issue164:mon_opinion
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue164:mon_opinion [2020/12/28 13:59] – créée auntiee | issue164:mon_opinion [2021/01/01 10:59] (Version actuelle) – andre_domenech | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | Recently, we had a customer who was targeted by a phishing campaign. Even after telling them NOT to click on links or open attachments, | + | **Recently, we had a customer who was targeted by a phishing campaign. Even after telling them NOT to click on links or open attachments, |
- | At the moment we have them blaming IT for the “hacking” (!!!). “Why can’t IT make the hacking stop?” It is too late; IT can now only block the domain squatting, etc, on a retroactive basis. Once blocked, the adversaries just create another domain name and spoof the client’s mail again. They already have all your emails, all your contacts and are using your emails to get your contacts to click on malicious links. | + | At the moment we have them blaming IT for the “hacking” (!!!). “Why can’t IT make the hacking stop?” It is too late; IT can now only block the domain squatting, etc, on a retroactive basis. Once blocked, the adversaries just create another domain name and spoof the client’s mail again. They already have all your emails, all your contacts and are using your emails to get your contacts to click on malicious links. |
- | Safety starts with YOU. | + | |
+ | Récemment, un client a été ciblé par une campagne de hameçonnage. Même après qu’on lui a dit de NE PAS cliquer sur des liens ou ouvrir des pièces jointes, le personnel continuait à le faire, puis appelait le service informatique (IT) quelques jours plus tard, après le saccage complet de leurs ordis, pour le signaler. Et alors, il était trop tard. Parfois, on se demande comment ces gens-là ont réussi à infiltrer votre organisation. Dans ce cas précis, une partie du problème était due au fait que le propriétaire et son fils avaient acheté de nouvelles voitures de luxe et tout le reste de la société a dû se restreindre, | ||
+ | |||
+ | Actuellement, | ||
+ | |||
+ | **Safety starts with YOU. | ||
Let’s look at the fishing campaign. The sales people were the culprits who clicked on links and opened attachments, | Let’s look at the fishing campaign. The sales people were the culprits who clicked on links and opened attachments, | ||
- | Just a little bit more prodding and I came to the answer. Their sales targets were raised and they were desperate to make their targets so they could afford their lifestyles. Desperate to keep up with the Joneses, they click everything for a sale. Sales first, everything else last. | + | Just a little bit more prodding and I came to the answer. Their sales targets were raised and they were desperate to make their targets so they could afford their lifestyles. Desperate to keep up with the Joneses, they click everything for a sale. Sales first, everything else last.** |
+ | |||
+ | La sécurité commence par VOUS. | ||
+ | |||
+ | Regardons la campagne de hameçonnage. Les coupables étaient les vendeurs qui cliquaient sur des liens et ouvraient des pièces jointes, même après qu’on leur a dit de ne pas le faire. Ma première question était : « pourquoi avez-vous cliqué sur le lien ? » Vendeur1 : « mais cela venait de mon client ! » Vendeur2 : « c’était un accident ! Et j’ai fait une enquête préliminaire. » Moi à Vendeur1 | ||
+ | |||
+ | Après un tout petit peu plus d’encouragement, | ||
- | Now I examined the email. The subject line contains “from trusted sender”. They have never received emails that had that in the subject line. That should immediately raise a red flag. The body of these messages all have urgency stipulated: Your account will be deactivated in 24 hrs. Fill this form in to avoid being arrested. Respond immediately! Account on hold, payment overdue! Account confirmation, | + | **Now I examined the email. The subject line contains “from trusted sender”. They have never received emails that had that in the subject line. That should immediately raise a red flag. The body of these messages all have urgency stipulated: Your account will be deactivated in 24 hrs. Fill this form in to avoid being arrested. Respond immediately! Account on hold, payment overdue! Account confirmation, |
Now that everyone has the company’s emails, the criminals are taking messages verbatim, adding a line stating: the password to the attachment is:43yu3i3 or whatever, and adding another malicious attachment to see what they can gain. | Now that everyone has the company’s emails, the criminals are taking messages verbatim, adding a line stating: the password to the attachment is:43yu3i3 or whatever, and adding another malicious attachment to see what they can gain. | ||
- | If you are unsure if you would have clicked on any of these, take the Google phishing quiz: https:// | + | If you are unsure if you would have clicked on any of these, take the Google phishing quiz: https:// |
+ | Alors, j’ai examiné le mail. La case objet contient « d’un émetteur de confiance ». Ils n’avaient jamais reçu de mails avec un tel objet auparavant. Cela aurait dû inquiéter tout de suite les destinataires. Dans le corps des messages, l’accent est sur l’urgence : | ||
- | The guys are getting smarter, the link points to a file transfer server where he/she/it leaves the payload: https:// | + | Maintenant que tout le monde a l' |
+ | |||
+ | Si vous ne savez pas si vous auriez cliqué sur des messages comme cela, passez le test de hameçonnage sur Google : https:// | ||
+ | |||
+ | |||
+ | **The guys are getting smarter, the link points to a file transfer server where he/she/it leaves the payload: https:// | ||
Quick ‘n dirty rules to email safety: | Quick ‘n dirty rules to email safety: | ||
Ligne 28: | Ligne 45: | ||
4: Ignore any urgency indicators. If it is urgent, they will call you. | 4: Ignore any urgency indicators. If it is urgent, they will call you. | ||
- | 5. If your email client allows it, turn on headers. | + | 5. If your email client allows it, turn on headers.** |
- | 6. If you use windows, turn ON file extensions. Pay attention to the time email arrives, your friends / work colleagues do not send email at midnight. | + | Ces gens deviennent de plus en plus intelligents ; le lien pointe vers un serveur de transfert de fichiers où il ou elle laisse la charge utile : https:// |
+ | |||
+ | Voici des règles rapides et terre-à-terre pour des messageries sécurisées : | ||
+ | |||
+ | 1. Si c'est possible, bloquez des pays entiers dans vos listes noires, par exemple « *@*.cn » ou « *@*.tk » | ||
+ | |||
+ | 2. Ne jamais cliquer sur un lien. Copiez et collez-le sur un bloc-notes et examinez-le. | ||
+ | |||
+ | 3. Si vous ne connaissez pas la personne ou n'avez jamais traité avec elle, mettez ce mail-là dans un dossier où vous pouvez l' | ||
+ | |||
+ | 4. Ignorez toute indication d' | ||
+ | |||
+ | 5. Si votre client mail le permet, activez les en-têtes. | ||
+ | |||
+ | **6. If you use windows, turn ON file extensions. Pay attention to the time email arrives, your friends / work colleagues do not send email at midnight. | ||
7. Do not open compressed / zipped attachments, | 7. Do not open compressed / zipped attachments, | ||
Ligne 40: | Ligne 71: | ||
10. Make sure your password is long enough. | 10. Make sure your password is long enough. | ||
- | Here is a chart for password cracking on a modern machine. What you need to remember is, that these values can be halved and halved again if computer clusters are used. It is from 2016, so I would assume 21 characters should be the minimum password length, not 18. | + | 6. Si vous utilisez Windows, rendez l' |
+ | |||
+ | 7. N' | ||
+ | |||
+ | 8. Ayez un compte mail pour le boulot, un compte mail personnnel et un compte mail pour les mails indésirables. Gardez les comptes séparés. | ||
+ | |||
+ | 9. Ne répondez pas à des mails indésirables (ni aux mails de hameçonnage). | ||
+ | |||
+ | 10. Assurez-vous d' | ||
+ | |||
+ | **Here is a chart for password cracking on a modern machine. What you need to remember is, that these values can be halved and halved again if computer clusters are used. It is from 2016, so I would assume 21 characters should be the minimum password length, not 18. | ||
So my old password “(NEVER.share.your-p@ssw0rdz!!)” would now need something like a date added to it. Memorable passwords do not have to be difficult. | So my old password “(NEVER.share.your-p@ssw0rdz!!)” would now need something like a date added to it. Memorable passwords do not have to be difficult. | ||
Ligne 47: | Ligne 88: | ||
Now please go take that Google quiz mentioned above and if you do not get 8/8, you need to be more careful. | Now please go take that Google quiz mentioned above and if you do not get 8/8, you need to be more careful. | ||
- | Disagree with us? Let us know on misc@fulcirclemagazine.org | + | Disagree with us? Let us know on misc@fulcirclemagazine.org** |
+ | |||
+ | Voici un tableau concernant le cassage de mots de passe sur une machine moderne. Ce dont il faut vous souvenir, c'est que ces valeurs peuvent se diviser par deux et encore par deux si des groupes d' | ||
+ | |||
+ | Ainsi, mon vieux mot de passe « (NEVER.share.your-p@ssw0rdz!!) » nécessiterait l' | ||
+ | |||
+ | Maintenant, veuillez aller passer le test de Google mentionné ci-dessus et si vous n'avez pas 8/8, vous devrez être plus prudent. | ||
+ | |||
+ | Vous n' | ||
issue164/mon_opinion.1609160363.txt.gz · Dernière modification : 2020/12/28 13:59 de auntiee