Nigerian Man Charged in Hacking of Los Angeles County Emails (theguardian.com) 44
A 'mere' 10.8% phishing success rate has forced Los Angeles County to notify approximately 756,000 individuals that their personal information may have been compromised. The attack occurred on May 13, 2016 when 1,000 County employees received phishing emails. 108 employees were successfully phished. A Nigerian national has been charged in connection with the hack. From a report on The Guardian: Many large organizations would welcome a 10% success rate in their internal anti-phishing training sessions, with 30% and above being common. The 2016 Verizon DBIR suggests that 30% of all phishing emails are opened. The high number of individuals affected from a relatively low number of successes in LA County demonstrates how dangerous phishing attacks can be. The nature of the potentially compromised information is also concerning. "That information may have included first and last names, dates of birth, Social Security numbers, driver's license or state identification numbers, payment card information, bank account information, home addresses, phone numbers, and/or medical information, such as Medi-Cal or insurance carrier identification numbers, diagnosis, treatment history, or medical record numbers," said the County of Los Angeles Chief Executive Office in a statement.
Must be Russian (Score:3, Funny)
A Nigerian man caught hacking?
He must be Russian.
Re: (Score:2)
Re: (Score:2)
Ergo, without California, Trump's nation-wide deficit of 2,833,220 votes becomes a 1,436,758 surplus. Just as I said.
Could that Nigerian asshole have had anything to do with Hillary getting so many more votes in CA than in the rest
Re: (Score:1)
California is liberal hippy land, the bluest state in the nation, of course it went overwhelmingly for Clinton. I don't see you questioning the fact that Trump overwhelmingly won the popular vote in, say, super-red Oklahoma.
Nigerian hacking? (Score:2)
So did President Muhammadu Buhari of Nigeria have had any reason to prefer Trump? He's Muslim, so if anything else, he should have wanted to rig the election for Clinton: break into RNC emails and expose attempts by Cruz to steal delegates disproportionate to the votes, making all Republicans wanna vote for Hilary
Re: (Score:2)
Onion News? [Re:Must be Russian] (Score:1)
I always considered the "Nigerian Prince" thing to be a complete joke; for the spammers can claim to be anybody from any country such that the Nigerian connection here sounds dodgy.
What's next, the butler actually did it?
Re: (Score:2)
Which would explain, why Hillary Clinton [aim.org] got 4 million votes more in California, than Trump...
Re: (Score:1)
If you know of spam filters that are 100% reliable, or even 99%, we'd like to know about them.
There are vast networks of people around the world who are paid to get around spam filters and try to stay one step ahead of them. The filter companies will usually take at least a couple of hours to identify new spam patterns and set up filtering criteria, and it may take yet longer to propagate the patterns to the customers' spam catalogs.
Prince? (Score:2, Funny)
I bet it was a Nigerian prince they caught.
Re:Prince? (Score:5, Funny)
Re: (Score:2)
You can get it back by sending your bank account info to InstantRefund@sucker.foo
Re: (Score:2)
What happened to diplomatic immunity?
So what about the county's responsibility. (Score:3)
So big hurrah for LA Counties judicial system. I am frustrated however that no entity be it private corporate, or municipality has simply said protection of our information shall come first. This thought that let's just contract with (insert name provider, likely Microsoft) for an off the shelf solution which clearly isn't secure is absurd. Now I am also not saying some municipality pay a contractor to custom design a system, we know which way that will go (see link).
DWP billing system errors add $245 million to uncollected debt
http://www.latimes.com/local/c... [latimes.com]
Am I the only one who thinks all 'secure' networks should be on a isolated protocol e.g. email be only text with no public network dependent information. user systems with no access to the internet, and no user level login on public devices including your phone.
The price being paid for the convenience of looking up bread pudding recipes from your work station (or ranting on /. for that matter) is simply too high. Just a thought.
Re: (Score:1)
Rank [Re:So what about the county's responsibil (Score:2)
My experience with similar orgs is that the executives want instant connectivity, even when at home or at "important" conferences (cough cough). The executives out-rank most IT security personnel, and thus if they want risky toys/access, they get risky toys/access.
County government is very rank-sensitive. Logic is secondary to rank. Powerful idiots are dangerous.
But that means no cat videos... (Score:2)
Oh, the felinity!
Re: (Score:2)
That only moves the bar slightly. Information still needs to get in and out. If it's not done via the internet, then it'll be network shares, USB Flash drives, or similar, and that's where the malware will develop. The data it collects will eventu
Re: (Score:2)
On the contrary, my issue is with the client not the protocol. A good client will sterilize any links or downloads and present the information in text only format. File transfers will get handled similar to google approach (need to confirm) but the file is scanned server side then made available via a server link which cannot extend to the internet. Lastly user stations have no access to the internet, likewise any systems which phone home are identified immediately and shut down.
Anti-Phishing Training (Score:5, Interesting)
My company HR sent notice of required anti-phishing email training.
- The email came from someone I never heard of.
- It contained a link to an external website.
- And the external website required we log in with our domain credentials.
I ignored the notices for weeks until my boss came to my desk and made me do it. Just unbelievable.
Re: (Score:2)
Re: (Score:3)
I had similar (and I think 12 monkeys *might* be right...)
I added the domain to our blacklist within a minute of getting the e-mail. Chaos and hilarity ensued.
I regret nothing.
-nB
Re: (Score:2)
I had the opposite happen to me once.
As the webmaster, I got a vague notice something like, "To whom it may concern, please remove item X from your commerce site. The site in question is not authorized to sell X. Contact us at [phone and email] immediately to resolve this!"
I dismissed it as spam/phishing because it had no specifics. It was like a form-letter (generic template). It didn't mention or our site URL nor identify the page and date spotted.
A few weeks later some angry lawyers called our org and co
Re: (Score:2)
Just wait until someone with a security clearance is contacted by an alleged outside contractor [slashdot.org] doing an "investigation". The f[censored]ing FBI can't even keep people from running around with fake badges, claiming to be agents.
Re: (Score:3)
My company HR sent notice of required anti-phishing email training.
- The email came from someone I never heard of.
- It contained a link to an external website.
- And the external website required we log in with our domain credentials.
I ignored the notices for weeks until my boss came to my desk and made me do it. Just unbelievable.
Been there, done that. As you say, just unbelievable.
Re: (Score:2)
I see this with huge security companies too. Others and I facepalmed to mention this. :(
Evolution (Score:2)
Set up a rule for external email? (Score:3)
Our company set up our mail system to insert this line into ANY incoming external email. Has helped us a LOT with reducing the impact of phishing emails...along with filtering known phishing domains......
>>Attention: This email was sent from someone outside of [your company name here]. Always use caution when opening attachments or clicking links from unknown senders or when receiving unexpected emails.
Re: (Score:2)
Not a bad suggestion, thanks.
We do phishing audits here 2-3 times a year. We always get a click through of between 7 - 25% no matter how much training we do.
Of course, when we devise our tests, we try to be as sneaky as the bad guys are likely to be while still providing enough tells to make it identifiable as a phishing e-mail.
Our most recent effort is in mitigation since we are probably never going to get to 0% click through.
We have been using OpenDNS for a while to help with that. We utilize L7 rules to
I'm so excited, I'm getting my $100,000 check soon (Score:2)
What A ... (Score:1)