Cyber Security Today, August 24, 2022 – Watch your cyber insurance coverage, threat actors abusing SaaS platforms and more

Watch your cyber insurance coverage, threat actors abusing SaaS platforms and more.

Welcome to Cyber Security Today. It’s Wednesday, August 24th, 2022. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

 

If your organization can afford the increasingly tough requirements and the cost, cybersecurity insurance is an important component of its risk mitigation strategy. But watch the fine print. The cybersecurity news site called The Record reports that Lloyds of London, which underwrites the cyber policies of a number of insurance companies, is requiring providers to make it clear it won’t cover damages “arising from a war” or state-backed cyberattacks that significantly impair the ability of a state to function. Starting next April policies have to make that clear. The story quotes one insurance firm saying policies already exclude acts of war from coverage. But a university professor is quoted as saying the change almost equates state-backed cyber-attacks — which are common — to acts of cyberwar.

Still with cyber insurance, make sure you understand the intricacies of your policy. Consider this recent story. A Minnesota computer reseller was tricked into wiring nearly US$600,000 to a crook’s bank account. The company made an insurance claim under its social-engineering fraud agreement. However, the damages under that clause were limited to US$100,000. There was a separate clause covering computer fraud where damages could be covered up to US$1 million. The company tried and failed to change its claim. Then it sued the insurance company. Earlier this month a judge dismissed the lawsuit, ruling the incident was in fact social-engineering fraud.

Commentators at the SANS Institute said this is an example of why reading the fine print of a policy is important. They also argue that having multifactor authentication would have made it harder for the attacker to compromise the computer company’s purchasing manager, where this scam started. And not having a formal company payment approval process was a contributing factor to the scam.

Software-as-a-service platforms like website builders, file sharing sites, note-taking sites, design prototyping and form builders need to tighten their security, say researchers at Palo Alto Networks. That’s because threat actors are using these platforms to host their phishing pages instead of building their own. A crook sends out an email for a payment or says a sender has a document to share, asking the victim to click and see it. When they do they go to a web page that asks for their username and password. That gets captured by the crook. The trick is the URL or web address of platforms used by crooks, aren’t seen as suspicious by phishing detection applications because they’re on an accepted SaaS platform. It’s important that security teams educate staff to be careful before logging into online platforms, particularly if they go there from an email.

Organizations that use Gmail, Yahoo Mail and Microsoft Outlook need to ensure their staff use strong passwords and multifactor authentication to protect their accounts if they haven’t already done so. This warning comes after the discovery by Google’s Threat Analysis Group of a new email exfiltrating tool used by an Iranian-based threat group dubbed Charming Kitten. If the group is able to steal or guess a victim’s username and password the tool can spoof the account to look like an outdated browser, which enables a basic HTML view in Gmail. Then the tool downloads the contents of the victim’s inbox, marking them as unread so the victim isn’t tipped off. So far it’s been used against targets in Iran, but the threat actor could use it against people in other countries.

Finally, the privacy of Apple iPhone and iPad users may be at risk if they don’t take care when they open links to third-party sites and ads on sites they visit. That’s according to security researcher Felix Krause. This gets a bit technical, so bear with me: If you go to a webpage on your phone and click on a link that goes to another site, that page opens up in a custom browser inside the original app, and not on a new Safari browser page. That leaves the custom browser open to being injected with JavaScript code that can steal information. This second browser is called an in-app browser. If you want to be careful, made sure the in-app browser opens sites in the Safari browser, which is safer. There should be a button or option that allows you do to that so you can escape the in-app browser.

That’s it for now Remember links to details about podcast stories are in the text version at ITWorldCanada.com.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Sponsored By:

Cyber Security Today Podcast