Executive Guardian
Your organization’s leadership is 12 times more likely to be the target of a security incident and nine times more likely to be the target of a data breach than they were last year. Find out how they can be protected.
Read the Datasheet
Gift Cardsharks: The Massive Threat Campaigns Circling Beneath the Surface
Learn about the attack group primarily targeting gift card retailers and the monetization techniques they use.
Get the Report
Threat Hunting Workshop Series
Join one of our security threat hunting workshops to get hands-on experience investigating and remediating threats.
Attend an Upcoming Workshop
Inside Magecart: New RiskIQ & Flashpoint Research Report
Learn about the groups and criminal underworld behind the front-page breaches.
Threat Hunting Guide: 3 Must-Haves for the Effective Modern Threat Hunter
The threat hunting landscape is constantly evolving. Learn the techniques, tactics, and tools needed to become a highly-effective threat hunter.
The OPM breach has drawn national attention and rightfully so. However, at first blush the attack seems typical of a particular threat actor that continues to successfully breach large organizations and steal PII.
In the wake of such attacks, orgs typically look to enhance perimeter based security. However, all their doing is building costly and increasingly ineffective virtual Maginot Lines. Just like the Maginot Line was back in WWII, this strategy is a decade behind and fatality flawed.
The data orgs are supposed to protect, plus their end users/customers, their adversaries, and employees continually drift further and further outside of their defensive perimeter leaving increasingly wider gaps in security.
The impact of the OPM breach extends beyond the act itself. Personal information becomes valuable data to be used down the road for further breach activities or intelligence gathering. The OPM has warned those affected to be on the lookout for email or phone phishing attempts.
iSight senior manager John Hultquist points out, “It looks like they are casting a very wide net, possibly for follow on operations or identifying persons of interest, but we’re in a new space here and we don’t entirely know what they’re trying to do with it.”
The punch line is that none of the stolen data connected to this threat actor has appeared on dark web forums. Meaning that the motivation behind these attacks isn’t to monetize this data. The truth is that no one other than the threat actors themselves — and potentially the nation state they allegedly work for — know exactly what they’re doing with the data.
If improving targeted phishing — so called “spear-phishing” attacks — is the goal of the threat actor, data from the Verizon Data Breach Investigations report offers a bleak outlook. Findings from the report show that it takes just 10 emails to yield a 90% chance of at least one person becoming a victim.
Phishing attempts and targeted attacks can also diversify to incorporate other types of campaigns, including malvertising. Malvertising is attractive to cyber criminals because of the advanced targeting capabilities that come standard with ad delivery. If you know who your targets are, it helps you tailor your attacks to ensnare them. Plus, you can scale attacks to spread malicious ads across dozens or even hundreds of websites your victim is likely to visit.
Regardless of what methods are being used, the ability of defensive security postures to defend against attacks that drift further outside the perimeter is deteriorating. The information used to verify identities online continually falls into the hands of the adversary. The impact will be more targeted attacks and continual success in breaching defenses and accessing critical information.
RiskIQFollow
RiskIQ is the leader in attack surface management. We help organizations discover, understand, and mitigate exposures across all digital channels.
RiskIQ's #COVID19 Daily Update for 4/1: ➡️Pentagon to send 2,000 ventilators to #FEMA and the #HHS ➡️US intelligence: China has under-reported cases and fatalities ➡️Carnival Cruise Line will raise ~ $6 billion in debt & equity Read the full update here: https://bit.ly/2Uv3CMV
RiskIQ's #COVID19 Daily #Cybercrime Update for 3/31: ➡️RiskIQ observed a large Iranian #malware campaign impersonating official #WHO representative ➡️#WHOIS reliability issues fueling COVID-19 cybercrime ➡️Updated #spam stats Read the full update here: https://bit.ly/2QwfRHS
"As we’re now all isolating ourselves and homebound, it means online purchases will spike and makes it a prime time for criminals." - @ydklijnsma. Read more about the 20% spike in #Magecart due to #COVID19 in @WIRED https://bit.ly/2UVaC5E
RiskIQ's #COVID19 Daily Update for 3/30: ➡️The U.S. confirms cases jumped by 108,302 (+307%) ➡️FBI warns hospitals of supply-chain scams ➡️FDA issues emergency authorization for the use of hydroxychloroquine and chloroquine Read the full update here: https://bit.ly/2Uv3CMV
According to @campuscodi, @sniko_ was able to use @PassiveTotal to link nine malicious QR code generator sites that have stolen $46,000 to three web servers, which hosted 450+ other websites—all with "shady-looking domains." Read more in @ZDNet https://zd.net/2QRPjkq