Description
Threat actors are pesky and, once again, they’re up to no good. A new methodology has schemers compromising online forms where users submit their information like their names, email addresses, and, depending on the type of site, some queries relating to their life. This new method indicates that the attackers have figured out a way around the CAPTCHA’s that have been making us all prove we’re not robots by identifying fire hydrants since 1997. And what’s more, we’re not quite sure how they’ve done it.
In this episode, hosts Natalia Godyla and Nic Fillingham sit down with Microsoft threat analyst, Emily Hacker, to discuss what’s going on behind the scenes as Microsoft begins to dig into this new threat and sort through how best to stop it.
In This Episode You Will Learn:
Why this attack seems to be more effective against specific professionals. Why this new method of attack has a high rate of success. How to better prepare yourself for this method of attack Some Questions We Ask:
What is the endgame for these attacks? What are we doing to protect against IceID in these attacks? Are we in need of a more advanced replacement for CAPTCHA? Resources:
Emily Hacker:
https://www.linkedin.com/in/emilydhacker/
Investigating a Unique ‘Form’ of Email Delivery for IcedID Malware
https://www.microsoft.com/security/blog/2021/04/09/investigating-a-unique-form-of-email-delivery-for-icedid-malware/
Nic Fillingham’s LinkedIn:
https://www.linkedin.com/in/nicfill/
Natalia Godyla’s LinkedIn:
https://www.linkedin.com/in/nataliagodyla/
Microsoft Security Blog:
https://www.microsoft.com/security/blog/
Related:
Security Unlocked: CISO Series with Bret Arsenault
https://SecurityUnlockedCISOSeries.com
See acast.com/privacy for privacy and opt-out information.
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22