{"id":7777,"date":"2021-08-29T13:23:55","date_gmt":"2021-08-29T01:23:55","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=7777"},"modified":"2021-08-29T13:23:55","modified_gmt":"2021-08-29T01:23:55","slug":"have-you-heard-about-typosquatting","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=7777","title":{"rendered":"Have you heard about &#8220;typosquatting&#8221;?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_image src=&#8221;http:\/\/kinetics.co.nz\/wp-content\/uploads\/2021\/08\/Aug21Phishing.jpg&#8221; title_text=&#8221;Aug21Phishing&#8221; url=&#8221;https:\/\/twitter.com\/MsftSecIntel\/status\/1421232634357714947?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1421232634357714947%7Ctwgr%5E%7Ctwcon%5Es1_&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][et_pb_image src=&#8221;http:\/\/kinetics.co.nz\/wp-content\/uploads\/2021\/08\/Aug21bPhishing.jpg&#8221; title_text=&#8221;Aug21bPhishing&#8221; url=&#8221;https:\/\/twitter.com\/MsftSecIntel\/status\/1421232635502682118?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1421232638992347139%7Ctwgr%5E%7Ctwcon%5Es2_&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.4&#8243; _module_preset=&#8221;default&#8221;]<\/p>\n<p>&#8220;Typosquatting&#8221; is the name given to criminals pretending to be someone they aren&#8217;t &#8211; taking a domain name that uses a clever combination of legitimate-looking original sender email addresses, with spoofed display sender addresses that contain the target usernames and domains, and display names that mimic legitimate services to try and slip through email filters.\u00a0 The hackers are starting to host some of their platforms on Microsoft and Google to further add to the sense of authenticity.\u00a0\u00a0<\/p>\n<p>These are highly compelling when they mimic organisations that you typically expect to receive emails from and would normally trust.\u00a0 We&#8217;ve seen examples where the supposed shared document is something you might normally take a look at &#8211; OneDrive, SharePoint, Teams or Google drive links to files with names like &#8220;Staff Reports&#8221;, &#8220;Performance Bonus&#8221; or &#8220;Price List&#8221;.\u00a0<\/p>\n<p>If you click on the link they will take you to a fake login page.\u00a0 These fakes are very high quality, and of course, we&#8217;re all so used to logging in to 365 or Google that most of us will simply type in their credentials.\u00a0 Once yo do that, the hacker has got you.\u00a0\u00a0<\/p>\n<p>Hopefully you have turned on MFA. Multi-factor authentication makes it harder for the hacker to get to your data, but not impossible.\u00a0 \u00a0The simplest thing they can do is have their fake website immediately apply your credentials an try to log in as you.\u00a0 If they see an MFA prompt, then they will ask you for your code,\u00a0 \u00a0or have your mobile app prompt you to approve the login.\u00a0 At least you have had a moment to think about it though.<\/p>\n<p>The best defenses are :<\/p>\n<ul>\n<li>Paranoia &#8211; check everything!<\/li>\n<li>MFA with geo-blocking &#8211; chances are the hacker is somewhere like eastern Europe or the Middle East and you don&#8217;t normally get logins from there.\u00a0 \u00a0Of course, that isn&#8217;t necessarily true for all of us, or the hacker could have hijacked a computer closer to hand.<\/li>\n<li>URL scrubbing and ATP\u00a0 &#8211; using systems like the ones in <a href=\"http:\/\/kinetics.co.nz\/cybersecurity\/\">KARE for Security<\/a> to &#8216;wash&#8217; URLs &#8211; albeit harder to prevent on mobile devices.<\/li>\n<\/ul>\n<p>Some clues have emerged from the current attack.\u00a0 Look out for words like &#8216;referral&#8217; or &#8216;reminder &#8211; x shared this without 7 days ago&#8217;<\/p>\n<p><strong>Remember, we&#8217;re more vulnerable than normal when working from home, when we can&#8217;t check these as easily.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Typosquatting&#8221; is the name given to criminals pretending to be someone they aren&#8217;t &#8211; taking a domain name that uses a clever combination of legitimate-looking original sender email addresses, with spoofed display sender addresses that contain the target usernames and domains, and display names that mimic legitimate services to try and slip through email filters.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":7778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-7777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/7777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7777"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/7777\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}