Alexander Dvoryansky, Director of the Information Security and Special

Explore discuss data innovations to drive business efficiency forward.
Post Reply
tanjimajuha20
Posts: 575
Joined: Thu Jan 02, 2025 7:18 am

Alexander Dvoryansky, Director of the Information Security and Special

Post by tanjimajuha20 »

Yaroslav Kargalev, head of the cybersecurity center at the Russian developer of cybercrime prevention software FACCT, noted that emails with a similar template were distributed in early August 2023: "We have already recorded phishing emails sent on behalf of an investigator. They ask the recipient to read the materials of a criminal case in which he is a witness, and provide a link to a file-sharing site. The attackers placed a file with malware there to make it france whatsapp resource difficult for many email security solutions to analyze. The behavior and actions of the attackers are no different from ordinary daily email correspondence. Well-trained cybercriminals conduct reconnaissance, collect information about the intended target. Therefore, their letters can be convincing, and the victim expects to receive exactly this kind of letter, it will not look suspicious. In addition, attackers often use the news agenda to increase the likelihood of success."

Solutions Department at Sitronics Group, recommends creating several email addresses for security purposes: "Since user data is most often leaked after online activity, a good rule would be to create a separate email for online purchases and use for online contacts. This way, you can protect your main email, where important confidential information may be stored. I would also like to remind you of the importance of information hygiene on the Internet: do not indicate your email address on various Internet resources without necessity - surveys, questionnaires, IQ tests, etc. In loyalty programs or when filling out contact information on various sites, I recommend indicating an email address separate from the main one."

Petr Kutsenko, head of the R-Vision Endpoint component of the R-Vision cybersecurity systems development company, reminded us of the signs by which suspicious emails can be identified: "To protect against such attacks, you need to be attentive when reading emails and pay attention to any suspicious signs - for example, misspelled words or grammatical errors. In addition, it is important to increase knowledge and the degree of mistrust of new contacts. Look carefully at the URL when clicking on a link. If there is a discrepancy, this should alert you. And most importantly, you should not provide personal data and passwords in response to emails."
Post Reply