Election Season Scams Target Civic-Minded Citizens

election-scam.PNG

On November 6th, citizens will cast their votes for governors, state officials, or members of Congress, either continuing to support the incumbent or opting to make a change with a new candidate. In any event, the work of campaigning and elections are big business…especially for scammers.

With so much discussion about the mid-term elections, thieves have launched a wide variety of election season scams to steal personally identifiable information, financial resources, or both.

1. Phishing attempts – Candidates and political parties rely on emails and phone calls to connect with voters, and scammers are using the same tactics. By posing as members of a campaign, scammers target their victims with phony donation requests, fake news articles that encourage them to click and input their information to read, and more. The goal in these scams isn’t just money, but also access to your personal data.

2. Donation requests – It takes a lot of money to put on an effective campaign, so political candidates often request donations, host fundraisers, and more. Thanks to online platforms, candidates or their team members can request money via social media and platforms like GoFundMe or PayPal. However, the natural mechanism that allows candidates to do that effectively also means a scammer can do it, too. Be on your guard for similar names, “patriotic”-sounding organizations, and issue or party-centric groups that are not actually affiliated with anyone campaigning.

3. Fake robocalls – There have already been reports of robocalls associated with particular candidates for promotional purposes, and remember, charitable organizations and political ads are two of the categories that are exempt from the Do Not Call registry. However, some of the robocalls have not only been spoofed or use stolen recordings of the candidates, but some of them have also even been highly offensive and designed to get the listener to interact.

So how are you supposed to protect yourself from elections season scams? By using the exact same good habits that are designed to keep you safe from scams throughout the year. Never give out your information or verify your identity to someone who contacts you; never make a spur-of-the-moment donation or spontaneously pay a fee, fine, or bill; remember that anyone can create an email account or website, and it doesn’t take any effort or know-how to copy or mimic an existing organization.

Election Hacking: How to Keep Your Vote Secure

election-hacking.PNG

As an individual voter, there is very little you can do to keep your own vote secure and safe from hacking, manipulation, or fraud. The most effective action you can take, if this subject is important to you, is to contact the elected officials in your area who are actually responsible for securing elections against hackers and raise your concerns.

On a personal level, here are some tips to secure your vote and make sure it counts:

If you vote via paper ballot and optical scanner:

  • Read the instructions on your ballot, and make sure that you mark the ballot in the required fashion.

  • If given the option, scan the ballot yourself. Do not leave the ballot scanner until you see that your ballot was accepted.

  • If not given the option to scan your ballot, ensure that your ballot is placed into a tamper-proof container by poll workers.

If you vote via a DRE voting machine:

  • Familiarize yourself with the touchscreen, push-button, or dial controls.

  • As you vote, pay close attention to each screen, and make sure the machine is correctly registering your choices.

  • If provided with a confirmation screen, carefully go through the list to make sure that it lines up with the choices you made.

  • Ask poll workers if the machines are equipped with a voter-verifiable paper trail. If they are, make sure to examine your ballot receipt carefully when you are done voting. If it doesn't match the actual choices you made, you may be able to mark it spoiled and try again. If it still doesn't match, bring it to the attention of poll workers. The machine may be calibrated improperly.

If you vote via mail:

  • Voting via the mail is generally considered to be secure, as the primary vector for attack involves stealing and altering ballots after they have been placed in a mailbox or drop box.

  • If possible, avoid putting your ballot in an unsecured personal mailbox.

  • Use a secure mailbox if possible, or take your ballot to a designated drop off point.

Cathay Pacific Hacked, Compromising the Data of Millions of Passengers

Cathay-Pacific.jpg

Cathay Pacific Airways Limited, the flag carrier of Hong Kong, admitted having suffered a major data leak affecting up to 9.4 million passengers.

Exposed data includes passport numbers, identity card numbers, email addresses, and credit card details were accessed, information exposed varies for each affected passenger.

“As part of our ongoing IT security processes, we have discovered unauthorized access to some of our passenger data.  Upon discovery, we took immediate action to contain the event, and further strengthen our IT security measures.” reads the official statement published by the airline.

The IT staff at Cathay discovered an unauthorized access of systems containing the passenger data of up 9.4 million people. Hackers also accessed 403 expired credit card numbers and twenty-seven credit card numbers with no CVV were accessed.

The company is notifying the affected passengers through multiple channels.

“We are in the process of contacting affected passengers, using multiple communications channels, and providing them with information on steps they can take to protect themselves,” said Cathay Pacific Chief Executive Officer Rupert Hogg.

“We have no evidence that any personal data has been misused.”

“The following personal data was accessed: passenger name, nationality, date of birth, phone number, email, address, passport number, identity card number, frequent flyer programme membership number, customer service remarks, and historical travel information.” Hogg added.

The company immediately reported the incident to the authorities and launched an investigation.

At the time there is no news about financial compensation for affected passengers.

Anyone who believes they may be affected can contact Cathay Pacific in the following ways:

  • Via the dedicated website – infosecurity.cathaypacific.com – which provides information about the event and what to do next

  • Via Cathay Pacific’s dedicated call centre available after 12:30/25OCT (GMT+8) (toll free numbers are available on infosecurity.cathaypacific.com)

  • Email Cathay Pacific at infosecurity@cathaypacific.com

5 Most Prevalent Phishing Subject Lines

phishing.PNG

Chances are good there's a phishing scam lurking amid your emails right now. If there isn't, then perhaps there will be tomorrow, or the next day. The question is, will you fall for it?

Phishing emails are getting tougher to block because attackers are crafting their bait to be more convincing to targets, researchers report. And employees are quick to open potentially malicious emails, even when they know they should be on alert.

Here's a look at the most commonly used phishing subject lines, the messages they include, and what they reveal about their attackers' goals and tactics.

'Assist Urgently'

Attackers convey a sense of immediacy when they don't want targets to dwell on their choice to act. It's something they want you to make a decision on quickly.

Maybe the note won't say "assist urgently," but a similar prompt for employees. Related subject lines he commonly sees include "Review" or "Quick Review," both of which demand a person to take action. 'Important: (1) NEW message from' is another popular one.

'Invoice'

"Invoice" is seen in six of the top ten phishing subject lines detected. Financial motivation is far in the lead when considering phishing subject lines.

While the top six scams differ in message content, all try to lure their targets with the word "invoice" as the subject line. Money is a powerful motivator. Attackers know it, and they're using it to their advantage.

'Verify Your Account'

This subject line has less to do with direct financial gain and more to do with credential theft. While there may be a financial component to these types of attacks, credential phishing is typically done to gain a foothold inside a target network.

When talking about this idea of credential phishing, 'verify account' is designed to get you on a landing page to validate your credentials. Attackers want your username and password. To get them, they might try to impersonate a brand you frequently use.

'AMAZON: Your Order no #812-4623 might have ARRIVED'

These types of emails are frequently seen around the holidays. Certain types of attacks were more prevalent during different times of the year: financial and tax-related scams arrived around tax season, and fraudulent messages about deliveries show up at Christmastime.

Most people who frequently shop on Amazon will investigate emails like these to see which order it's referring to, or remind themselves of what they purchased. They'll click the link to see what they ordered, and they realize they've already infected their machine.

'Copy' or 'Document Copy'

While malicious links are increasingly commonplace in phishing emails, attachments continue to be popular – and effective – especially in emails related to invoices, payment notifications and statements, or alerts associated with online ordering and billing.

This aligns with the trend of attackers improving their understanding of business context. If they know employees frequently send documents, they know a malicious spreadsheet or Word file won't seem out of place.

The fact that many phishing subject lines are short – only one or two words – is indicative of attackers' understanding that modern business communication is relatively informal. People in a business context do things in a hurry. It doesn't have to be specific.

Your Facebook Account Has Not Been 'Cloned'

scam.PNG

Facebook users are being duped into thinking that their accounts have been cloned thanks to a viral message that made the rounds of the social networking site on Sunday.

The message says that the sender has received a duplicate friend request from the recipient. Then, it tells the receiver to forward the same message to their friends. Many have apparently taken that to mean that they should forward the same message to all of their friends, prompting dozens or even hundreds of others to believe that there may be a problem with their accounts as well.

The message hints that the receiver may have been the victim of a cloning scam. That’s where a malicious user copies images and information from a person’s Facebook account in order to create a duplicate “clone” account, then sends out friend requests to the victim’s friends. The duplicate user may message these friends in an attempt to learn personal information about the cloned user or to spread scam messages.

There appears to be no reason at this time to forward a message telling friends that their account may have been cloned without having actually received a duplicate friend request.

So what should you do if you receive one of these hoax messages? Nothing. Delete the message and move on.

If you are worried you might be the victim of Facebook cloning, try searching for other versions of your account and report duplicate profiles to Facebook.