National Cyber Awareness System: 08/01/2015 06:01 PM EDT
Original release date: August 01, 2015
Systems AffectedMicrosoft Windows Systems, Adobe Flash Player, and Linux OverviewBetween June and July 2015, the United States Computer Emergency Readiness Team (US-CERT) received reports of multiple, ongoing and likely evolving, email-based phishing campaigns targeting U.S. Government agencies and private sector organizations. This alert provides general and phishing-specific mitigation strategies and countermeasures. DescriptionUS-CERT is aware of three phishing campaigns targeting U.S. Government agencies and private organizations across multiple sectors. All three campaigns leveraged website links contained in emails; two sites exploited a recent Adobe Flash vulnerability (CVE-2015-5119) while the third involved the download of a compressed (i.e., ZIP) file containing a malicious executable file. Most of the websites involved are legitimate corporate or organizational sites that were compromised and are hosting malicious content. ImpactSystems infected through targeted phishing campaigns act as an entry point for attackers to spread throughout an organization’s entire enterprise, steal sensitive business or personal information, or disrupt business operations. SolutionPhishing Mitigation and Response Recommendations
Educate Your Users Organizations should remind users that they play a critical role in protecting their organizations form cyber threats. Users should:
Basic Cyber Hygiene Practicing basic cyber hygiene would address or mitigate the vast majority of security breaches handled by today’s security practitioners:
Further Information For more information on cybersecurity best practices, users and administrators are encouraged to review US-CERT Security Tip: Handling Destructive Malware to evaluate their capabilities encompassing planning, preparation, detection, and response. Another resource is ICS-CERT Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies. References
Revision History
This product is provided subject to this Notification and this Privacy & Use policy. |