{"id":3491,"date":"2019-05-04T12:22:25","date_gmt":"2019-05-04T00:22:25","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=3491"},"modified":"2019-05-04T12:22:25","modified_gmt":"2019-05-04T00:22:25","slug":"anyone-can-be-hacked-and-anyone-can-be-the-cause","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=3491","title":{"rendered":"Anyone can be hacked! And anyone can be the cause."},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><strong>Guess who got hacked?<\/strong><\/h2>\n<p>In recent articles, we\u2019ve warned that <a href=\"http:\/\/kinetics.co.nz\/beware-social-engineering-the-number-one-security-threat-to-business-is-your-people\/\">people are the weakest link in your IT security<\/a>. We\u2019ve also warned that <strong>any business is a target. No one is immune.<\/strong><\/p>\n<p>Tech companies like us are especially cautious because, in order to do our job, we have access not just to our data but also to our customers\u2019 data. That\u2019s why Kinetics has invested in an SOC2 compliant password vault (the highest levels of security), and we\u2019re tracking and auditing access to these. We will shortly be able to extend access to this same password vault to our KARE for Security client so you can have the same levels of security.<strong>\u00a0<\/strong><\/p>\n<h2><strong>Microsoft?!<\/strong><\/h2>\n<p><strong>Even a huge corporate with extensive controls can be compromised.<\/strong> Microsoft recently got caught, (April 2019) when a Microsoft \u2018support agent\u2019 had their credentials compromised. <a href=\"https:\/\/techcrunch.com\/2019\/04\/13\/microsoft-support-agent-email-hack\/\">Microsoft have advised<\/a> industry website ]<a href=\"https:\/\/techcrunch.com\/2019\/04\/13\/microsoft-support-agent-email-hack\/\">\u2018TechCrunch\u201d<\/a>\u00a0that these were used for three months to gain access to customer information!<\/p>\n<p>It seems that access was limited to the free email services they operate \u2013 MSN, Hotmail. Commercial tools like Office 365 were NOT compromised.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3548 \" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2019\/04\/philipp-katzenberger-1313574-unsplash.jpg\" alt=\"\" width=\"314\" height=\"209\" \/><\/p>\n<p>Microsoft reported:<\/p>\n<p style=\"padding-left: 30px;\"><em>\u201cMicrosoft recently became aware of an issue involving unauthorized access to some customers\u2019 web-based email accounts by cybercriminals.\u202fWe addressed this scheme by disabling the compromised credentials to the limited set of targeted accounts, while also blocking the perpetrators\u2019 access. A limited number of consumer accounts were impacted, and we have notified all impacted customers. Out of an abundance of caution, we also increased detection and monitoring to further protect affected accounts.\u201d<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>If you use these accounts, we recommend you change your password \u2013 NOW!<\/strong><\/p>\n<p>We know that Microsoft take these events seriously and they have extensive systems to protect data. This will be hugely embarrassing to them. We\u2019d just point out that it could have happened to anyone. Under new legislation like GDPR, they are now required to advise you if your data may have been impacted, so we\u2019re likely to see more transparency of these events.<\/p>\n<h2><strong>What should you do?<\/strong><\/h2>\n<p><strong>We\u2019ve packaged up what we think are the new \u2018reasonable\u2019 steps and called it \u201c<a href=\"http:\/\/kinetics.co.nz\/kare-for-security-s1\/\">KARE for Security<\/a>\u201d.<\/strong><strong>\u00a0<\/strong>A large number of our clients have taken this up, and they can take comfort \u2013<\/p>\n<p>but it is vital that all staff are taking security seriously and taking up the training we offer.<\/p>\n<p>Certainly, we think every business needs to consider, at a minimum:<\/p>\n<ul>\n<li>MFA \u2013 Multifactor Authentication<\/li>\n<li>URL Protection<\/li>\n<li>Advanced anti-virus, including on phones and tablets<\/li>\n<li>\u201cUnusual activity\u201d monitoring, especially for cloud tools<\/li>\n<li>Awareness training \u2013 phishing tests, security eLearning and regular inhouse seminars<\/li>\n<li>Best-practice policies and procedures such as limiting access to the minimum necessary to do work<\/li>\n<\/ul>\n<p><strong>Above all, protect your passwords.<\/strong> Make sure they are kept secret and not shared with anyone. <strong>Most hacks seem to come about from user-ids and passwords being compromised<\/strong>, so make sure you aren\u2019t the one.<\/p>\n<p>Unfortunately, this list will grow and change as the hackers become even more sophisticated.<\/p>\n<p>&nbsp;<\/p>\n<p>For what\u2019s it\u2019s worth, the letter from Microsoft to affected users follows:<\/p>\n<p><em>Dear Customer<\/em><\/p>\n<p><em>Microsoft is committed to providing our customers with transparency. As part of maintaining this trust and commitment to you, we are informing you of a recent event that affected your Microsoft-managed email account.<\/em><\/p>\n<p><em>We have identified that a Microsoft support agent\u2019s credentials were compromised, enabling individuals outside Microsoft to access information within your Microsoft email account. This unauthorized access could have allowed unauthorized parties to access and\/or view information related to your email account (such as your e-mail address, folder names, the subject lines of e-mails, and the names of other e-mail addresses you communicate with), but not the content of any e-mails or attachments, between January 1<sup>st<\/sup> 2019 and March 28<sup>th<\/sup> 2019.<\/em><\/p>\n<p><em>Upon awareness of this issue, Microsoft immediately disabled the compromised credentials, prohibiting their use for any further unauthorized access. Our data indicates that account-related information (but not the content of any e-mails) could have been viewed, but Microsoft has no indication why that information was viewed or how it may have been used. As a result, you may receive phishing emails or other spam mails. You should be careful when receiving any e-mails from any misleading domain name, any e-mail that requests personal information or payment, or any unsolicited request from an untrusted source (you can read more about phishing attacks at https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/phishing).<\/em><\/p>\n<p><em>It is important to note that your email login credentials were not directly impacted by this incident. However, out of caution, you should reset your password for your account.<\/em><\/p>\n<p><em>If you require further assistance, or have any additional questions or concerns, please feel free to reach out to our Incident Response Team at ipg-ir@microsoft.com. If you are a citizen of European Union, you may also contact Microsoft\u2019s Data Protection Officer at:<\/em><\/p>\n<p><em>EU Data Protection Officer<br \/>\nMicrosoft Ireland Operations Ltd<br \/>\nOne Microsoft Place,<br \/>\nSouth County Business Park,<br \/>\nLeopardstown, Dublin 18, Ireland<br \/>\ndpoffice@microsoft.com<\/em><\/p>\n<p><em>Microsoft regrets any inconvenience caused by this issue. Please be assured that Microsoft takes data protection very seriously and has engaged its internal security and privacy teams in the investigation and resolution of the issue, as well as additional hardening of systems and processes to prevent such recurrence.<\/em>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guess who got hacked? In recent articles, we\u2019ve warned that people are the weakest link in your IT security. We\u2019ve also warned that any business is a target. No one is immune. Tech companies like us are especially cautious because, in order to do our job, we have access not just to our data but [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":3492,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"[header2 text=\"<strong>Guess who got hacked?<\/strong>\" align=\"left\" color=\"#336A40\" margintop=\"\"]\n\nIn recent articles, we\u2019ve warned that [wow_colorme]<a href=\"http:\/\/kinetics.co.nz\/beware-social-engineering-the-number-one-security-threat-to-business-is-your-people\/\">people are the weakest link in your IT security<\/a>[\/wow_colorme]. We\u2019ve also warned that <strong>any business is a target. No one is immune.<\/strong>\n\nTech companies like us are especially cautious because, in order to do our job, we have access not just to our data but also to our customers\u2019 data. That\u2019s why Kinetics has invested in an SOC2 compliant password vault (the highest levels of security), and we\u2019re tracking and auditing access to these. We will shortly be able to extend access to this same password vault to our KARE for Security client so you can have the same levels of security.<strong>\u00a0<\/strong>\n\n[header2 text=\"<strong>Microsoft?!<\/strong>\" align=\"left\" color=\"#336A40\" margintop=\"\"]\n\n<strong>Even a huge corporate with extensive controls can be compromised.<\/strong> Microsoft recently got caught, (April 2019) when a Microsoft \u2018support agent\u2019 had their credentials compromised. [wow_colorme]<a href=\"https:\/\/techcrunch.com\/2019\/04\/13\/microsoft-support-agent-email-hack\/\">Microsoft have advised<\/a>[\/wow_colorme] industry website [wow_colorme]<a href=\"https:\/\/techcrunch.com\/2019\/04\/13\/microsoft-support-agent-email-hack\/\">\u2018TechCrunch\u201d<\/a>[\/wow_colorme] that these were used for three months to gain access to customer information!\n\nIt seems that access was limited to the free email services they operate \u2013 MSN, Hotmail. Commercial tools like Office 365 were NOT compromised.\n\n<img class=\"alignright wp-image-3548 \" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2019\/04\/philipp-katzenberger-1313574-unsplash.jpg\" alt=\"\" width=\"314\" height=\"209\" \/>\n\nMicrosoft reported:\n<p style=\"padding-left: 30px;\"><em>\u201cMicrosoft recently became aware of an issue involving unauthorized access to some customers\u2019 web-based email accounts by cybercriminals.\u202fWe addressed this scheme by disabling the compromised credentials to the limited set of targeted accounts, while also blocking the perpetrators\u2019 access. A limited number of consumer accounts were impacted, and we have notified all impacted customers. Out of an abundance of caution, we also increased detection and monitoring to further protect affected accounts.\u201d<\/em><\/p>\n[wow_spacing size=\"15px\"]\n\n<strong>If you use these accounts, we recommend you change your password \u2013 NOW!<\/strong>\n\nWe know that Microsoft take these events seriously and they have extensive systems to protect data. This will be hugely embarrassing to them. We\u2019d just point out that it could have happened to anyone. Under new legislation like GDPR, they are now required to advise you if your data may have been impacted, so we\u2019re likely to see more transparency of these events.\n\n[header2 text=\"<strong>What should you do?<\/strong>\" align=\"left\" color=\"#336A40\" margintop=\"\"]\n\n<strong>We\u2019ve packaged up what we think are the new \u2018reasonable\u2019 steps and called it [wow_colorme]\u201c<a href=\"http:\/\/kinetics.co.nz\/kare-for-security\/\">KARE for Security<\/a>\u201d.<\/strong><strong>[\/wow_colorme]\u00a0<\/strong>A large number of our clients have taken this up, and they can take comfort \u2013\n\nbut it is vital that all staff are taking security seriously and taking up the training we offer.\n\nCertainly, we think every business needs to consider, at a minimum:\n<ul>\n \t<li>MFA \u2013 Multifactor Authentication<\/li>\n \t<li>URL Protection<\/li>\n \t<li>Advanced anti-virus, including on phones and tablets<\/li>\n \t<li>\u201cUnusual activity\u201d monitoring, especially for cloud tools<\/li>\n \t<li>Awareness training \u2013 phishing tests, security eLearning and regular inhouse seminars<\/li>\n \t<li>Best-practice policies and procedures such as limiting access to the minimum necessary to do work<\/li>\n<\/ul>\n<strong>Above all, protect your passwords.<\/strong> Make sure they are kept secret and not shared with anyone. <strong>Most hacks seem to come about from user-ids and passwords being compromised<\/strong>, so make sure you aren\u2019t the one.\n\nUnfortunately, this list will grow and change as the hackers become even more sophisticated.\n\n&nbsp;\n\nFor what\u2019s it\u2019s worth, the letter from Microsoft to affected users follows:\n\n<em>Dear Customer<\/em>\n\n<em>Microsoft is committed to providing our customers with transparency. As part of maintaining this trust and commitment to you, we are informing you of a recent event that affected your Microsoft-managed email account.<\/em>\n\n<em>We have identified that a Microsoft support agent\u2019s credentials were compromised, enabling individuals outside Microsoft to access information within your Microsoft email account. This unauthorized access could have allowed unauthorized parties to access and\/or view information related to your email account (such as your e-mail address, folder names, the subject lines of e-mails, and the names of other e-mail addresses you communicate with), but not the content of any e-mails or attachments, between January 1<sup>st<\/sup> 2019 and March 28<sup>th<\/sup> 2019.<\/em>\n\n<em>Upon awareness of this issue, Microsoft immediately disabled the compromised credentials, prohibiting their use for any further unauthorized access. Our data indicates that account-related information (but not the content of any e-mails) could have been viewed, but Microsoft has no indication why that information was viewed or how it may have been used. As a result, you may receive phishing emails or other spam mails. You should be careful when receiving any e-mails from any misleading domain name, any e-mail that requests personal information or payment, or any unsolicited request from an untrusted source (you can read more about phishing attacks at https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/intelligence\/phishing).<\/em>\n\n<em>It is important to note that your email login credentials were not directly impacted by this incident. However, out of caution, you should reset your password for your account.<\/em>\n\n<em>If you require further assistance, or have any additional questions or concerns, please feel free to reach out to our Incident Response Team at ipg-ir@microsoft.com. If you are a citizen of European Union, you may also contact Microsoft\u2019s Data Protection Officer at:<\/em>\n\n<em>EU Data Protection Officer\nMicrosoft Ireland Operations Ltd\nOne Microsoft Place,\nSouth County Business Park,\nLeopardstown, Dublin 18, Ireland\ndpoffice@microsoft.com<\/em>\n\n<em>Microsoft regrets any inconvenience caused by this issue. Please be assured that Microsoft takes data protection very seriously and has engaged its internal security and privacy teams in the investigation and resolution of the issue, as well as additional hardening of systems and processes to prevent such recurrence.<\/em>","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-3491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/3491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3491"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/3491\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}