Business
Focused
Technology

Crafty Microsoft USB Scam Shows the Importance of Security Awareness Training

Just when you thought scammers couldn’t get more tricky in their attacks, this example will prove you wrong. One of our KnowBe4 colleagues shared this LinkedIn post on a recent very crafty USB scam:

As you can see, the Microsoft USB looks VERY similar to a USB you would receive from Microsoft in the mail as part of an Office Professional Plus delivery. Unfortunately, the USB was plugged into the victim’s computer and ransomware infected the machine.

This should be a valuable lesson for anyone that receives something in the mail that is software – ALWAYS assume that it could be malicious and always double-check with your organization to ensure that it is safe. New-school security awareness training helps your users identify common red flags. New-school security awareness training can help your users identify the common red flags. 

And here is a new blog post by Roger Grimes that digs deeper into this malicious USB problem:
https://blog.knowbe4.com/beware-of-sophisticated-malicious-usb-keys.

Source: LinkedIn

Source: KnowBe4

President, Manufacturing Company

We are high speed and wireless with computer systems for everything we do. I do not worry at all because it has not been an issue since IT360 became a part of our company.

President, Manufacturing Company

Recent
Technology News

IT 360 News
Yahoo Suddenly Rises in Popularity in Q4 to Become the Most Impersonated Brand in Phishing Attacks

Completely absent from the top 10 brands for more than two years, Yahoo’s impersonation may indicate that scammers are looking for new attack angles using lesser-used brands. Yes, of course, Yahoo is anything but insignificant. With revenues topping $8 billion, the search engine giant is still quite relevant today. But in the world of phishing attacks using […]

Read more
IT 360 News
BEC Group Launches Hundreds of Campaigns

A business email compromise (BEC) gang has launched more than 350 attacks against organizations in the US, according to researchers at Abnormal Security. The threat actor, which Abnormal Security tracks as “Firebrick Ostrich,” conducts open-source reconnaissance on their targets in order to construct their scam. “In contrast to other forms of financial supply chain compromise […]

Read more