Phishing email scams
Week 12 Reading Summary, Question, and recent Cyber Security News…
- Summarize one key point from each assigned reading…
Aircrack-ng.org published an online tutorial regarding the setup of Aircrack-ng (mostly Linux-based wireless networking suite of digital tools [packet sniffer & injector, WEP & WPA/WPA2-PSK cracker & analysis apps] for ethical hacking purposes on one’s owned networks [not other’s networks.])
- Question to classmates (facilitates discussion) from assigned reading…
Question: During the Aircrack-ng setup, did you confirm that your computer’s networking card can inject packets via the Injector Test?
Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…
In the Cyber Security News lately…
Temple University’s on-going digital battle with Phishing email scams with linked Malware & vigilant solutions (example info from recent email attacks on 3/21/2016 at Temple University)…
—————————————————————————————————————
From: NoReply Delivery Notification [mailto:notification-delivery@xxxxxmail.com]
Sent: Monday, March 21, 2016 8:32 PM
To: XXXXX XXXXX <xxxxx@temple.edu>
Subject: Delivery Tracking Information and ETA – see attached invoice (order # 1562648774)
Attached: USPS_DELIVERY_TRACKING_AND_ETA.doc
USPS.com Order #: 1562648774
Hello,
Thank you for your order.
See the attached invoice for package tracking information and estimated time of arrival.
Order #: 1562648774, Placed on: March 18, 2015 9:30:00 AM, Status: Order Placed, Ship to: See attached invoice
—————————————————————————————————————————————————————-
*NOTE: Computer users just had to open the file attachment within this email example, and next a Trojan.Dropper began an install process on client’s Windows PC!
**NOTE: Some of the vigilant solutions examples at Temple University, Computer Services (TUCS) included the following:
- notification-delivery@xxxxxmail.com was blocked in Temple-Firewall, etc.
- Symantec Endpoint Protection (SEP12.1.6.x Enterprise) with latest SEP definitions did detect & quarantine Trojan.Dropper malware (USPS_DELIVERY_TRACKING_AND_ETA.doc)
- TUCS-Client Services then further checked & removed any further Trojan.Dropper malware via SEP12.1.6.x, Malwarebytes in Windows-SafeMode, etc. on reported infected Windows client PCs.
- TUCS continued to educate it’s networked computer users via official Temple University email regarding latest & future Phishing email scams, etc.