Like the virus itself, scam emails claiming to be related to coronavirus are everywhere and spreading fast, preying on the public’s panic and an insatiable hunger for the latest information, government guidance, death toll, and news of infected celebrities.
There’s nothing new about the techniques being adopted by threat actors here, but then again, these aren’t normal circumstances. Where only a few months ago you’d have automatically deleted an ‘URGENT: CLAIM YOUR HMRC VIRUS RELIEF FUNDING NOW’ email because it’s clearly spam, uncertain times make people desperate for all the help and guidance they can get. For those who are currently out of a job because of the restrictions, emails like this can be seen as a welcome lifeline that they’re more than happy to comply with. Threat actors are all too aware of this, and see it as an easy way to get the personal and financial information that might otherwise require more subtlety and skill to obtain.
So in these panicked times where the general public isn’t functioning with quite the same level of online vigilance as it once was, here are five key tell-tale signs of a scam to look out for in every email you receive, especially those that claim to relate to COVID-19.
- It’s sent from a public domain
You’re never going to be sent legitimate pandemic control advice from coronavirus.info@gmail.com. Real companies have their own domain, so always check the email is from who it appears to be from – look at the email address itself, not just the displayed sender’s name. - The email address is misspelled
HMRC sending you information on how to claim virus tax relief from the domain hrmc.gov.uk? Nice try. It’s a trivial task for attackers to create a new domain that looks almost identical to the real deal, but with a substituted letter or small misspelling that would go unnoticed at a glance. Always double check the spelling of the domain the email claims to be from. - It’s not exactly Shakespeare
Unlike targeted, well-researched spear phishing emails, blanket scam emails sent to thousands of people in a hurry are often poorly written with questionable grammar. All the words might be spelled correctly but more often than not, there will be syntactical and grammatical errors peppering the email text that will give it away. - There are dodgy extras
Does the email have an attachment or link that feels suspicious or unnecessary? Curiosity will not do you any favours here. Why would pandemic mitigation advice be in an attachment, not the body of the email? Why doesn’t the link URL match the domain of the company the email claims to be from? And why do they need you to log in? Is this VPN installer you’re being told to download actually from your IT department? Red flags aplenty and you know it. - It’s urgent
The only urgent thing about coronavirus is the need to stay at home, wash your hands, and maintain social distancing. And that’s not even urgent any more, it’s common knowledge. Asking users to act now before it’s too late is an obvious route to go down with COVID-19 advice, because it preys on the public’s heightened panic and desire for instant gratification and answers.
It’s human nature to care more about information we can personally relate to. It’s also a strange quirk of human nature that we’re fascinated by disease and death. It didn’t take long for cyber attackers to exploit this morbid curiosity by weaponising a map showing the numbers of coronavirus cases across the world as a means to distribute malware when opened. Of course you’d want to know if your neighbours had a highly-infectious and potentially deadly virus, wouldn’t you?
Keeping yourself safe from email scams
Impersonating authoritative bodies we should all be taking advice from at this unusual time – i.e. the government, NHS, and WHO – is a simple attack method that’s unfortunately very effective. Here are three ways you can keep yourself safe from those looking to capitalise on fear and doubt:
- Be suspicious. Of everything
Being cautious never caused a data breach. - Be careful what you click, especially shortened URLs
If you can’t see the full destination of a URL, how can you be sure it’s legitimate and safe? - Downloading something for work? Ask your IT team first
Your IT department would much rather you check a legitimate download with them than risk downloading malware.
There are cyber attackers out there who are more than happy to profit from COVID-19 and the public’s collective fear and panic about it. Don’t make it easy for them – keep yourself as safe online as you are in person.
And yes, we are fully aware how similar our name is. Thanks for pointing it out.
More CORVID blog posts
Managed Detection and Response (MDR) vs. Vulnerability Scanning
Managed Detection and Response (MDR) vs. Vulnerability Scanning
The world of cybersecurity is constantly evolving, with advanced technologies spearheading new ways to protect key assets from cyber threats. Some of the latest tools in the trade include managed detection and response (MDR) and vulnerability scanning, which are both used as part of a company’s cybersecurity posture. They are unique, though, and understanding their key features can help inform you about how these two tools function and how they compare.
What is Managed Detection and Response (MDR)?
Managed detection response (MDR) is a comprehensive cybersecurity service that provides organisations with round-the-clock monitoring and proactive management of threats. It combines technology, processes and expertise to detect, analyse, and respond to cybersecurity incidents. The primary goal of MDR is to quickly identify and mitigate threats before they can cause significant damage.
Key Features of MDR
Although some MDR services will offer additional functionality or customisation, in a general sense they all share a few key features. Some of the hallmark features found in MDR services include:
- Continuous Monitoring: MDR services ensure that the organisation’s networks, systems, and data are continuously monitored for any signs of malicious activity or security breaches.
- Expert Analysis: MDR providers employ cybersecurity experts who specialise in analysing complex threats. This team works as an extension of an organisation’s in-house IT team, providing advanced threat intelligence and analysis.
- Incident Response: Perhaps the most critical aspect of MDR is its capability to respond to threats in real time. MDR teams can take immediate actions such as isolating affected systems, removing malware, and restoring services to mitigate the impact of attacks.
What is Vulnerability Scanning?
Vulnerability scanning is a diagnostic procedure used to identify vulnerabilities in networks, systems, and software applications. It involves automated tools that scan for known vulnerabilities, providing organisations with insights into security weaknesses that could potentially be exploited by hackers.
Key Features of Vulnerability Scanning
As with MDR services, vulnerability scanning is comprised of a few key features that make it stand out as a unique service. These include:
- Regular Assessments: Vulnerability scans are typically performed on a regular schedule (e.g., weekly, monthly) to ensure that new vulnerabilities are identified promptly after they become known.
- Automated Tools: These scans are largely automated, utilising software that compares system details against databases of known vulnerabilities.
- Reporting: The output of a vulnerability scan is a report detailing vulnerabilities found, rated by their severity and the urgency with which they should be addressed.
MDR vs. Vulnerability Scanning: Focused Objectives
While both MDR and Vulnerability Scanning are essential, they serve different security objectives and operational focuses. So, although they exist in the same ecosystem, when rolled out they perform quite different functions. Below is a general overview of how these two solutions compare:
Proactive vs. Reactive Approaches
MDR is inherently proactive and dynamic. It aims to both detect ongoing threats and also respond to incidents as they happen. This approach is key for defending against advanced persistent threats and coordinated attacks.
Conversely, vulnerability scanning is more reactive. It identifies and reports existing vulnerabilities, relying on the organisation to take further steps to patch these vulnerabilities and prevent potential exploits.
Scope of Service
MDR offers a broader scope by dealing with a wide range of cyber threats, including malware, ransomware, and insider threats. It provides a holistic view of an organisation’s cybersecurity health.
In contrast to this, vulnerability scanning focuses specifically on discovering vulnerabilities in systems and software. It does not deal with the actual management of detected threats.
Expertise and Resources
MDR typically requires a high level of expertise from cybersecurity professionals who can interpret complex threat data and make quick decisions about mitigation strategies. While it also requires expertise, particularly in setting up and maintaining the scanning tools, the level of active management and threat handling is considerably less intensive with vulnerability scanning than MDR.
Which Choice is Right for Me?
Deciding whether to implement MDR, Vulnerability Scanning, or both depends on several factors including your organisation's specific needs, current cybersecurity posture, and the nature of the data you are protecting. Here are some considerations to help determine the right choice for your business:
Assess Your Cybersecurity Needs
If your organisation handles sensitive data, such as personal customer information, financial records, or proprietary business data, MDR might be indispensable due to its real-time threat detection and response capabilities. For organisations that must comply with regulatory frameworks such as GDPR, MDR can provide the necessary tools to not only detect but also respond to incidents in a manner that meets legal standards.
Analyse Your Current Cybersecurity Posture
Businesses with already established cybersecurity measures, including advanced firewalls, intrusion detection systems, and regular security audits, might find that adding MDR enhances their current capabilities. In comparison, companies without these layers might benefit from starting with vulnerability scanning to address fundamental security weaknesses.
It’s also worth considering the level of cybersecurity expertise available within your company. MDR services often come with a team of experts who effectively become an extension of your in-house team, filling in any gaps in knowledge and resources. If your team lacks cybersecurity specialists, MDR can bridge that gap.
Evaluate the Level of Threat
Certain industries are more likely to be targeted by cyberattacks due to the nature of the data they handle or the services they provide. For example, financial services, and healthcare sectors often require robust defence mechanisms like those provided by MDR. If your organisation has been the target of cyberattacks in the past, it's imperative to step up defences with proactive and dynamic solutions offered by MDR.
Shore Up Your Digital Defences With the Right Cybersecurity Solution
Choosing between MDR and vulnerability scanning is not an either/or scenario. Instead, these services can complement each other to fortify an organisation's cybersecurity defences. Vulnerability scanning identifies and helps mitigate potential entry points for attackers, while MDR provides a comprehensive solution to monitor, detect, and respond to threats in real time. Together, they form a robust defence mechanism against the increasingly sophisticated landscape of cyber threats.
If you have any questions about finding the right cybersecurity solution for your needs, or want to discuss MDR or vulnerability scanning, please contact our team at CORVID today.
Get Started with CORVID's MDR Service
Ready to begin with CORVID MDR? CORVID provides cutting-edge MDR services to safeguard your business from evolving threats. By implementing CORVID's MDR solutions, you’ll strengthen your cybersecurity defences and gain a competitive edge in today’s complex threat environment. Don’t wait until a threat strikes—protect your business now!
Reach out to learn more and take the first step towards a safer, more secure future. Get started today and enjoy the peace of mind that comes from having your security managed by experts.
What Is Managed Detection and Response (MDR)?
In today’s rapidly evolving cyber threat landscape, organisations need more than just conventional security measures. Introducing Managed Detection and Response (MDR) – a transformative solution to cybersecurity.
Managed Detection and Response (MDR): An Overview
Managed Detection and Response (MDR) is a cybersecurity service that combines advanced technology with expert human analysis to identify, investigate, and respond to threats in real time. Unlike traditional security solutions that may only alert you to potential threats, MDR actively works to neutralise them, offering a comprehensive approach to threat management.
The Role of AI in MDR
AI algorithms process vast amounts of data at incredible speeds, identifying patterns and anomalies that human analysts might miss. This not only improves threat detection rates but also reduces the time it takes to respond to incidents.
By integrating AI with human expertise, MDR providers can deliver more accurate and efficient security solutions. AI-driven automation handles routine tasks, allowing human analysts to focus on complex threat analysis and strategic decision-making. This synergy between AI and human intelligence ensures a robust defence against evolving cyber threats.
Key Features of MDR:
- 24/7 Threat Monitoring: Continuous surveillance of your network to detect and address threats as they occur.
- Advanced Threat Detection: Utilises AI and machine learning to identify sophisticated threats that traditional methods might miss.
- Rapid Response: Immediate action to mitigate risks and neutralise threats.
- Expert Analysis: Access to a team of cybersecurity professionals who analyse threats and provide actionable insights.
Types of Threats MDR Effectively Addresses:
- Advanced Persistent Threats (APTs): MDR's proactive threat-hunting capabilities are well-suited to detect and respond to APTs, which can often evade traditional security measures.
- Zero-Day Exploits: MDR's use of advanced technology, such as AI and machine learning, allows for the rapid detection and response to zero-day exploits, offering a crucial defence against unknown vulnerabilities.
- Insider Threats: Continuous monitoring can effectively identify unusual activities within the network, making it an invaluable tool in protecting against insider threats.
- Ransomware and Malware: 24/7 monitoring and rapid response can significantly reduce the impact of ransomware and malware attacks by detecting and neutralising them before they can cause widespread damage.
- Phishing and Social Engineering: The combination of technology and human analysis can detect sophisticated phishing attempts and social engineering tactics, providing a critical layer of defence against these common attack vectors.
- Data Exfiltration: Detection and response to attempts to steal or leak sensitive data, helping to maintain data integrity and safeguarding against data breaches.
What Do MDR Services Offer?
MDR services typically include:
- Threat Detection and Incident Response: Proactive identification and reaction to threats.
- Security Monitoring and Management: Continuous oversight of your security infrastructure.
- Threat Intelligence: Insights and data on emerging threats and vulnerabilities.
- Compliance Management: Ensuring adherence to regulatory requirements.
- Managed Endpoint Detection: Monitoring and protection of endpoint devices.
Benefits of MDR for Organisations
Enhanced Threat Detection:
- Faster response times to security incidents.
- Improved identification of complex and sophisticated threats.
24/7 Monitoring:
- Continuous protection around the clock.
- Peace of mind knowing your infrastructure is always secure.
Cost Reduction:
- Lower operational costs by outsourcing security functions.
- Avoid the expenses of hiring and training in-house security experts.
Access to Expertise:
- Leverage the skills of seasoned cybersecurity professionals.
- Benefit from advanced knowledge and industry best practices.
- Better control over security postures.
- Assistance in meeting compliance requirements.
- Proactive defence strategies.
- Greater insight into network and endpoint security.
Risk Mitigation:
- Preparedness against emerging threats.
- Reduced likelihood of costly data breaches.
How Does MDR Compare to Other Security Solutions?
- MDR vs. Managed Security Services (MSSP): An MSSP focuses on overall IT security management, including implementing new systems and policy adjustments, while MDR specialises in threat detection and incident response.
- MDR vs. Endpoint Detection and Response (EDR): EDR tools focus on monitoring and analysing endpoint devices. MDR, on the other hand, offers a comprehensive service that includes EDR along with proactive threat hunting and response.
- MDR vs. Extended Detection and Response (XDR): XDR extends EDR's capabilities to the broader IT ecosystem. MDR does a similar job by providing detection and producing human-led responses to threats.
Integration of MDR with In-House Security Teams
Integrating MDR services with your internal security team can enhance your organisation’s cybersecurity stance. This collaborative approach combines MDR's proactive capabilities with the contextual expertise of your in-house team, leading to increased resilience and effectiveness.
Key Considerations When Choosing an MDR Provider
- Industry Experience: Look for providers with expertise in your specific industry.
- Certifications: Ensure providers have certified security specialists with credentials like CISSP, CEH, and CISM.
- Technology Integration: Verify that the provider’s technology can seamlessly integrate with your existing systems.
- Service Flexibility: Assess the scalability and customisation options available.
- Threat Intelligence Capabilities: Evaluate the provider’s ability to offer comprehensive and actionable threat intelligence.
- Response Times: Consider the provider’s track record for rapid threat response.
Transitioning to MDR Services
- Evaluate Security Posture: Conduct a gap analysis to identify vulnerabilities and prioritise threat areas.
- Set Objectives: Define clear goals for what you want to achieve with MDR services.
- Choose the Right Provider: Select a provider that aligns with your security needs and organisational goals.
- Integration with Existing Systems: Plan for seamless integration with current security infrastructure.
- Change Management: Prepare for changes in operational workflows and provide training for in-house teams.
- Privacy and Compliance: Establish agreements to ensure privacy and meet regulatory requirements.
- Measure Effectiveness: Establish KPIs and metrics to gauge the effectiveness and ROI of MDR services.
Conclusion
MDR services provide a proactive approach to cybersecurity that combines advanced technology with expert human analysis. By utilising MDR, organisations can benefit from enhanced threat detection, round-the-clock monitoring, cost reduction, access to expertise, regulatory compliance assistance, increased visibility, and risk mitigation.
When choosing an MDR provider, it is important to consider their industry experience, certifications, technology integration capabilities, and service flexibility. Integrating MDR with in-house security teams can further enhance protection against adversaries.
Get Started with CORVID's MDR Service
Ready to get started with CORVID MDR? CORVID offers state-of-the-art MDR services designed to protect your business from emerging threats. By integrating CORVID's MDR services, you will not only boost your cybersecurity defences but also gain a strategic advantage in navigating today's complex threat landscape. Don't wait until it's too late—secure your business now!
Contact us to learn more and take the first step towards a safer, more secure future. Get started today and experience the peace of mind that comes with knowing your security is in expert hands.
Cyber Incident Response for decision-makers
It is not unusual for an organisation to have a cybersecurity incident. It may be discovered through internal security controls (such as Anti-Virus, or a Security Operations Centre) , or it may be that a third-party notifies the organisation of an event.
When an organisation becomes aware of an incident it creates a chain of events that benefit from good decision-making. Most Boards are advised that they need to rehearse and prepare for a cyber incident. This can help. However, the majority of incidents do not need, or benefit from, Board-level oversight.
Whilst the decision-maker of an organisation is rarely a cyber-expert: they can play a critical role in achieving an optimum outcome. The following five-points are provided as a guide to the decision-maker.
1. Appoint the right leadership for the incident.
Incident response is a specialised field within the specialised subject of cybersecurity. The majority of people that work in IT or IT security (cybersecurity) have no experience overseeing a security incident. They may have a policy or strategy background and, whilst they may know the theory of how to respond to an incident, have very little hands-on experience.
The first decision that needs to be made is regarding the incident leadership. It may be that an in-house IT or InfoSec lead is exactly the right person to take-charge. If there is uncertainty that a suitable internal person can carry the responsibility the options are to bring in:
- a suitably experienced person to act as a mentor and guide to the in-house lead,
- an external specialist company to support the in-house lead,
- an external specialist company to take-over incident management.
It can be difficult for non-expert decision-makers to gauge whether an internal person is the suitable leader for the incident. Watch-out for the following warning signs that someone may be out of their depth:
- They are trying to apportion blame before the incident is remediated.
- They are using more jargon than usual and it’s hard to understand all the points they are making.
- Terms like “best practice” are used to justify an activity as opposed to an explanation.
The organisation must have confidence that the right expert is leading the response activity. But scared people rarely make the best-decisions. So even if the right person is on-point: they will probably benefit from some reassurance.
2. Set the communication tempo that is needed and try to stick to it.
Whilst it is tempting to want to know everything, every step of the way, this is rarely the most productive way of dealing with the matter. Minimising the communication burden can help maintain the focus on remediating the issue rather than communicating the issue. It is helpful to explain the tempo of communication updates or triggers that necessitate an additional briefing and then encourage the incident responders to get on with the job in-hand.
3. Agree the desired outcomes at the start.
Unfocussed incident response can quickly spiral into a mess. Set realistic outcomes such as:
- Contain the incident to as few hosts and users as possible: this helps recovery and reduces impact,
- Minimise downtime for the organisation and users: this helps maintain business as usual,
- Reduce the likelihood of this impacting other organisations: this helps protect reputation,
- Identify how the attack occurred: this helps prevent future incidents,
- Identify which files have been compromised (exfiltrated, changed, deleted): this helps comply with legal requirements of reporting and assess the longer-term business impact. This is critical.
Setting the priorities at the start helps direct the response. As more information is discovered the priorities may change. But when an incident takes on a life of its own it can be more damaging than necessary.
4. Forensic images are almost never necessary.
The main benefit of a forensic image is if there is a likelihood that there will be a court case at some point and evidence needs to be presented in such a way that it can withstand challenge.
The percentage of court-cases that result from a cybersecurity incident is very close to zero. The cost of capturing, recording and processing computers to a forensic-level is non-trivial. It will cause significant downtime, delay the determination of the impact to the organisation and potentially cost a lot of money.
If there is reasonable suspicion that the incident was triggered by an insider: then using computer forensics may be the right route to take. If this is the case consider the use of a specialist dedicated computer forensics team that are experienced at providing expert-witness.
Taking forensic images is no longer the standard approach taken for cyber incident response and it is rarely beneficial.
5. Make sure the response is less damaging than the incident
Rebuilds are often undertaken “to be safe”, even though the technical need for this is rare. This causes downtime and increases cost. If a rebuild takes place before the incident is analysed, it could result in critical evidence of attacker-activity being destroyed.
It is difficult to respond to a situation that is not understood unless an organisation is lucky. Relying on luck is rarely a good strategy.
There are cases of organisations switching off Internet connectivity, powering down server racks and shutting down critical systems. Whilst there may be a few catastrophic scenarios where this is the right thing to do: this is incredibly disruptive to an organisation and more often than not a panic-response. Make sure that the post incident assessment considers the disruption versus the risk to determine whether the response was reasonable and proportionate. Every incident is a learning opportunity.
Finally
There is no such thing as “perfect-defence”. Many organisations will deal with cybersecurity incidents at some point and the costs associated with data-breaches is reported as averaging millions of pounds. As an incident may involve PR and legal experts as well as the cyber incident specialists: costs can mount quickly. The decision-maker can play a key role in ensuring the right business outcomes are achieved.