• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

David Lanter

In The News

November 11, 2021 by David Lanter 4 Comments

Filed Under: Unit 13: Computer Application Security Tagged With:

QR codes offer scammers another avenue to circumvent traditional email security

November 7, 2021 by David Lanter

A recently discovered phishing campaign leveraged QR codes as a means to bypass malicious link detection mechanisms — and while this particular scam featured some fundamental flaws, the public’s increased use of “quick response” barcodes since the start of the pandemic may be behind their recent abuse in scams.

This use of QR codes in phishing activity is not an entirely novel concept, although Abnormal Security, whose researcher uncovered the campaign, did say that this campaign represented a bit of an evolution of the technique.

“We’ve seen actors use fake QR codes in the past — QR code images that are actual hyperlinks to a phishing site — and we’ve seen actors use QR codes out in the real world to try and get people to go to a malicious website, but this is the first time we’ve seen an actor embed a functional QR code into an email,” said Crane Hassold, director of threat intelligence at Abnormal Security.

The malicious phishing operation, which ran from Sept. 15 through Oct. 13, was disclosed not long after the Better Business Bureau posted its own QR scam alert last July. According to the organization’s warning, some weaponized QR codes are designed to redirect victims to an information or credentials phishing website, while others may trick users into launching a payment app or follow a malicious social media account.

“These scams differ greatly, but they all have one thing in common. Scammers hope you will scan the code right away, without taking a closer look,” the alert stated.

Phishing scammers are constantly looking for avenue to elude red flags or trigger that scan for malicious URLs and attachments, including those employed by secure email gateways and other traditional email security solutions. QR codes are one such option — one that the BBB said it’s been encountering more of lately. And there are two reasons for that.

“First of all, they [QR codes] came back into widespread use due to the pandemic; having touchless options for menus, coupons, and other information helped reduce physical contact and the spread of the virus,” said Katherine Hutt, chief communications officer with the International Association of Better Business Bureaus, Inc. “In addition, virtually all cellphone cameras can now read QR codes without downloading a separate app. Scammers are opportunists; if we’re using QR codes, then of course they are using QR codes.”

And there’s a psychological component to this attack strategy, as well: “We just aren’t as careful about reviewing URLs on our phones as we are on our computers,” Hutt continued.

The QR-based phishing — or “quishing” — scheme detected by Abnormal Security attempted to collect Microsoft credentials, according to a company blog post written by threat intelligence analyst Rachelle Chouinard. The QR codes, in this case, purportedly gave the email recipient access to a missed voicemail.

“All the QR code images were created the same day they were sent, making it unlikely that they have been previously reported and would be recognized by a security blocklist,” stated the report. “In total, six unique profiles were used to send messages for the campaign, with most designed to appear related to the same industry as the target.” The attackers send the emails from compromised Outlook accounts, and hosted the phishing pages by leveraging an enterprise survey service, plus Amazon and Google services.

“The use of the QR code presents a unique challenge to those security platforms that look for known bad, as these emails come from legitimate accounts and contain no links, only seemingly benign images appearing to contain no malicious URLs,” Chouinard writes in the blog post. “It’s only by understanding that the account is compromised — combined with an understanding of the intent of the email — that this new and fairly innovative attack type can be detected.”

Fortunately, the campaign had a significant logic defect that likely reduced its efficacy: If you open up an email with your phone, what are you using to scan the imagine? “The practical aspects of getting a target to scan a QR code with a separate device seem to create a barrier that would result in a relatively low success rate,” said Hassold.

There are also tactics and technologies companies can employ to identify such scams when they surface.

“By looking at the emails in a more holistic and behavioral manner, these malicious messages can be identified, which is how Abnormal was able to detect them before they reached our customers’ inboxes,” said Hassold. Indeed, Abnormal reported blocking nearly 200 emails featuring the malicious QR codes by sniffing out the use of compromised accounts and detecting potentially suspicious activity through the analysis of unique sender data and email content.

“We believe that because phishing is a human and machine problem, the only way to solve it is with a human and machine solution that leverages the power of AI on the machine side, combined with the power of highly targeted training for employees on the human side, added Eyal Benishti, CEO at Ironscales.

Benishti believes “computer vision” technology in particular would be useful for stopping these attacks. “QRs can be easily translated into a link and scanned by email security solutions with computer vision capabilities,” he explained, “so we feel it’s likely a seasonal attack that will diminish as solutions with computer vision are able to detect and thwart the potential attacks.”

“Education is the best preventative measure,” added Hutt, noting that the BBB recently launched a website to help people recognize common scams that they might encounter.

“Remember, the topics change with whatever is current or in the news, but the tactics themselves are remarkably similar year after year,” Hutt continued. “Generally, scammers are pretending to be someone they are not in order to get money or personally identifiable information from you. If they steal your PII, they can sell it many times over, or they can pretend to be you in order to scam someone else.”

 

https://www.scmagazine.com/analysis/cybercrime/qr-codes-offer-scammers-another-avenue-to-circumvent-traditional-email-security

 

 

Tagged With:

All Questions

November 4, 2021 by David Lanter

  1. What is the difference between identity management and access management?
  2. Why is it important to a business to care about the difference between identity management and access management?
  3. What is the one interesting point you learned from the readings this week?  Why is it interesting?

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Question 1

November 4, 2021 by David Lanter 8 Comments

What is the difference between identity management and access management?

 

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Question 2

November 4, 2021 by David Lanter 7 Comments

Why is it important to a business to care about the difference between identity management and access management?

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Question 3

November 4, 2021 by David Lanter 7 Comments

What is the one interesting point you learned from the readings this week?  Why is it interesting?

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

In The News

November 4, 2021 by David Lanter 3 Comments

Filed Under: Unit 12: Identity Management and Access Control Tagged With:

Wrap Up

November 4, 2021 by David Lanter

Presentation slides

Quiz and solutions

Filed Under: Unit 11: Cryptography, Public Key Encryption and Digital Signature Tagged With:

Wrap Up

November 3, 2021 by David Lanter

Presentation slides

Quiz and solutions

Filed Under: Unit 10: Network Security Tagged With:

All Questions

October 28, 2021 by David Lanter

  1. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year.  Today a symmetric session key needs to be 100 bits long to be considered strong.  How long will a symmetric session key have to be in 30 years to be considered strong? (Hint: Consider how much longer decryption takes if the key length is increased by a single bit.) Explain.
  2. Longer keys are more difficult to crack. Most symmetric keys today are 100 to 300 bits long. Why don’t systems use far longer symmetric keys—say, 1,000 bit keys?
  3. How are digital certificates and drivers’ licenses similar, and how are they different?

Filed Under: Unit 11: Cryptography, Public Key Encryption and Digital Signature Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 8
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in