SlideShare une entreprise Scribd logo
1  sur  2
3 main cyber-threats to be on the lookout for during the holidays
While summer might be almost over, letting one’s guard down is still a risk – one we’re not willing to take. For
this reason only, we’ve listed here the three main cyber-threats to be on lookout when you’re not being too
carried away with the scenery.
1. The dangers of public Wi-Fi
Be it at the airport, in coffee shops or back at your hotel room, public Wi-Fi is a particularly tricky thing nowadays.
For one thing, it’s free, which makes it the easiest and the most attractive option for tourists. But just because
something’s convenient, doesn’t necessarily mean it’s also safe. Where there’s complimentary Wi-Fi, there’s
probably a dozen hackers lurking around, looking for ways to compromise your computer.
One such example is the DarkHotel hacker group, active for more than 10 years according to ZDNet. The latter
is apparently dropping a very ingenious malware on luxury hotels and carefully handpicking its targets, which
include political representatives and company executives.
Dubbed Inexsmar, the cyber-attack is conducted in several stages: first the hotel’s Wi-Fi network is compromised
(either by exploiting vulnerabilities in server software, or by getting physical access to the infrastructure), then
users of interest are targeted using highly convincing phishing emails.
A Word file that actually contains a Trojan payload is attached to the message, making it so that, once opened,
the user is completely distracted from the malicious software that is currently downloading itself on the
computer. One must note that this Trojan is more evolved than others since it does not send its payload all at
once, managing to cover its tracks and remain undetected.
Stay on the lookout for Inexsmar by being extra-careful with your emails while away from work. Social
engineering is never on leave of absence.
2. The two-faced taxi app
Uber has become increasingly popular and hackers are not shying away from the opportunity transportation
apps present themselves with. While the Uber or other taxi apps haven’t been hacked per se, another Trojan
malware is wreaking havoc on Android mobile by impersonating the interfaces of our favorite riding apps.
Dubbed Faketoken, its end goal is to get its hands on your bank credentials. That being said, the first sign of
infection is related to this very piece of information: if your app asks you to re-enter you card details, don’t! If
you’ve been using the app for a while, it should already have this information. There are cases when a credit
card expires and information must be re-intered, however we advise you to proceed with caution.
While this is not the first time we’ve heard of the malware in question, Faketoken has definitely gotten more
sophisticated as time has passed. According to security experts, the Trojan generally infects smartphones through
bulk SMS messages with a prompt to download images. Sounds familiar? You’ve certainly received one of these
weird text on your mobile before. Now, if you ignore it, nothing happens. Click on the link on all the Trojan will
begin spying all that goes on on your phone.
Once it detects an app whose interface it can mimic, Faketoken immediately overlays said application with its
3. A PowerPoint laced with malware
You know by now to never enable Macro in suspicious Word or Excel files, but what about other files? This is
not a topic we’ve dwelled on before, but malware can also spread using PowerPoint presentations.
If you’re like most folk, you probably enjoy getting a personalized holiday e-card, you know, those old-school
PowerPoint shows that are sort of a guilty pleasure. Or maybe you’re just checking your work emails from time
to time to keep in touch with important affairs. Either way, scammers have unfortunately seized this as an
opportunity, sending out fake presentations filled with malware instead of holiday wishes or business briefings.
This time however, hackers have gone one step further with the help of one PowerPoint trick that doesn’t even
require the user to click on file in order for the infection to commence. Exploiting the CVE-2017-0199
vulnerability, the perpetrators rely on a completely new method that abuses PowerPoint Slide Show.
To be clear, the malware is actually a banking Trojan designed to get remote access. It spreads via phishing
campaigns containing a PowerPoint Show (.pps). It must be noted that these files differ from usual PowerPoint
files (.ppt and .pptx) in a sense that they cannot be edited and require to be opened solely in presentation
mode.
Malicious links are carefully embedded in the PowerPoint slides and trigger the Trojan installation as soon as
they sense any hovering or a mouse-over action. We’ll resist the urge to say ‘neat’ and prompt you instead to
apply the same caution you’d apply to an Excel file received from a suspicious user.
Link:
https://www.reveelium.com/en/3-main-cyber-threats-to-be-on-the-lookout-for-during-the-holidays/

Contenu connexe

Plus de ITrust - Cybersecurity as a Service

Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?ITrust - Cybersecurity as a Service
 

Plus de ITrust - Cybersecurity as a Service (20)

Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 
Reveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FRReveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FR
 
Reveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet ENReveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet EN
 
Reveelium Data Science as a Service - Datasheet FR
Reveelium Data Science as a Service - Datasheet FRReveelium Data Science as a Service - Datasheet FR
Reveelium Data Science as a Service - Datasheet FR
 
Reveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet ENReveelium Data Science as a Service - Datasheet EN
Reveelium Data Science as a Service - Datasheet EN
 
ITrust Cybersecurity as a Service FR
ITrust Cybersecurity as a Service FRITrust Cybersecurity as a Service FR
ITrust Cybersecurity as a Service FR
 
Cybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. IICybersecurity awesome mix vol. II
Cybersecurity awesome mix vol. II
 
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?L’affaire Clinton : un château de cartes prêt à s’écrouler ?
L’affaire Clinton : un château de cartes prêt à s’écrouler ?
 
Le côté obscur de la cybersécurité
Le côté obscur de la cybersécuritéLe côté obscur de la cybersécurité
Le côté obscur de la cybersécurité
 

Dernier

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 

Dernier (20)

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 

3 main cyberthreats to be on the lookout for during the holidays

  • 1. 3 main cyber-threats to be on the lookout for during the holidays While summer might be almost over, letting one’s guard down is still a risk – one we’re not willing to take. For this reason only, we’ve listed here the three main cyber-threats to be on lookout when you’re not being too carried away with the scenery. 1. The dangers of public Wi-Fi Be it at the airport, in coffee shops or back at your hotel room, public Wi-Fi is a particularly tricky thing nowadays. For one thing, it’s free, which makes it the easiest and the most attractive option for tourists. But just because something’s convenient, doesn’t necessarily mean it’s also safe. Where there’s complimentary Wi-Fi, there’s probably a dozen hackers lurking around, looking for ways to compromise your computer. One such example is the DarkHotel hacker group, active for more than 10 years according to ZDNet. The latter is apparently dropping a very ingenious malware on luxury hotels and carefully handpicking its targets, which include political representatives and company executives. Dubbed Inexsmar, the cyber-attack is conducted in several stages: first the hotel’s Wi-Fi network is compromised (either by exploiting vulnerabilities in server software, or by getting physical access to the infrastructure), then users of interest are targeted using highly convincing phishing emails. A Word file that actually contains a Trojan payload is attached to the message, making it so that, once opened, the user is completely distracted from the malicious software that is currently downloading itself on the computer. One must note that this Trojan is more evolved than others since it does not send its payload all at once, managing to cover its tracks and remain undetected. Stay on the lookout for Inexsmar by being extra-careful with your emails while away from work. Social engineering is never on leave of absence. 2. The two-faced taxi app Uber has become increasingly popular and hackers are not shying away from the opportunity transportation apps present themselves with. While the Uber or other taxi apps haven’t been hacked per se, another Trojan malware is wreaking havoc on Android mobile by impersonating the interfaces of our favorite riding apps. Dubbed Faketoken, its end goal is to get its hands on your bank credentials. That being said, the first sign of infection is related to this very piece of information: if your app asks you to re-enter you card details, don’t! If you’ve been using the app for a while, it should already have this information. There are cases when a credit card expires and information must be re-intered, however we advise you to proceed with caution. While this is not the first time we’ve heard of the malware in question, Faketoken has definitely gotten more sophisticated as time has passed. According to security experts, the Trojan generally infects smartphones through bulk SMS messages with a prompt to download images. Sounds familiar? You’ve certainly received one of these weird text on your mobile before. Now, if you ignore it, nothing happens. Click on the link on all the Trojan will begin spying all that goes on on your phone. Once it detects an app whose interface it can mimic, Faketoken immediately overlays said application with its
  • 2. 3. A PowerPoint laced with malware You know by now to never enable Macro in suspicious Word or Excel files, but what about other files? This is not a topic we’ve dwelled on before, but malware can also spread using PowerPoint presentations. If you’re like most folk, you probably enjoy getting a personalized holiday e-card, you know, those old-school PowerPoint shows that are sort of a guilty pleasure. Or maybe you’re just checking your work emails from time to time to keep in touch with important affairs. Either way, scammers have unfortunately seized this as an opportunity, sending out fake presentations filled with malware instead of holiday wishes or business briefings. This time however, hackers have gone one step further with the help of one PowerPoint trick that doesn’t even require the user to click on file in order for the infection to commence. Exploiting the CVE-2017-0199 vulnerability, the perpetrators rely on a completely new method that abuses PowerPoint Slide Show. To be clear, the malware is actually a banking Trojan designed to get remote access. It spreads via phishing campaigns containing a PowerPoint Show (.pps). It must be noted that these files differ from usual PowerPoint files (.ppt and .pptx) in a sense that they cannot be edited and require to be opened solely in presentation mode. Malicious links are carefully embedded in the PowerPoint slides and trigger the Trojan installation as soon as they sense any hovering or a mouse-over action. We’ll resist the urge to say ‘neat’ and prompt you instead to apply the same caution you’d apply to an Excel file received from a suspicious user. Link: https://www.reveelium.com/en/3-main-cyber-threats-to-be-on-the-lookout-for-during-the-holidays/