Hamilton security experts at Bermuda, presented a live hacking demonstration yesterday. Event attendees found out about the ways which hackers are usually able to gain access to a corporate network by a phishing email expedition.
(ISC)2 Bermuda Chartering Chapter hosted this event. They demonstrated some of the tricks which are mainly used by the hackers to get email details or information when the victim clicks on the corrupted and malicious links and places where the victim shares their personal information.
Mark Phillips, the senior technical consultant of Dionach and the other one is Mathew Sofiyani, and business development manager had counterfeited the phishing attacks.
As per the report of the Royal Gazette, the demonstration warned that “having gained control of a compromised computer, an attacker is in a position to monitor everything that goes on your devices. They are fully focused on operating inbuilt microphones, webcams, and record keystrokes to get the username and password credentials. If it is a company’s workstation which is affected then that could lead to serious and costly damage to a private network and the loss of important corporate data.”
This event is mainly focused on how to raise awareness and provide the technical expertise, for a good reason. Symantec’s 2018 Internet Security Threat Report informed that “spear phishing, it is the name of the one infection vector in all of them, employed by 71 percent of organized groups in 2017.”
A standard example is the tech support scam, and since the GDPR has prompted many organizations to give the critical information of customers about the changes in their privacy policies. As the attackers have leveraged that communication as another avenue for scams.
Penetration testers and ethical hackers are employing more methods to help organizations to make aware their employees, not only about the internet attacks of phishing campaigns but also how to get the information about any malicious email.
The Wall Street Journal, On 29 May, finally broke down the anatomy of a phishing attack that is declared by Shawn Moyer’, a founding partner at Atredis Partners.
At present, the Attackers are searching a new way through the company details and help of the social engineering tactics to get the trust of unsuspecting users. Then they make a plan for the attack. You will get there some of the ideas to avoid falling victim to an attack.
Phillips presented an event where it introduced about some dangers which are hovering over links reveals the actual URL destination and note out the differences between “HTTP” and “https.”
At last, it was also advised for the user to read the URL and memailscarefully to spot spelling errors. As of now, phishing is also far more problematic because some of the brazen attackers are also using “vishing” and engage with to targets the phone and gain the details. The goal is always to get the personal information, which is very easy for attackers to hack their devices or accounts, Phillips said.
To protect yourself from falling prey to phishing, install a robust antivirus software such as Norton and activate it on Norton.com/setup.