The whole of the UK is working from home and so cyber hackers are exploiting vulnerabilities and stealing valuable information during this time of uncertainty and panic.
We asked Elliott some burning questions…
A great deal of cybercrime is psychological – it’s about understanding people’s likely behaviours and fears at a time like this. People may be naively opening unrecognised attachments relating to current news, or not thinking as clearly when it comes to clicking on malicious links. A lot of individuals are eager to tap into some good news, which means criminals are capitalising on this messaging and creating a high risk for many. This includes emails pretending to be the World Health Organisation (WHO) who suggest they link to a new positive insight article. See some examples of the emails being sent by attackers on the BBC News site here.
We also have a few phishing blogs you can check out here to keep your organisation safe:
Cybercriminals follow the money. If there’s a dramatic increase in the use of videoconferencing and other collaboration tools due to the rise of people working from home, then we’d expect to see criminals trying to target them. In the short to medium term, we’d expect to see existing phishing campaigns asking people to download and execute malicious payloads designed to look like working from home software. Similarly, companies quickly adopting consumer-grade video conferencing can make it easy for an attacker to pretend to be a member of staff. The cybersecurity industry is going to have to be dynamic and responsive on this front – as we always try to be. This is a unique situation that we’ve haven’t experienced before and so people are unsure of the guidelines and what they should and shouldn’t do. Perfect for a cybercriminal to exploit.
The onus is primarily on employers as they hold the most power to make sure security standards don’t fall with a large number of staff working remotely. Specifically, in this situation, the focus should be on aggressive email filtering and ensuring that all entry points into the business require strong credentials and two-factor authentication. This is especially true where individuals previously could only access company resources from the office, passwords may not be sufficient to protect accounts now that they’re exposed over the internet.
Cybersecurity is complicated, but many attacks are very simple. With the current ongoing health issue, the following steps would help organisations protect themselves from opportunistic attackers:
Elliott Thompson, one of SureCloud’s Senior Security Consultants, delivers on a variety of large and unusual pen-testing engagements. Elliott engages targets throughout Europe, Asia, and the Middle East through infrastructure testing and reverse engineering to physical, social engineering and red teaming. Elliott has also appeared on the BBC as a cybersecurity expert, is a CVE identifier, CHECK Team Leader and CREST Registered Tester.
Elliott is passionate about security and involved in various article pieces for Infosec Magazine, the BBC and the UK consumer watchdog Which?. Furthermore, last year Elliott discovered and disclosed an exploit on Android tablets, which allowed attackers full access to the device including access to the webcam, speakers and microphone.
SureCloud is a provider of Gartner recognised GRC software and CREST accredited Cyber Security & Risk Advisory services. Whether buying products or services your organisation would benefit from automated workflows and insight from the award-winning SureCloud platform. All of SureCloud’s service offerings are fully compatible with the GRC suite of products enabling seamless integration of information, taking your risk programmes to the next level.