Security Blog
Security Alert!
Southern California Wildfire-Themed Scams
DATE(S) ISSUES:
1/20/25
SUBJECT:
Cybercriminals exploiting Southern California wildfires for phishing and scams
OVERVIEW:
Cybercriminals are leveraging the ongoing Southern California wildfires to conduct phishing attacks and scams. These scams appear in emails, text messages, QR codes, phone calls, voicemails, and fraudulent crowdfunding or fundraising campaigns on social media. Threat actors quickly incorporate fire-related themes into their phishing lures, impersonating property inspectors, building contractors, and government agencies offering aid. Some even claim to help replace identification documents, aiming to steal money and personal information.
USERS AFFECTED:
- Fire victims
- Homeowners
- Donors
- Organizations
RISK:
- Identity theft
- Financial loss
- Fraudulent aid scams
- Charity donation scams
PREVENTION TIPS:
- Verify Requests – Independently confirm any financial or personal information requests by contacting official agencies directly.
- Enable Security Measures – Use multi-factor authentication (MFA) and email filtering to detect phishing attempts.
- Report Suspicious Activity – If you suspect fraud, report it to the Federal Trade Commission (FTC) or local authorities.
- Stay Informed – Monitor official emergency websites and trusted news sources for legitimate aid and updates.
REFERENCES:
fema.gov:
Wildfire Survivors: Beware of Stolen Identity Fraud and Other Disaster Recovery Scams and Deceptions
Ìý
Network-Connected Wrench Vulnerability
DATE(S) ISSUED:
1/11/24
SUBJECT:Ìý
Vulnerability in a network-connected wrench having potential safety issues
OVERVIEW:
Security researchers from Nozomi have discovered 23 vulnerabilities in the Bosch Rexroth Handheld Nutrunner NXA015S-36V-B, a cordless wrench used in factories worldwide for precise torque applications. The device connects wirelessly to local networks, allowing engineers to tighten bolts accurately. Exploiting these vulnerabilities could enable hackers to install malware, potentially leading to the sabotage or disabling of the wrenches, causing safety and reliability issues. Bosch Rexroth has acknowledged the vulnerabilities and is working on a patch scheduled for release at the end of January 2024.
USERS AFFECTED:
- Consumers
- Factories
- Organizations
RISK:
- Safety Risks
- Sabotage of Manufacturing Processes
- Malware Installation
- Operational Disruption
- Data Security Concerns
REFERENCES:
Ìý
arstechnica.com:
CriticalÌý iOS fixes - Patch your Apple Devices Now (12/2/23)
DATE(S) ISSUED:
11/30/23
SUBJECT:Ìý
iPhone Security Flaws
OVERVIEW:
Apple has released iOS 17.1.2, along with a warning to update now. iOS 17.1.2 fixes two iPhoneÌý—both of which are already being used in real-life attacks. There is also an update to MacOS and Safari for older Macs. Here is the link to theÌý
USERS AFFECTED:
- Any person who owns an Apple device(s)
RISK:
- Any user clicking on the "malvertisements" or ads containing malware are subject to the installation of malware on their device
RECOMMENDATIONS:
We recommend the following actions be taken:
- Update Apple devices as soon as possible including iPhones, MacOS, and Safari for older Macs.
REFERENCES:
support.apple.com:
Malicious Google Ads Installing Malware
DATE(S) ISSUED:
11/20/23
SUBJECT:Ìý
Malicious Google Ads Trick WinSCP Users into Installing Malware
OVERVIEW:
Beware of a sophisticated cyber threat known as SEO#LURKER! Cybersecurity experts have uncovered a malicious scheme targeting users searching for WinSCP. Attackers manipulate search results and Google ads to lure unsuspecting individuals into downloading malware instead of legitimate software. These deceptive ads redirect to compromised websites, leading to a fake WinSCP site where a seemingly genuine installer hides malicious Python scripts. Victims, particularly in the U.S., are targeted through geoblocking. This tactic isn't new; similar attacks have targeted PyCharm users.Ìý
USERS AFFECTED:
- Users exposed to and clicking onÌýlookalike WinSCP website, winccp[.]net.
RISK:
- Any user clicking on the "malvertisements" or ads containing malware are subject to the installation of malware on their device
RECOMMENDATIONS:
We recommend the following actions be taken:
- Before clicking on an ad, confirm that it isÌýlegitimate
- If you are unsureÌýan ad is legitimate, search for the ads official website and continue from there
- Report ad to google if it is suspicious
REFERENCES:
thehackernews.com: