{"id":6741,"date":"2019-12-11T13:00:26","date_gmt":"2019-12-11T12:00:26","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=6741"},"modified":"2023-06-01T13:16:19","modified_gmt":"2023-06-01T11:16:19","slug":"keeping-you-safe","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2019\/12\/11\/keeping-you-safe\/","title":{"rendered":"Keeping You Safe II &#8211; Our Security Note on Spear-Phishing Attacks"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_6741 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_6741')){$('.twoclick_social_bookmarks_post_6741').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2019\\\/12\\\/11\\\/keeping-you-safe\\\/\",\"post_id\":6741,\"post_title_referrer_track\":\"Keeping+You+Safe+II+%26%238211%3B+Our+Security+Note+on+Spear-Phishing+Attacks\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div>\r\n<p>&nbsp;<\/p>\r\n\r\n<figure class=\"wp-block-image\">\r\n<div id=\"attachment_6742\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6742\" class=\"wp-image-6742\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/phishing-3390518_1920-1024x666.jpg\" alt=\"\" width=\"1024\" height=\"666\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/phishing-3390518_1920-1024x666.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/phishing-3390518_1920-300x195.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/phishing-3390518_1920-768x499.jpg 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2019\/12\/phishing-3390518_1920.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-6742\" class=\"wp-caption-text\">Targeted Phishing: Spear Phishing is a serious threat to our data.<br \/>Source: <a href=\"https:\/\/pixabay.com\/illustrations\/phishing-fraud-cyber-security-3390518\/\">Pixabay<\/a><\/p><\/div>\r\n<\/figure>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>According to the Federal Office for the Protection of the Constitution (BfV), both universities and research institutions are in danger regarding them. What we are talking about here are spear phishing attacks. This is the technical term for very tricky cyber-attacks with targeted e-mails. This time, however, the wave of attacks is particularly vicious: the mails that are sent contain links to realistically simulated fake websites of the particular institutions and request users to enter their access data.<\/p>\r\n<p>&nbsp;<\/p>\r\n\r\n<p><!--more--><\/p>\r\n\r\n<p>In October 2019, the first warning message was already announced due to the situation. Already then, the attackers sent the insidious mails in German. At first glance, they seem deceptively realistic. Only the mail header hinted that something was wrong, as the original mails were supposed to come from a server rented in France. With a well-trained eye, one was able to recognize the fake signatures in the attacker mails or the registration number &#8220;SCO14336&#8221; used almost universally.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Currently, there are indications that institutions in more than 30 countries are affected by Spear phishing attacks. It is likely that German universities will also be affected by this month&#8217;s attacks.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<h3 class=\"wp-block-heading\">So, what should you do?<\/h3>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>First and foremost, it is important to be sensitized to such attacks. Under no circumstances, you should open links or even enter data on corresponding websites.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>If you receive dubious e-mails, which sound very similar, you should contact us as soon as possible. This way you can help in protecting others from data theft.<\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>You are curious and want to know more about Spear-Phishing attacks? Click here: <a href=\"https:\/\/www.secureworks.com\/blog\/cobalt-dickens-goes-back-to-school-again\">https:\/\/www.secureworks.com\/blog\/cobalt-dickens-goes-back-to-school-again<\/a><\/p>\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n<p>Responsible for the content of this article is Liza Schwarz.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":1413,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[314,315],"tags":[61,70,49,74],"class_list":["post-6741","post","type-post","status-publish","format-standard","hentry","category-it-sicherheit","category-services-support","tag-it-sicherheit","tag-phishing","tag-spam","tag-spearphishing"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/6741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/1413"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=6741"}],"version-history":[{"count":8,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/6741\/revisions"}],"predecessor-version":[{"id":15945,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/6741\/revisions\/15945"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=6741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=6741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=6741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}