Looking for new hacking techniques
Observing the trends of hacking techniques, spam email campaign remains to be the most dominant of them. Certainly, cyber criminals have other tricks up their sleeves: exploit kits, RDP attacks, system vulnerabilities, malvertising, etc.
However, most threatening crypto-malware such as Cerber or Locky are able to wreak havoc depending on a minor detail – whether the targeted victim opens an infected email attachment. It turns out that by paying a closer look at the new incoming email, you can escape a great cyber issue.
The world of ransomware keeps expanding at alarming rate
According to the Cisco 2017 Annual Cybersecurity Report, the number of ransomware rockets by 350% each year.  However, it is not surprising since cyber criminals employ every possible tool and target even smallest system vulnerability to occupy systems.
In such manner, we have seen how WannaCry and Petya reverberated throughout the world. Ironically, in the former case, the authors succeeded in their plan because of the hacking tool devised by the very National Security Agency. Speaking of Petya/NotPetya, it captured the world in its grip after delivering the corrupted update via the M.E.Doc company network.
Despite these cases, spam and phishing emails reign as the top infection vector. KnowBe4, the provider of popular security and malware awareness campaigns, has discovered that 82% of 10 000 email servers contain evident vulnerabilities which enable hackers to foist corrupted spam emails into traffic.
Menacing subject lines
Furthermore, malware specialists have identified the most popular subject lines and topics which persuade users into opening the corrupted attachment. Here are the ten most prevalent of them. The percent rate indicates their popularity:
- Security Alert – 21%
- Revised Vacation & Sick Time Policy – 14%
- UPS Label Delivery 1ZBE312TNY00015011 – 10%
- BREAKING: United Airlines Passenger Dies from Brain Hemorrhage – VIDEO – 10%
- A Delivery Attempt was made – 10%
- All Employees: Update your Healthcare Info – 9%
- Change of Password Required Immediately – 8%
- Password Check Required Immediately – 7%
- Unusual sign-in activity – 6%
- Urgent Action Required – 6%
Other threats such as Cerber often tend to use names instead of subject lines. Our another article explicitly elaborates on ways to recognize a phishing email with a corrupted email attachment.
As you can see from the above lines, cyber villains exert psychological pressure not to leave enough time for victims to make the right decision. However, if you get a similar email message, behave in the opposite way. Carefully inspect the email and verify the sender.
Besides fortifying your cyber security with anti-virus tools, share these tips with your colleagues. Knowledge might be the key to the safety of your entire company.