Sony Entertainment was hit with a massive hack from a group called the “Guardians of Peace” or #GOP. The #GOP recently released the first of a large number of internal documents and emails from Sony employees and executives.

Unfortunately for Sony, the leaked emails do not paint a flattering picture. The emails shine a light onto the sometimes-shady inner workings of a large entertainment company and removes the veneer of glitz and glamour that Hollywood public relations departments work so hard to maintain. The leaked emails show that Sony executives wrote emails to one another disparaging famous actors and writers, emails that contained racist comments about President Obama, and emails that referenced plans to pay off state attorney generals to encourage them to bring lawsuits against Google.

Embarrassing emails from highly paid executives may cause damage to the Sony brand and is fodder for Internet gossip. Unfortunately for the regular Sony employee, the email leaks reveal sensitive and personal information that can cause a great amount of individual suffering and embarrassment.

From gizmodo.com:

“The most painful stuff in the Sony cache is a doctor shopping for Ritalin. It’s an email about trying to get pregnant. It’s s***-talking coworkers behind their backs, and people’s credit card log-ins. It’s literally thousands of Social Security numbers laid bare. It’s even the harmless, mundane, trivial stuff that makes up any day’s email load that suddenly feels ugly and raw out in the open, a digital Babadook brought to life by a scorched earth cyberattack.”

These employees are at great risk for identity theft, medical and financial fraud, damage to their reputation, and the possible loss of future employment opportunities.

Lesson 1: Emails are never private

Once you send an email you no longer have control over its contents. There is nothing stopping the recipient from forwarding your email to others. ISPs and companies like Google, Microsoft, and Yahoo routinely scan and read customers’ emails for marketing and advertising purposes. Criminals using malware and phishing schemes could intercept your email and use it to commit fraud or other crimes. There are many ways your email could become exposed.

Always assume that what you write in email may become public.

Lesson 2: Don’t badmouth your coworkers

See Lesson 1. There is no guarantee that the contents of your email will stay private. Maintaining healthy business relationships is a key component for success in any profession. If word gets out that you talk about people behind their backs it will hinder your ability to collaborate successfully with your coworkers and future business interactions may be in jeopardy.

Even if the emails are not malicious in nature they could be taken out of context leading to misunderstandings. You cannot control how others will react to your leaked emails. “Information doesn’t have to be incriminating to be embarrassing; it doesn’t need intent to be cruel.”

Lesson 3: Keep work and personal emails separate

See Lesson 1 and 2. Many Sony employees used their corporate email for personal interactions. It is likely they did not think that the contents of their email would end up on the Internet. In many industries, such as finance, companies routinely search through employees’ email for signs of fraud and other criminal or insider activity, but they can read or use anything sent over company email servers. Organizations may have to turn over email as part of a civil or criminal subpoena or in response to open access laws. In these instances even if you have nothing criminal to hide, your personal communication could be read by others and possibly read aloud into the public court records.

Always use a non-work-related account for personal emails.

Lesson 4: Speak in person or use the phone

If this leak produces a teachable moment it is to take a moment to decide whether it’s better to talk in person or over the phone rather than to use email. Email does not communicate nuance, tone, or body language like a face to face conversation. This is especially true if the topic is sensitive or is related to personal matters such as health or personal finance. An in-person conversation offers a better opportunity for clear and meaningful communications and, unless you have eavesdroppers nearby, you can better control who hears your message.

Related Links:

Posted in Safe Computing | Comments closed

JPMorgan Chase and 9 Other Financial Institutions Hacked

JPMorgan Chase and nine other yet to be named financial institutions suffered a massive data breach targeting both individuals and businesses.   The attackers were able to steal client names, addresses, email, and phone numbers.  JPMorgan states that no financial and login information was compromised.

Clients are advised to watch out for phishing scams within the next couple of months.  It has been reported by the security company SANS that some customers are already receiving phishing SMS / text messages.

JPMorgan Chase suggest:

  • Users watch their accounts for suspicious activity
  • Change their account password
  • Do not reuse the same password for multiple accounts
  • Watch out for phishing emails

If you receive an email that asks for your login or other personal information call the company directly to verify the email.  Do not respond or click on any links in the email. Do not log into your bank account from a link in the email; type in the bank url directly into the web browser.

Do not respond or click on any links in unsolicited text messages from your financial institution.  Call the company directly to verify the contents of the text message.

Other Links:

NYTimes: Hackers’ Attack Cracked 10 Financial Firms in Major Assault.

Computerworld: JPMorgan Chase attackers hit other banks

 

Posted in Safe Computing | Comments closed

NU users upgrade to OS X Mavericks for Free

Apple has not provided the Shellshock patch for versions of OS X older than Lion.  If you have an older version of OS X and would like to upgrade to Mavericks the Service Desk will be able to assist you.   Depending on your current hardware you may be able to upgrade to Mavericks for free.   The Service Desk will assist in evaluating your hardware, backing up and restoring your data and installing the update.

Please contact the Service Desk for assistance.  617-373-4357 or help@neu.edu

If your hardware does not support OS X Lion and above, Apple states that your risk from the Shellshock bug is low if you have not installed a web server on your computer. Should Apple release a Shellshock patch for older Macs, users are advised to update once it is made available.

Information about Shellshock: SecureNU Shellshock Bash bug Information

Posted in Apple | Comments closed

Apple Releases Shellshock Patch

Apple has released a patch to fix Shellshock Bash bug vulnerabilities.  Its is strongly recommended Mac users install the update when it becomes available through Software Update.

Northeastern managed Macs will be updated automatically with the patch.

For additional information: Shellshock Bash bug and the Apple update.

Note: This initial patch from Apple only fixes 2 of the 6 reported Shellshock vulnerabilities and only applies to Lion, Mountain Lion, and Mavericks.   Users are should apply additional updates should they be made available from Apple. 

Posted in Apple | Comments closed

ALERT: Mac, Linux, And Unix Users Impacted By Security Vulnerability “Shellshock”

For updated Shellshock Information: SecureNU – Shellshock Bash bug Information

This week security experts discovered an extensive security flaw in Bash, a component used in Linux and Unix operating systems, including Mac OS X. This vulnerability, nicknamed Shellshock, makes  devices running Bash susceptible to hackers and worms. Several technology manufacturers have already released preliminary patches to help stop this issue.

What is Shellshock?

Bash is a program that typically runs in the background so many users are likely not aware of its existence on their devices, although it is used in several different operating systems. The security vulnerability makes it possible to add malicious code to existing Bash code, allowing hackers to take over the operating system, where they can extract important information and compromise the device. Shellshock has the potential to be a greater security risk than the Heartbleed bug, as there are a wide variety of systems that utilize Bash, and this vulnerability is easy to exploit.

What can we do to protect ourselves?

Preliminary patches are now available for several of the impacted operating systems. ITS strongly recommends that you update any Mac OS X, Linux and Unix operating systems once security patches are available. Please be aware that external websites may be impacted by this vulnerability, and if compromised, there is the possibility of worms being transmitted to your computer. Please note that over time more and more information is being discovered regarding the extent and impact of this bug.

What is ITS doing to protect Northeastern?

To reduce our risk internally, ITS immediately began working on updating all of Northeastern’s technology with the available patches, and will continue to do so as new ones are released, limiting the exposure of campus systems. Additionally we have hardened our firewall against this vulnerability. System administrators across the university are working now to apply necessary patches to impacted sites and services. ITS will continue to monitor the situation, assess the associated risks and provide updates on this security issue as more news of Shellshock becomes available. We are continuing to work with our partner providers and vendors to address this serious security concern. As this is a constantly evaluating situation, information and updates will continue to be posted on the Office of Information Security website.

Other Security Concerns – Phishing

In the coming weeks, it is vitally important that you have a heightened awareness regarding your security. Hackers and Internet criminals never pass up a good crisis. Expect to see spam and phishing emails in the future citing security concerns due to Shellshock. If you have any doubts about the validity of emails, contact the company in question by phone. For Northeastern-specific emails contact the ITS Service Desk.

 

Posted in Safe Computing | Comments closed

4.5M Mail.ru and 1.2M Yandex Accounts Leaked; But Do Not Worry

On Tuesday an unknown individual posted a file containing 4.5 million Mail.ru and 1.2 million Yandex addresses and passwords to a Russian bulletin board. Both Mail.ru and Yandex deny the passwords came from their systems; it is believed the list has been compiled from hacked websites and phishing emails.

Regardless of where passwords came from both Mail.ru and Yandex state that only a small percentage of the accounts in the list might have worked. Independent reports state that the passwords are old and probably not even for valid Mail.ru or Yandex accounts.

What should you do?

If your Mail.ru or Yandex.ru password has not changed recently, now is a good time to change it.

As always, do not use the same email address and password for different website accounts. If one website is hacked, the attackers will be able to gain access to your other website accounts as well.

More information:

RT.com: http://rt.com/news/186580-millions-google-accounts-leaked/
Business Insider: http://www.businessinsider.com/russian-hackers-publish-passwords-to-nearly-5-million-email-accounts-2014-9

Posted in Safe Computing | Comments closed

5 Million Gmail Passwords Leaked; But Do Not Worry

logo4w

On Tuesday an unknown individual posted a file containing 5 million Gmail addresses and passwords to a Russian bulletin board. Google denies the passwords came from their systems; it is believed the list has been compiled from hacked websites and phishing emails.

Regardless of where passwords came from Google says that only about 2% of the accounts in the list might have worked. Independent reports state that the passwords are old and probably not even for Gmail accounts.

What should you do?

If your Gmail password has not changed recently, now is a good time to change it. For added protection enable 2-Step Verification on your account. 2-Step Verification requires you to enter a code the first time you access your account from a new computer or phone. This prevents a third party who may know your password from gaining access to your account.

Here is more information on how to enable 2-Step Verification on your Gmail account: https://www.google.com/landing/2step/

As always, do not use the same email address and password for different website accounts. If one website is hacked, the attackers will be able to gain access to your other website accounts as well.

More information:

Forbes: Google Says Not To Worry About 5 Million ‘Gmail Passwords’ Leaked

Posted in Safe Computing | Comments closed