It was reported earlier this week that a well-used website within the chemicals industry had been fraudulently cloned with the attackers proceeding to contact chemical suppliers under the ruse of the brand. It is not known at this moment in time whether this was an attempt to gain access to chemicals or for financial gain.
Cyber security breaches like these are becoming increasingly common, with seven in ten large businesses reporting a breach or attack in 2017, with those holding electronic data on customers being 51% more likely to suffer an attack than those that do not.
In this particular instance, the website was cloned to an almost identical appearance to the genuine website with the contact numbers and emails being used also very similar. This type of tactic makes it especially difficult to verify, and easy to fall victim to, as everything appears as you would expect it.
今年早些时候,网络安全公司,Norton, reported that in 2017 17million Brits fell victim to cyber crime with hackers managing to pilfer £4.6bn from users. The losses reported weren’t just financial either, of the 17million, each victim then spent on average two days following the attack dealing with the aftermath.
从技术支持骗局,电子邮件网络钓鱼,网站克隆,勒索软件攻击和欺诈性购买中,这些尝试变得越来越复杂,有针对性和令人信服。几年前,很容易通过非人格化的电子邮件,语言的使用不良或外观不寻常的链接来识别骗局,但是,现在,欺诈者的个性化归功于美术,能够制作网站的石膏模具,公司电子邮件,通信和商业固定。
It is therefore important to take the time to check for the tell-tale signs of a suspicious email or website. This advice is fairly obvious, and 99% of businesses follow excellent digital procedures, but it is always worth revisiting the basics to prevent complacency.
Impersonation:The most common way to trick a member of staff into revealing personal data, trust a fake purchase order or download malware is to impersonate a trusted company – this could be a bank, utilities provider, government department or company you regularly do business with.
If you receive an email which you believe is fraudulent firstly check the senders email address. Look out for generic email addresses, such as those from gmail or yahoo, or slightly off variances; for example, if an email you use regularly has suddenly changed from accounts@ to accounts.department@ it might be worth double checking. In all cases however, if in doubt, go to the company directly and phone the main office to request verification.
Suspicious attachments:From purchase orders and invoices, to sales forms and quotes, businesses receive multiple attachments on a daily basis. If you receive an email with an attachment you were not expecting, do not open it. First, check the contents of the email – does it create a sense of urgency, is it generic and not addressed to anyone, is the language unlike what you normally see. Also, check the file extension. Attachments should be documents such as .doc, .pdf, .xls and not extensions that run script or code such as .exe, .msi, .bat, .cmd, .hta, .scr, .application etc. If you see these, best advice is to steer clear unless you're certain it is safe.
Other signs to check for are requests for an urgent bank transfer, or purchase order and invoice fraud where a “supplier” requests that their bank details are changed to a new account for future payments or a new delivery address is set up for large delivery of goods. In these instances, always use verified contact details you have on record to check with suppliers or customers and inform them when payments/deliveries will be made.
In the chemical industry, there isn’t just the risk of financial losses. When dealing with restricted chemicals we have a strong responsibility to ensure there is no room for error and strict procedures are put in place to prevent any wrongful use of the products we supply.
This latest attempt serves as a reminder that we shouldn’t be complacent, as human judgement and error is fundamental to the success or failure of these attacks. We need to keep communications open in our industry and share breaches, attempts and threats, in order to work together and reduce risk.