Skip to main content

KAMPANYE PHISHING MELALUI kode QR - PHISHING CAMPAIGN VIA QR codes

KAMPANYE PHISHING MELALUI kode QR  -  PHISHING CAMPAIGN VIA QR codes

Dalam Laporan Wawasan Ancaman Keamanan HP Wolf triwulanan terbaru, HP mencatat peningkatan kampanye phishing melalui kode QR.

Peretas, menggunakan rekayasa sosial, memikat pengguna untuk memindai kode QR dari PC mereka menggunakan perangkat seluler, karena seringkali kurang aman dibandingkan PC.

Setelah dipindai, kode QR mengarahkan pengguna ke situs web jahat yang berpura-pura menjadi situs resmi untuk mendapatkan informasi kartu kredit atau debit korban atau memasukkan virus atau worm ke dalam perangkat, yang kemudian akan menginfeksi PC atau jaringan komputer korban.

Pelajaran yang dapat diambil dari hal ini adalah bahwa perangkat seluler harus diberikan perlindungan yang sama dengan instalasi tetap.

Inilah mengapa penting untuk melindungi instalasi apa pun dengan memasang firewall generasi baru pada titik masuk ke Internet sehingga tidak ada data yang memasuki jaringan dapat lolos dari pengawasan firewall pada apa pun yang masuk atau keluar dari jaringan.

Dengan demikian, perangkat seluler yang terhubung ke jaringan wifi yang dilindungi oleh firewall generasi baru seperti ARCHANGEL 2.0 dari PT SYDECO, akan terlindungi serta perangkat yang tersisa di jaringan tersebut.

Oleh karena itu, meskipun orang yang menjadi target serangan mengklik tautan yang muncul saat QR code dipindai, malware yang dikirimkan kepada mereka akan dipindai dan diblokir oleh firewall generasi baru.

Namun hal ini tidak menghalangi Anda untuk waspada dan tidak memindai kode QR dengan permintaan sekecil apa pun tanpa memastikan bahwa perangkat seluler yang digunakan untuk melakukannya terlindungi dengan baik.

Mencegah lebih baik daripada mengobati, karena kesembuhan tidak pernah dijamin 100%.

 

Aucun texte alternatif pour cette image

 

PHISHING CAMPAIGN VIA QR codes

In the latest quarterly HP Wolf Security Threat Insights Report, HP notes an increase in phishing campaigns via QR codes.

Hackers, using social engineering, are luring users to scan QR codes from their PCs using their mobile devices, as these are often less secure than PCs.

Once scanned, the QR codes direct users to malicious websites that pretend to be official sites in order to obtain the victim's credit or debit card information or to introduce viruses or worms into the device, which will then infect the victim's PC or computer network.

The lesson that can be drawn from this is that mobile devices should be given the same protection as fixed installations.

This is why it is useful to protect any installation by installing a new generation firewall at the point of entry to the Internet so that no data entering the network can escape the scrutiny of the firewall on anything entering or leaving the network.

Thus, the mobile device, which is connected to the wifi network protected by a new generation firewall such as PT SYDECO's ARCHANGEL 2.0, will be as well protected as the fixed devices on the network.

Indeed, even if the person targeted by the attack clicks on the link that appears when the QRCode is scanned, the malware sent to him will be scanned and blocked by the new generation firewall.

But this does not prevent you from being vigilant and not scanning a QR code at the slightest request without ensuring that the mobile device used to do so is well protected. 

Prevention is better than cure, because the cure is never 100% guaranteed.

#QRcode #Malware #cybersecurity #GSM #Iphone #Firewall #Virus #Archangel

Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which