As we approach the holidays, the Information Security Office (ISO) would like to remind the UT Arlington community to be aware of seasonal scams, phishing and malicious software (malware) distribution campaigns.
Every year, cyber criminals take advantage of the increase in online purchases and electronic seasonal greeting cards to trick victims into believing they’ve received packages or personal messages. They often use multiple methods to attract victims, such as posing as legitimate websites and/or using fraudulent emails that are crafted to look legitimate; they steal the logos, email or web templates of legitimate businesses *e.g. FedEx, DHL UPS, Amazon.com, etc.) in an effort to entice victims into clicking links or opening attachments.
These phishing and malware campaigns may come in the form of :
- Fake shipping/courier notifications.
- Electronic greeting cards or links to holiday screensavers or other forms of media.
- Request for charitable contributions that may appear to be for legitimate causes but originate from illegitimated sources claiming to be charities.
- Credit card or gift card applications or enticing discounts in online shopping advertisements that lead to websites you’re unfamiliar with.
In addition, be aware of social engineers who may call you on your personal or work phone using a themed pretext (holiday offers, package pickup, etc.).
Don’t be a victim! The ISO advises caution when you encounter these types of email messages or websites by:
- Looking for tell-tale signs that a website or email is not legitimate:
………….– The senders address or website address does not match the organization listed in the content of the message.
………… – The grammar in the message or website is poor.
………… – Format of the email or website is poor or inconsistent with what you’re used to seeing from the organization.
………… – Hovering over the links with your mouse reveals web address inconsistent with the content of the message.
- Never clicking on links in emails that you’re not expecting.
- Never opening attachments in emails that you’re not expecting.
- Never providing your personal information in an email or on a website unless you are completely sure.
The United States Computer Emergency Readiness Team encourages users and administrators to use caution when encountering these types of email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns:
The Information Security Office wants to make you aware that a number of vulnerabilities affecting Microsoft Office and Adobe Acrobat were disclosed this week. Furthermore, we have been made aware that savvy criminals are launching phishing campaigns to deliver malware (such as viruses, Trojans, worms, etc.) by sending specially crafted documents (like pdf, PowerPoint) attached to crafted email designed to bait recipients into opening the documents. If the document is opened, there is a potential for the computer to be infected and may begin downloading other malware.
The Office of Information Technology is aware of these vulnerabilities and is in the process of mitigating them by doing the following:
1. Updating the malware signatures on the email systems that deliver email to @uta.edu and @mavs.uta.edu addresses to block known attachments that might be infected.
2. Updating Microsoft Endpoint Protection (Windows) and McAfee Antivirus (Macintosh) to block known malware that might exploit this vulnerability.
3. Updating Microsoft Office and Adobe Acrobat products on computers that have the standard OIT image.
4. Patching vulnerable servers under their care that might be vulnerable if malware entered our network.
Additionally, the Information Security Office has implemented blocks on the Intrusion Prevention System for known communication that might exploit these vulnerabilities.
As is the nature with all anti-malware software or network protections, and while anti-malware vendors are constantly adjusting and improving detection capabilities, they are often playing catch-up with the latest techniques used by criminals to evade threat detection technology. As such I encourage you to alert your staff to be vigilant and to follow these general tips to avoid infection:
- Do not open email attachments from unknown or untrusted sources
- Remind users not to visit untrusted websites or follow links provided by unknown or untrusted sources, especially email.
- Ensure that computers and servers are protected:
- Keep all operating system, applications and essential software up to date to mitigate potential exploitation by attackers.
- Make sure all AV products are up-to-date with their signatures.
- Ensure that there is a properly configured firewall enabled on the computer or server.
If you are not sure whether your UTA computer is fully protected, please contact the OIT help desk or your Desktop Support Associate.
There is a new exploit that has hit the internet called BadUSB that poses a Security threat based on USB devices. Instructions and applications to create infected USB devices are available on the internet. The exploit allows installation into the USB’s firmware where it is run automatically when plugged into a computer system. The firmware is the set of “instructions” used by the usb device to start up and be read by your computer. Current anti-malware software does not read this area of devices and is unable to protect from this exploit. If the anti-malware may be able to recognize the malware activity once it starts and be able to protect the computer and data; Keep your anti-malware up-to-date.
Since this exploit requires a user to insert a USB that has been created to allow this exploit, Be careful of free USB drives, USB drives found, USB devices from unknown or suspicious sources and Always Lock Your Computer when you leave your desk.
Additional information on BadUSB can be found at http://mashable.com/2014/10/03/how-can-you-avoid-badusb/ or https://srlabs.de/badusb/
Over the past few months, UT Arlington has fallen victim to Crypto-malware. In the two instances we’ve handled, documents in department K: drives were encrypted. We have recently received a notice from the Texas Department of Information Resources (DIR) Office of the CISO alerting us to several ransomware infections within the state. The infections include variants “CryptoLocker” and “CryptoWall.”
According to DIR, the Trojan appears to have been spread mainly though emails and in one case the email was presented as a fax confirmation. At UT Arlington, both infections involved employees browsing to websites that were infected. The computers involved had vulnerable Java and/or Adobe plug-ins; there is strong indication that this was the attack vector for the ransomware.
While it is possible to remove the virus itself, the ISO is unaware of any method to decrypt the files. The private key, needed for decryption, is stored on a Command and Control server and is only available to the attacker. The only way to recover from a Crypto attack is to restore from backups.
We urge all departments to ensure their systems and applications are fully patched, their anti-virus is up-to-date, and ensure current backups of critical files exist in approved locations. Approved locations include OIT managed K: and J: drives, UTA CrashPlan and UTA Box.com
Please be aware that a potentially new variant of the Cryptolocker ransomware has been identified. “Ransomware” is a new category of malware that can prevent access to a computer, or the data on it, unless the victim pays a ransom to the malware creator. The Cryptolocker malware encrypts files on the victims computer and then demands payment for the files to be unlocked.
Because this is a new variant of the malware, there are no current ways to protect you from it. The only protection is to not open attachments that you are not expecting or that look suspicious. The malware is primarily delivered via email and often contain a subject line enticing you to open an accompanying attachment. Below is an example of the message (Subject: Invoice Payment Confirmation; Attachment: Invoice_Details_01.04.2014.zip).
The malware can potentially be sent to your UTA email or your personal email (e.g. gmail, Hotmail, yahoo, etc) account.
If you fall victim to this virus, you will not be able to unlock your files and must rely on your backups. The malware can be aggressive has been known to encrypt files on local hard drives, external drives and potentially your file shares (e.g. your K: and J: drives).
UTA Employees: To backup your data on a UTA owned computer, you may use CrashPlan (search for “CrashPlan” in the search box on the UTA website).
For updates on this advisory, please check back periodically or send an email to email@example.com. If you need help on how to use CrashPlan or if you are a victim of this virus, contact the Help Desk at 2-2208.
Please see our previous blog entry about Cryptolocker for background and tips.