- 세일즈포스 "제조업종도 AI 시대로 진입··· 80%가 실험 중"
- "기밀 VM의 빈틈을 메운다" 마이크로소프트의 오픈소스 파라바이저 '오픈HCL'란?
- The best early Black Friday AirPods deals: Shop early deals
- The 19 best Black Friday headphone deals 2024: Early sales live now
- I tested the iPad Mini 7 for a week, and its the ultraportable tablet to beat at $100 off
UK and US Warn of Growing Iranian Spear Phishing Threat
The UK’s National Cyber Security Centre (NCSC) teamed up with government agencies across the Atlantic to issue a new alert about Iranian cyber-threats on Friday.
Released in concert with the FBI, US Cyber Command – Cyber National Mission Force (CNMF) and the Department of the Treasury (Treasury), the security advisory claimed that Iran’s Islamic Revolutionary Guard Corps (IRGC) is behind the spear phishing campaign.
The campaign is targeted at individuals “with a nexus to Iranian and Middle Eastern affairs,” although it’s also focused at US political campaigns, with an end goal of furthering its information operations, the advisory noted.
Current or former senior government officials, senior think tank personnel, journalists, activists and lobbyists are apparently all potential targets.
Read more on Iranian campaigns: Iranian Hackers Secretly Aid Ransomware Attacks on US
Phishing Attacks Target Journalists and Diplomats
The threat actors tailor their tactics to the specific target, potentially impersonating family members, professional contacts, well-known journalists and/or email service providers. The lure may be a request for interview, an invitation to a conference or embassy event, a request for speaking engagement, or some other political or foreign policy discussion.
The threat actors use both messaging and email channels to target their victims, the report said.
“The actors often attempt to build rapport before soliciting victims to access a document via a hyperlink, which redirects victims to a false email account login page for the purpose of capturing credentials,” it continued.
“Victims may be prompted to input two-factor authentication codes, provide them via a messaging application, or interact with phone notifications to permit access to the cyber actors. Victims sometimes gain access to the document but may receive a login error.”
How to Spot and Avoid Phishing Attempts
The advisory urged readers to be suspicious of unsolicited contact, attempts to send links or files via social media and other online services, email messages flagging alerts for online accounts, emails purporting to be from legitimate services and shortened links.
It also advised enterprises to:
- Implement a user training program for phishing awareness
- Recommend users only use work emails for official business, always keep software updated, switch on multi-factor authentication, and never click on links or open attachments in unsolicited emails
- Recommend users consider advanced protection services and hardware security keys
- Switch on anti-phishing and spoofing security features
- Block automatic email forwarding to external addresses
- Monitor email servers for changes to configuration and custom rules
- Enable alerts for suspicious activity
- Configure DMARC and other protocols correctly
- Use SSO with passkeys or other FIDO authenticators
- Use TLS for more secure email