{"id":2421,"date":"2019-04-23T12:00:15","date_gmt":"2019-04-23T12:00:15","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/this-is-how-hackers-are-fooling-you-your-business\/"},"modified":"2019-04-23T12:00:15","modified_gmt":"2019-04-23T12:00:15","slug":"this-is-how-hackers-are-fooling-you-your-business","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/this-is-how-hackers-are-fooling-you-your-business\/","title":{"rendered":"This Is How Hackers Are Fooling You &#038; Your Business"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><strong><i>By Prethiba Esvary, Marketing and Communications Executive, Lava Protocols<\/i><\/strong><\/p>\n<p><!--more--><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Last year, approximately 1.5 million patients\u2019 non-medical records <\/span><a href=\"https:\/\/www.freemalaysiatoday.com\/category\/nation\/2018\/07\/25\/lessons-malaysia-can-draw-from-singhealths-cyber-attack\/\"><span style=\"font-weight: 400;\">were stolen<\/span><\/a><span style=\"font-weight: 400;\"> from the SingHealth (<\/span><span style=\"font-weight: 400;\">a<\/span><span style=\"font-weight: 400;\"> group of healthcare institutions in Singapore) database. To add to that, about 160,000 patient\u2019s medical records <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> including that of the current Singapore Prime Minister Lee Hsien Loong\u2019s <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> were accessed illegally. This is one example of a huge case of data breach. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do you remember the CIMB Clicks password issue that took place last year? People <\/span><a href=\"https:\/\/www.cimbclicks.com.my\/pdf\/20181217-Clicks-Public-FAQ-v3.pdf\"><span style=\"font-weight: 400;\">claimed <\/span><\/a><span style=\"font-weight: 400;\">that they could log in despite adding a few invalid characters after the required 8-character password. Then there was the issue of fraudulent debit card transactions. Several CIMB customers complained that there were <\/span><a href=\"https:\/\/www.thestar.com.my\/news\/nation\/2018\/12\/17\/cimb-denies-its-online-banking-system-was-hacked-assures-all-is-secure\/\"><span style=\"font-weight: 400;\">unauthorized Paypal transactions<\/span><\/a><span style=\"font-weight: 400;\"> made via their debit cards. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Our question is how can hackers get access to what you would think are high-security systems?<\/span><\/i> <i><span style=\"font-weight: 400;\">Was this a human error or simply due to the absence of a robust security system? <\/span><\/i><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><b>The Facts<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/www.thesundaily.my\/archive\/cyber-attacks-may-cost-malaysia-us122b-economic-losses-BUARCH563767\"><span style=\"font-weight: 400;\">study by Frost &#038; Sullivan<\/span><\/a><span style=\"font-weight: 400;\"> revealed that Malaysia is looking at a possible loss of <\/span><span style=\"font-weight: 400;\">US$12.2 <\/span><span style=\"font-weight: 400;\">billion (approx. RM50.7billion) due to cybersecurity attacks. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a press conference in July last year, Frost &#038; Sullivan Asia Pacific Marketing VP Saipan Agarwal <\/span><a href=\"https:\/\/www.thesundaily.my\/archive\/cyber-attacks-may-cost-malaysia-us122b-economic-losses-BUARCH563767\"><span style=\"font-weight: 400;\">said<\/span><\/a><span style=\"font-weight: 400;\">,<\/span><span style=\"font-weight: 400;\"> \u201cCybersecurity attacks have resulted in job losses across different functions in three out of five organizations that have experienced cyber incidents over the last 12 months.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In reference to the SingHealth database hack, associate director of security services provider LGMS CK Fow <\/span><a href=\"https:\/\/www.freemalaysiatoday.com\/category\/nation\/2018\/07\/25\/lessons-malaysia-can-draw-from-singhealths-cyber-attack\/\"><span style=\"font-weight: 400;\">said<\/span><\/a><span style=\"font-weight: 400;\"> that most of the time, cybersecurity attacks are due to <\/span><b>human error<\/b><span style=\"font-weight: 400;\"> and they usually come from <\/span><b>within the organization<\/b><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem is that organizations tend to place more importance on back-end security (servers, firewalls, intrusion prevention systems), he added. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThey may forget the most important part, which is the front-end security, such as end-user computers,\u201d he said.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With regards to the CIMB Clicks password issue, the bank released a <\/span><a href=\"https:\/\/www.cimbclicks.com.my\/pdf\/20181217-CIMB-Media-Statement-on-Clicks.pdf\"><span style=\"font-weight: 400;\">statement<\/span><\/a><span style=\"font-weight: 400;\"> on Dec 17 last year saying they have beefed up their security by accommodating passwords of 8 to 20 characters in length and by adding reCaptcha. As to the fraudulent transactions, CIMB confirmed in a<\/span><a href=\"https:\/\/www.cimbclicks.com.my\/pdf\/20181217-Clicks-Public-FAQ-v3.pdf\"><span style=\"font-weight: 400;\"> public FAQ<\/span><\/a><span style=\"font-weight: 400;\"> released on the same date that this matter was separate from CIMB Clicks. A question raised was why wasn\u2019t there an OTP (one-time password) issued to customers to warn them of suspicious transactions?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to CIMB, \u201cThe use of OTP is a policy adopted by e-commerce site owners. Whilst online transactions on Malaysian websites require an OTP (called 3D authentication),<\/span><b> many international websites such as Facebook or PayPal do not require an OTP<\/b><span style=\"font-weight: 400;\"> (called Non-3D transactions)\u201d. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">How can consumers protect themselves in that case? Go to the solutions section of this article. <\/span><\/i><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><b>A Cause for Concern for Your Business <\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Believe it or not, hackers are now more interested in targeting businesses rather than individual consumers, the <\/span><a href=\"https:\/\/info.phishlabs.com\/hubfs\/2018%20PTI%20Report\/PhishLabs%20Trend%20Report_2018-digital.pdf\"><i><span style=\"font-weight: 400;\">2018 Phishing Trends and Intelligence (PTI) Report<\/span><\/i><\/a> <span style=\"font-weight: 400;\">stated. <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">What are <\/span><\/i><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/phishing-attack-scam\/\"><i><span style=\"font-weight: 400;\">phishing attacks<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">? It is when a hacker masks their true identity behind a trusted entity in an attempt to steal personal and sensitive data from users such as login credentials and debit\/ credit card details. They do this by tricking users to open emails and text messages and to click on malicious links. This \u201ccan lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information\u201d.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">The report also said that hackers are impersonating email service providers and Software as a Service (SaaS) platforms in an attempt to steal corporate data and access their systems. Once a single user has accidentally given access to his\/ her account, hackers are able to <\/span><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/01\/10\/four-phishing-attack-trends-to-look-out-for-in-2019\/#7aede55b4ec2\"><span style=\"font-weight: 400;\">access all sorts of data<\/span><\/a><span style=\"font-weight: 400;\"> from the organization. In fact, they can use this to send malicious emails to other employees. Now that there is the single sign-on function, hackers can also use that to access all the other SaaS services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take a look at this email:<\/span><\/p>\n<div style=\"width: 649px\" class=\"wp-caption aligncenter\">\n <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/paypal_fake-notice.png\" alt=\"Paypal Phishing Security Notice\" width=\"639\" height=\"467\" data-recalc-dims=\"1\"><\/p>\n<p class=\"wp-caption-text\"><em>This mage is taken from <a href=\"http:\/\/www.phishing.org\/phishing-examples\" target=\"_blank\" rel=\"noopener noreferrer\">www.phishing.org<\/a> and intended for illustration purposes only.<\/em><\/p>\n<\/div>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">When we get security warning emails from e-commerce sites or email service providers we have accounts with, naturally, we would assume it is from a trusted source. Hackers take this to another level by mimicking these emails (down to the logo, font, sender\u2019s email, and colors), just to get you to click on a malicious link. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, you should hover over the link to ensure it is from a legitimates source BEFORE clicking on it. You\u2019ll be able to see the source at the bottom left of your screen. <\/span><\/p>\n<div id=\"attachment_11566\" style=\"width: 710px\" class=\"wp-caption aligncenter\">\n <img aria-describedby=\"caption-attachment-11566\" data-attachment-id=\"11566\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2019\/04\/23\/cybersecurity-attacks-malaysia\/udemy\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2019\/04\/udemy.jpg?fit=700%2C326&#038;ssl=1\" data-orig-size=\"700,326\" data-comments-opened=\"0\" data-image-meta=\"{\"aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\",\"orientation\":\"0\"}\" data-image-title=\"\" data-image-description=\"\" data-image-caption=\"\n\n<p>This is a screenshot taken from the author\u2019s inbox and is purely for illustration purposes. <\/p>\n<p>&#8221; data-medium-file=&#8221;https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2019\/04\/udemy.jpg?fit=300%2C140&#038;ssl=1&#8243; data-large-file=&#8221;https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2019\/04\/udemy.jpg?fit=700%2C326&#038;ssl=1&#8243; loading=&#8221;lazy&#8221; class=&#8221;size-full wp-image-11566&#8243; src=&#8221;https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/udemy-2.jpg&#8221; alt=&#8221;cybersecurity attacks in malaysia&#8221; width=&#8221;700&#8243; height=&#8221;326&#8243; srcset=&#8221;https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/udemy-1.jpg 700w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/udemy-3.jpg 300w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/udemy.jpg 610w&#8221; sizes=&#8221;(max-width: 700px) 100vw, 700px&#8221; data-recalc-dims=&#8221;1&#8243;><\/p>\n<p id=\"caption-attachment-11566\" class=\"wp-caption-text\"><em>This is a screenshot taken from the author\u2019s inbox and is purely for illustration purposes.<\/em><\/p>\n<\/div>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">You would also think that sites that contain HTTPS are trusted as it encrypts your communication. Apparently, that\u2019s not the case anymore. Hackers have become smarter and are exploiting this for their own benefit. The same report stated that \u201cby the end of 2017, nearly one-third of all phishing sites were hosted on HTTPS infrastructure, compared to just five percent at the end of 2016\u2026\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I can go on and on. <\/span><\/p>\n<p><b>Read more<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/01\/10\/four-phishing-attack-trends-to-look-out-for-in-2019\/#7aede55b4ec2\"><span style=\"font-weight: 400;\">Four Phishing Attack Trends To Look Out For In 2019<\/span><\/a><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><b>The Solution<\/b><\/span><\/h2>\n<p><b>1. Two-step verification method on Google<\/b><\/p>\n<p><span style=\"font-weight: 400;\">This means that every time you sign into your Google account, you\u2019ll need to put a password and verification code. The code is sent via text message, voice call, or Google\u2019s mobile app. This way, even if hackers somehow got a hold of your password, they can\u2019t log in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, you have the option of not going through this <\/span><a href=\"https:\/\/www.google.com\/landing\/2step\/#tab=how-it-works\"><span style=\"font-weight: 400;\">two-step process<\/span><\/a><span style=\"font-weight: 400;\"> again and again if you\u2019re on the same computer\/ device. But the moment you yourself sign in from another device, the two-step verification is needed. <\/span><\/p>\n<p><b>2. Strengthen your CRM platform security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re using a CRM platform such as Salesforce, there are several <\/span><a href=\"https:\/\/help.salesforce.com\/articleView?id=security_overview_2fa.htm&#038;type=5#security_overview_2fa\"><span style=\"font-weight: 400;\">security measures<\/span><\/a><span style=\"font-weight: 400;\"> you can take. One is the two-factor authentication approach. You can set this up for every user\u2019s login, log in through API (for developers and client applications), and also for access to particular features such as reports and apps. Users would have to either download a Salesforce\/ Google mobile authenticator app (to receive push notifications or OTPs via the app) or use a U2F security key as the second-factor authentication. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second security measure you can take is to include IP range restrictions. This means you will be restricting users to log in only from your company network or a VPN (virtual private network). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last but not least, it would be good to add spam filters and malware protection to your system.<\/span><\/p>\n<p><b>3. Check the website domain<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Since hackers are now mimicking other \u2018https\u2019 sites, what you can do is to check the domain. Say you have an account on <\/span><a href=\"https:\/\/www.digicert.com\/blog\/buy-site-know-website-secure\/\"><span style=\"font-weight: 400;\">amazon.com<\/span><\/a><span style=\"font-weight: 400;\">. Hackers can easily create a website that looks exactly like amazon.com. But if you look closely, you may see that the domain is actually amaz0n.com. That\u2019s because no two users can purchase\/ have the same domain. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can also look at the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Company address and phone number \u2013 If these aren\u2019t available, then something is not right. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Prices \u2013 If they are incredibly low, something is fishy.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Return policy \u2013 Any reputable site would have a section on product returns and shipment. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Privacy policy \u2013 A legitimate site would have details on how they are using your data and how they are safeguarding it.<\/span><\/li>\n<\/ul>\n<p><b>4. Check the security settings on e-commerce sites<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re a Paypal user, you ought to know that there is actually the option to enable the \u2018<\/span><a href=\"https:\/\/www.paypal.com\/us\/smarthelp\/article\/What-is-the-PayPal-Security-Key-FAQ2357\"><span style=\"font-weight: 400;\">Paypal security key\u2019<\/span><\/a><span style=\"font-weight: 400;\">, which acts as a second authentication factor. So, in addition to keying in your password, you would have to key in a security code\/ <\/span><a href=\"https:\/\/www.paypal.com\/us\/smarthelp\/article\/how-do-i-order-or-activate-my-paypal-security-key-faq634\"><span style=\"font-weight: 400;\">OTP<\/span><\/a><span style=\"font-weight: 400;\"> which will be sent to you via SMS.<\/span><\/p>\n<p><b>5. Use a foolproof password<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s understandable why people would use their IC\/ birthdays as their go-to password, and that too for EVERY account. It\u2019s easy to remember! But say you lost your entire wallet one day\/ someone breaks into your home and gets a hold of your bank cards and identification card. They can easily transfer out all the money you have in all your bank accounts. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second thing is, ensure that all your passwords have a combination of numbers, letters, and special characters. That way, it\u2019ll make it impossible for hackers to guess what your password is. <\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"color: #ff6600;\"><b>In a Nutshell<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Both human error and a lack of multi-layer security on your front and back-end systems are the main cause for all of these cyber attacks. With regards to the former, it is crucial that your organization takes measures to prevent employees from \u2018<\/span><a href=\"https:\/\/www.cso.com.au\/article\/656590\/why-cyber-security-should-top-priority-banks-want-rehabilitate-their-reputations\/\"><span style=\"font-weight: 400;\">copying databases<\/span><\/a><span style=\"font-weight: 400;\">\u2019 or \u2018sensitive data\u2019 and to also put in a place something to detect if and when they have done so. For the latter, implementing the right security measures is key. Therefore, speaking to the right IT or cloud service provider would be a good place to start. Lava Protocols has worked with numerous clients over the past decade with their cloud solution implementation and also data security. <\/span><\/p>\n<p><strong><i>If you\u2019d like to speak to one of our consultants about how you can beef up your security measures, email us at <\/i><a href=\"mailto:asklava@lavaprotocols.com\"><i>asklava@lavaprotocols.com<\/i><\/a><i> or call us at +603 7885 9720. <\/i><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">A few weeks ago, one of our employees nearly lost all of her savings because of a scam. Read the full story <a href=\"https:\/\/lavaprotocols.com\/2019\/04\/23\/malaysian-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2014\u2014\u2014\u2014\u2013<\/span><\/p>\n<p><strong><i>Lava Protocols is a cloud service provider in Malaysia. We are also an <\/i><a href=\"https:\/\/lavaprotocols.com\/crm\/\"><i>authorised Salesforce Partner <\/i><\/a><i>\u00a0and we possess more than a decade of experience in CRM solutions for sales, service, and marketing. We pride ourselves in not just being a CRM partner but also understanding the needs of our customers and taking their business to the next level.<\/i><\/strong><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A study by Frost &#038; Sullivan revealed that Malaysia is looking at a possible loss of US$12.2 billion (approx. RM50.7billion) due to cybersecurity attacks.<\/p>\n","protected":false},"author":1,"featured_media":2422,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,59],"class_list":["post-2421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog","tag-cloud-horizon"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/hacker-2300772_1280.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2421"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2421\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2422"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}