The ‘USB to Ego’ Attack
A brief backstory first, to set up the attack. I arrived at the end of Honda’s FCEV launch, extra unfortunately, because there was water involved, a simulated rainstorm, rare. Like the guy mopping up...
View ArticleTiiiiis the Season for Natural Disguises
Fa-la-la-la-laaa lala get some. It’s a Christmas wreath, obscuring the licence plate. Jokes aside, scammers love this time of year. People’s hearts are more giving and trusting than usual, because tis...
View ArticleLinkedIn Invites are Great for Spreading Malware
Fake LinkedIn invitations are one of the most effective methods of getting a human to click a malicious link. This type of attack, a phishing attack (or a more targeted, spear phishing attack) works...
View ArticleFlower Delivery
“Flower”. “Delivery”. The post Flower Delivery appeared first on KeriBlog.
View ArticleShould’ve Been a Pentester
The post Should’ve Been a Pentester appeared first on KeriBlog.
View ArticleNever Call when This Happens
Kind’ve clever eh: a real-sounding URL, “Support for Apple”, and a toll-free number, how nice for someone else to foot the bill. The Attack Pop-up window appears > you call the number > whomever...
View ArticleAnalzying a Vishing Attack
There’s a CRA (Canada Revenue Agency) scam going around right now. I received a call from “Roger” at the CRA this week, asking me verify my current address. Let’s analyze at the attack. The Attack...
View ArticleDon’t Get “Vished”– Attacked via the Phone
Basically – the phone is used as an attack vector to get information. Vishing – attacker calls you and extracts sensitive information you’d otherwise not share This type of psychological attack takes...
View ArticleWatch Out for On-site Impersonation Attacks
When a stranger shows up to your place of business, don’t take it at face value they are who they claim to be. The Attack By exploiting people’s trust, manners, and our social nature to be helpful,...
View ArticleA Multi-Staged Attack Works Well
A Multi-Staged Attack – usually a phishing email, followed up by a phone call. It works because like Michele says… … “if it comes from more than one source, it must be true.” The Attack A call will...
View Article