Most phishing attacks originate from emails cleverly designed to imitate genuine official communications. These emails contain links to malicious websites which again are designed to look official. When a user unwittingly tries to log in, their username and password is immediately compromised. A recent study showed that 52% of office workers surveyed said that they routinely use the same password for all of their user accounts.
A common password divulged in a phishing attack will grant malicious actor access to a multitude of critical online services and personal data. Under GDPR regulations, your company must immediately notify anyone whose data has been compromised in this manner. The damage to your processes, reputation and goodwill could be immeasurable.
The Radius Incident Response team has recently observed a significant increase in the number of Business Email Compromise (‘BEC’) cases ending in attempted payment fraud.
Most of these cases appear to be linked to a global phishing campaign using a new tool – called EvilProxy – used to bypass most forms of multi-factor authentication (‘MFA’) and compromise user accounts.
For more information, please see:
Ransomware attacks typically start via an official-looking email attachment containing the software payload that not only locks up the original recipient’s computer but can infect the entire network. In these circumstances, your only option (other than paying the attacker which we never advise our clients to do) is to completely wipe and restore all infected devices. This can result in significant downtime and support costs unless of course, you’re covered by a support plan.
Here at Radius, we provide a range of enterprise IT solutions including email filtration, web content filtering, backup and disaster recovery to help prevent system compromise and quickly recover should the worst happen.