Author Archives: Carol

IT Square:茶產業以AI提質提量 數據管理及多雲保安成數碼轉型關鍵

(左至右)香江會-滙天下茶業有限公司(重慶)運營總監李深、香江會-滙天下茶業有限公司董事總經理楊莉瑤、

Green Radar 銷售執行副總裁馬偉雄、中信國際電訊CPC雲端及安全服務高級經理鄧志明

人工智能透過機械學習和自動化革新傳統行業。中國作為全球最大的茶葉生產國,利用數碼化科技,即時監控、採摘和加工茶葉推動產業進步。DICT數智通訊服務供應商中信國際電訊 CPC(以下簡稱 CPC)早前便舉辦了「How does AI disrupt tea industry: Automating Business operations with AI In a Strong Security Foundation」AI茶飲品茗活動,與嘉賓一起探討在人工智能熱潮下,如何善用多雲連接的特權帳號管理(PAM)和電子郵件安全解決方案,保障業務安全。

人工智能為茶文化注入新動力

中國茶文化歷史悠久,本地茶葉品牌「香江會-滙天下茶業有限公司」積極推廣茶文化,希望將傳統茶藝和生活融合在一起。隨著業務版圖不斷擴張,品牌亦積極進行數碼轉型。

香江會-滙天下茶業有限公司(重慶)運營總監李深認為AI對推動茶產業發展有極大關係;從岩茶自動化應用、浙江茶產業數碼化發展,再演進到智慧化的台灣AI製茶,印證了AI如何影響中國茶產業的承傳和演變。

香江會滙天下茶業有限公司(重慶)運營總監李深

李深分享道:「如浙江省農業技術推廣中心牽頭研發的微信小程序「浙茶香」,打通了農業、氣象、金融、人社、資規、市場監管等壁壘,發出各項預警和提供開採期,幫助掌握市場信息和建立浙江茶葉品牌,AI優勢普惠省內茶農。」

Green Radar開發grKey提供PAM解決方案

人工智能促進生產力及經濟增長,同時亦存在私隱及數據安全風險。Green Radar 銷售執行副總裁馬偉雄則指出特權帳號管理(Privileged Access Management,PAM)對於企業保護敏感數據和系統安全的重要性。

Green Radar 銷售執行副總裁馬偉雄

馬偉雄分享道:「特權帳號就如萬能鑰匙,一旦管理者外洩特權帳號密碼,黑客便可肆意盜取敏感數據,令企業蒙受巨大損失。」他續指,即使企業購置了最先進的特權帳號管理系統,亦面對網絡安全人員不足、缺乏管理經驗等問題,令帳號防護機制形同虛設。

Green Radar開發的grKey以PAM-as-a-service形式提供服務,省卻了初始的高昂投資。相比市場上需企業自行管理的傳統PAM解決方案,Green Radar除了提供基礎產品外,更提供全面的管理服務,包括特權密碼管理、日常監測維護、審計要求等。「性價比高,配合本地化支援,中小企業亦能做好密碼管理。」grKey推出至今已協助本港多家企業及公營機構管理特權帳號,降低密碼洩漏風險。

多雲服務成業界主流

現時多雲(Multi-cloud)應用成為數碼轉型的主流,企業往往採用多個雲服務,大大增加管理的複雜度,伴隨而來的分散性,可能會帶來安全威脅,控制成本也不容易。

中信國際電訊CPC雲端及安全服務高級經理鄧志明說, 企業走向多雲是客觀形勢使然,理由不一而足。雲運算以用量計費,可靈活調配適應季節性用量,加上人工智能和數據分析,AI訓練推理又耗用算力,難以部署在內部的數據中心,亦成選用雲運算的原因之一。雲運算應用日廣,雲服務供應商性能又各異,多雲也因而成為數碼轉型的常態。

中信國際電訊CPC雲端及安全服務高級經理鄧志明

企業轉移到雲服務,要考慮整個生命周期管理挑戰;包括如何上雲(Migrate)、用雲(Consume)、管雲(Manage)、護雲(Protect)四個過程,有一定的學習曲線,數據安全、管理和合規須在多雲環境運行,並配合內部流程。要盡享多雲優勢,企業應選擇結合人才、流程和技術的專業管理夥伴。人才是管理雲服務資質和經驗,第二是如何營運流程的框架設計,擬定處理問題對策,任何轉變可以完全透明,具備追溯和監察,最後擁有技術和認證,掌握和精通各項雲運算技術,才能運籌帷幄。鄧續指中信國際電訊CPC具備超過10年網絡、雲服務和網絡保安經驗,期間更為多家客戶實踐多雲策略, 可助力企業成功數碼轉型。

Green Radar公佈年度電子郵件威脅指數 揭露黑客行騙新招式 有助本地企業及組織防範網絡攻擊

(香港,2024年3月20日)劍達(香港)有限公司(「Green Radar」或「公司」)發佈了最新的電子郵件威脅指數 Green Radar Email Threat Index(「GRETI」或「指數」),作為自 2023 年開始的年度回顧,年度指數顯示為69.7分。指數與上年度的66.5分相比有所增加,反映電郵威脅風險持續上升,應保持警惕。

根據分析,本年度的網絡釣魚(Phishing)和商業電郵詐騙(BEC)攻擊繼續處於「高」風險級別水平。2023 年發生了不少針對政府部門的網絡攻擊,導致數百 GB 的資料遺失和甚至業務資料庫被盜,受入侵的組織被黑客勒索贖金並聲譽受損。當然,事故原因不乏人爲錯誤但系統爲何不堪一擊亦十分值得反思。由此可見,網路釣魚仍是黑客首選的網絡攻擊手法。香港電腦保安事故協調中心(HKCERT)亦在早前公佈在2023年共處理 7,752 宗保安事故,其中網絡釣魚更佔整體個案接近一半(3,752宗,佔48%),對比2022年上升27%,數字創五年新高。與網絡釣魚相關的連結更突破19,000條,相當於每日至少受到52次與釣魚有關的攻擊。

人工智能助長網絡威脅  Quishing攻擊手法有變

根據GRETI的分析,今年預計會有更多利用AI策劃網絡攻擊的情況出現。這是因為AI技術的應用可以幫助犯罪分子生成惡意軟件,同時降低了他們的技術門檻。在新一代的釣魚攻擊中,黑客不僅使用傳統的電郵方式,還運用AI Deepfake技術來冒充他人身份,以贏得受害者的信任,從而詐騙金錢。因此網絡釣魚仍然是最流行的電郵威脅類型,並且在本年度繼續保持上升趨勢;因此企業更需要部署相應的網路釣魚防護解決方案來保護員工和企業免受威脅。

Quishing方面, 黑客用更改了背景顔色和錯誤比例的QR Code 圖片取代以往使用完整QR Code的釣魚電郵,使電郵安全閘道更難透過光學字符識別(OCR) 將這些影像識別為 QR Code。顯示黑客有試圖用不同的Quishing手法攻擊,證明了他們在幕後進行了廣泛的研究工作,以增加網絡釣魚命中率。

(Quishing 案例示意圖)

GRETI注意到黑客在設計具針對性的攻擊時,會利用誘餌來吸引收件人的注意。例如假冒受信任和認可的品牌或機構,原因是因為知名品牌在消費者中建立了一定的信任。以SOC攔截到的假冒香港終審法院例子來說,本土化程度高但一般市民大衆收到相關電郵時不免衍生緊張、恐慌的情緒,因此會來不及識別當中的真僞。就這個例子而言,黑客嘗試引導收件人點擊看似正確的文件名稱鏈接並導向其至創建的假網站,務求令網絡釣魚取得成功。

縱觀全年,DHL、WeTransfer、Meta、Spotify和Amazon分列假冒品牌排行榜的前五名。黑客利用假冒知名品牌的策略,透過製作偽造的廣告、促銷活動、優惠等手段,誘使受害者提供個人資訊或進行金錢交易。這些黑客能夠充分利用品牌的信譽、價值和廣泛知名度,從而提高詐騙成功的機會。因此,請保持警惕,仔細驗證其真實性,以免成為黑客的目標。

(本土釣魚攻擊例子 – 香港終審法院)

2024年新型網絡釣魚 – 克隆網路釣魚(Clone Phishing

隨著大家了解到網路釣魚意識培訓的重要性,黑客找到可以繞過培訓並誘騙用戶陷入憑證盜竊的新方法。克隆網路釣魚類似於線程劫持,是一種基於電郵的新型威脅,克隆網絡釣魚會把帶有附件的真實電郵,再假冒原始寄件者重新發送。然後附件被惡意程式替換,但外觀與原始文件相似,因此很難被發現。

注意,克隆網路釣魚並不總是透過電郵回覆的方式進行而是取決於您的業務方式。有時,攻擊是通過複製一封已知企業發送的電郵並將合法的電郵副本發送給目標收件人。由於克隆網路釣魚通常是從合法電郵地址發送,因此無論是否有適當的網路安全措施來阻止,該電郵也會傳遞到使用者的收件匣中。而這封惡意電郵可能附帶勒索軟件或其他任何形式的惡意附件,用於竊取數據。

Green Radar服務運營執行副總裁李祟基先生表示:「網路釣魚攻擊可以透過不同的媒介進行,其中最常見的是電郵。攻擊目的是竊取憑證以接管帳戶,可能導致企業敏感資料外泄和詐欺轉帳等嚴重後果。由於攻擊利用人性弱點,必須防止員工成爲潛在漏洞。員工教育固然重要,但遠距工作和大量郵件和訊息處理使辨識複雜攻擊更困難,因此使用合適的網路釣魚防護解決方案至關重要。」

如欲了解更多電郵威脅最新趨勢,歡迎點擊以下網站下載 GRETI 完整報告:

Download Full Report

March 20, 2024, Hong Kong – Green Radar (Hong Kong) Limited (“Green Radar” or “the Company”) has released the latest Green Radar Email Threat Index (“GRETI” or “the Index”), as part of the annual review since 2023. The index for 2023 reached 69.7, indicating a further increase in email threat risks compared to the previous year’s index of 66.5. This highlights the importance of maintaining vigilance in addressing these threats.

According to the analysis, phishing and Business Email Compromise (BEC) attacks continue to pose a “high” level of risk this year. In 2023, numerous cyberattacks targeted government departments resulted in the loss of hundreds of gigabytes of data and even theft of business databases. The compromised organizations were subsequently blackmailed for ransom, leading to reputational damage. While human errors contributed to these incidents, the weaknesses in the systems are also worthy of reflection. Consequently, phishing remains the preferred method for hackers in cyberattacks.

The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) recently reported handling a total of 7,752 security incidents in 2023, with phishing accounting for nearly half of the cases (3,752 cases, or 48%), representing a 27% increase compared to 2022 and reaching a five-year high. The number of links associated with phishing exceeded 19,000, equivalent to at least 52 phishing-related attacks per day.

Artificial intelligence fuels cyber threats; Quishing attack techniques have improved

According to GRETI’s analysis, it is expected to see an increase in cyberattacks using AI this year. This is because the application of AI technology can assist criminals in generating malicious software with lowered technical barriers. In the new generation of phishing attacks, hackers not only use traditional email methods but also apply AI Deepfake technology to impersonate others and gain the trust of victims in order to defraud them for money. Therefore, phishing remains the most prevalent type of email threat and continues its upward trend this year. As a result, businesses need to deploy corresponding anti-phishing solutions to protect their employees and organizations from these threats.

Regarding Quishing, hackers have employed a new technique by modifying the background color and using an unusual ratio of QR code images in phishing emails. This approach replaces the previous method of using complete QR codes. By doing so, hackers make it more challenging for email security gateways to recognize these images as QR codes through Optical Character Recognition (OCR). The fact that hackers are attempting to use various Quishing techniques demonstrates their extensive research efforts behind the scenes, aimed at increasing the success rate of their phishing attacks.

GRETI has observed that when hackers design targeted attacks, they use bait to attract the attention of recipients. For example, they may impersonate trusted and recognized brands or institutions, as well-known brands have established a certain level of trust among consumers. Taking the example of a fake Hong Kong Court of Final Appeal email intercepted by our Security Operations Center (SOC), the high level of localization may cause anxiety and panic among the general public when they receive such emails, making it difficult for them to identify the authenticity. In this case, hackers attempt to guide the recipient to click on a seemingly legitimate file name link that redirects recipient to a fake website that hackers created to execute the phishing attack successfully.

Throughout the year, DHL, WeTransfer, Meta, Spotify, and Amazon have consistently ranked among the top five counterfeit brands. Hackers utilized the strategy of impersonating well-known brands by creating forged advertisements, promotional campaigns, and offers to lure victims into providing personal information or engaging in financial transactions. Hackers took advantage of these brands’ reputation, value, and widespread recognition, thereby increasing the chances of successful fraud. Therefore, it is essential to remain vigilant and carefully verify the authenticity of any communication or offer to avoid becoming a target for hackers.

2024 New type of phishing attack – Clone Phishing

Despite the growing awareness of phishing and the importance of cybersecurity training, hackers have found a new method to bypass training and deceive users into falling for credential theft.

Clone Phishing, similar to thread hijacking, is an email-based threat where a genuine email with attachments is cloned and resent, impersonating the original sender. The attachments are then replaced with malicious programs that closely resembled the appearance of the original files, making them difficult to detect.

It is important to note that Clone Phishing doesn’t always occur through email replies but depends on your business practices. Sometimes, the attack involves duplicating an email sent by a known company and sending a legitimate copy to the targeted recipient. Since Clone Phishing often originates from legitimate email addresses, the emails can bypass proper network security measures and land in the users’ inboxes. These malicious emails may contain ransomware or any other form of malicious attachment aimed at stealing data.

Mr. Francis Lee, Executive Vice President, Service Operations at Green Radar, stated, “Phishing attacks can occur through various mediums, with email being the most common among them. These attacks aim to steal credentials to take over accounts, which can result in severe consequences such as the leakage of sensitive corporate data and fraudulent transfers. As these attacks exploit human vulnerabilities, preventing employees from becoming potential vulnerabilities is crucial. While employee education is important, the challenges posed by remote work and handling a large volume of emails and messages make it more difficult to identify sophisticated attacks. Therefore, it is essential to utilize appropriate phishing protection solutions.”

For more email threat updates, please click to download 2023 GERTI Annual Report: GRETI 2023 Annual Full Report

 

Enzo Plus Teams Up with Green Radar: Enhancing Corporate Cybersecurity Across Asia

Combatting the Surge in Phishing Emails, Safeguarding Enterprises from Heightened Risks!

Enterprises across diverse sectors confront a mounting threat posed by sophisticated cyberattacks, notably phishing emails, which have grown increasingly localized, heightening vulnerability. With the expansion of remote operations, emails and endpoints emerge as primary targets, escalating the risk of phishing attacks. Surveys underscore the severity, with 56% of businesses reporting external network breaches, witnessing a notable surge in phishing emails and Business Email Compromise (BEC). Industries such as finance, retail, and technology are particularly affected, enduring repeated assaults. It’s imperative for businesses to Prioritize raising awareness of email security and fortifying defenses against these evolving phishing threats to safeguard operations effectively.

Leading Email Security Solution – grMail

With SOC in Singapore and Hong Kong, utilizes advanced technology like big data, threat intelligence, and artificial intelligence to deliver real-time monitoring and rapid response to cyber threats. The MDR platform, ISO 27001 certified, incorporates a custom AI engine for automated investigation and response. This platform ensures top-tier email security against targeted phishing attempts, 24/7 monitoring, and in-depth email analysis, while significantly improving detection rates and reducing false positives.

Ideal Choice for Small and Medium-sized Enterprises:

Security-as-a-Service, the innovative email security solution, an all-in-one and affordable solution for customers. It includes a traditional email security gateway platform, AI analytical engine to detect spoofing emails, a local SOC with MDR service capabilities, and world-class isolation technology. The offered services not only address the prevention of cyber security attacks but also include proactive monitoring of threat hunting, and response services to customers. Green Radar’s grMail introduces an economical per-mailbox pricing plan, offering enterprise-grade email protection and technical support. With increased efficiency and reduced costs, it effectively tackles various challenges in email security, emerging as a new favorite for small and medium-sized enterprises.

Enzo Plus Teams Up with Green Radar to Provide Comprehensive Corporate Network Security

Enzo Plus Sdn Bhd and Enzo Plus Asia Pte Ltd are a leading distributor of IT solutions in Malaysia and Singapore, and are excited to announce our collaboration with Green Radar to enhance our service offerings, particularly in cloud security. In today’s rapidly evolving business landscape, email security is paramount. With cyber threats becoming increasingly sophisticated, businesses require robust solutions to safeguard their sensitive data and communications. By partnering with Green Radar, renowned for its cutting-edge technologies and unwavering commitment to security excellence, we aim to provide our clients with the most advanced and up-to-date cloud security solutions available. Together, we will empower businesses to mitigate risks, enhance their security posture, and thrive in an ever-changing digital environment.

Full Version: Enzo Plus Asia X Green Radar_Press Release

 

Green Radar 聯手 Microfusion全方位守護企業網絡安全

釣魚電郵暴增,企業面臨極大風險!
企業遭受的網絡攻擊日益嚴重,尤以釣魚電郵為甚。釣魚電郵攻擊漸趨勢「本地化」,偽裝港鐵、PayMe甚至香港政府等常見品牌,企業容易受騙。隨著遙距營商擴大,電郵及端點成為主要攻擊目標,釣魚電郵威脅大幅上升。調查顯示,56%企業受過外部網絡攻擊,其中釣魚電郵及電郵詐騙激增,各行業均深受其害,尤以金融、零售、科技資訊等屢次中招。企業迫切需要提高電郵安全意識,防範極具威脅性及日益複雜的釣魚電郵攻擊,以守護業務安全。

電郵安全領先技術 – grMail
Green Radar的主打產品 grMail 以獨特的人工智能引擎 aidar™ 為核心,24/7 不斷學習全球與本地的威脅情報釣魚電郵、勒索及垃圾郵件等,會進行精密的二次清洗隔離,全天候確保客戶所收到的郵件毫無安全疑慮。這種全天候的郵件安全保護,為企業提供了可靠的安全屏障。
除了強大的人工智能監控外,grMail更借助雲端沙盒技術,系統會將有可疑的郵件送至雲端沙盒,企業可遠程檢查附件,極大降低了企業受到入侵風險的可能性,同時快速阻隔各種風險並將安全郵件即時傳遞給客戶。Green Radar 在香港及新加坡設有安全監控中心(SOC),可隨時協助企業客戶應對各種郵件帶來的挑戰與問題。Green Radar 亦提供持續性培訓-grAssessment (釣魚演習)以及企業管理智能解決方案-grKey,更進一步提升了企業的網絡安全意識和資源管理效率。

中小企業首選:「保安即服務」輕鬆解決資源壓力!
「保安即服務」(Security-as-a-Service)這項新型網絡保安方案不僅提供頂級的網絡安全專業知識和技術,全面保護電郵及終端,還有專人負責維護及更新,解決企業人手資源短缺問題,是中小企業的最佳選擇。Green Radar的grMail更推出經濟實惠的郵箱數量收費計劃,享受企業級電郵保護及技術支援。效率更高、成本更低,解決網絡保安上的各種難題,成為中小企業的新寵。

Green Radar聯手宏庭科技全方位守護企業網絡安全
宏庭科技憑藉超過十年的產業經驗與多元原廠雲端技術資源,提供客製化的雲端安全解決方案,依照企業生態與需求彈性部署。以Google Cloud Platform為例,身為Google Cloud菁英合作夥伴,我們提供針對GCP的多重資安解決方案。例如,Cloud Armor作為網路應用程式防火牆(WAF),能有效阻擋L7攻擊、XSS和SQLi等威脅,配合企業級的分散式阻斷服務(DDoS)達到最佳防禦效果。此外,我們也提供Security Command Center、reCAPTCHA Enterprise、Chronicle、BeyondCorp、Cloud IDS等多重雲端資安解決方案,全方位保護企業免於惡意攻擊和資安威脅。結宏庭科技的雲端專業經驗與Green Radar全球領先的郵件安全解決方案,為企業提供一站式的網路安全服務,確保業務運作安全無虞。

完整文章:Green Radar x Microfusion_Article

Green Radar 公佈2023年上半年季電郵威脅指數 ChatGPT助黑客降低釣魚成本GR以AI領先一步

(香港,2023年7月25日)劍達(香港)有限公司(「Green Radar」或「公司」)發表 2023 上半年的電郵威脅指數 Green Radar Email Threat Index(「GRETI」或「指數」)。指數顯示為 62.1分(上季為64.3分),反映電郵威脅風險較上季下跌,但風險級別水平維持在「高」。與去年同期相比,Green Radar觀察到每封電郵的整體攻擊量增加了1%,表明整體的攻擊量相對穩定。 然而,實際上的攻擊量絕對增長率增加了86%,這是一個不容小覷的數字也解釋了GRETI指數的下跌。在這個數字中,未知攻擊(Unknown Attacks)/零日攻擊(Zero Day Attacks)與去年同期相比增加了33%。

報告發現,ChatGPT的興起為黑客製作釣魚電郵和假網站提供了便利,使黑客更活躍發動網絡攻擊。加上臨近暑假,黑客看準時機假冒旅游預訂網站騙取信用卡兼個人敏感資料。  Green Radar 的電郵安全監控中心(SOC)攔截了不少相關的釣魚電郵,大部分以信用卡使用情況有「可疑」為由釣魚。

 

LinkedIn最常假冒品牌第一  DocuSign首次上榜

根據上半年的GRETI 數據,商業電郵詐騙(BEC)攻擊較上季微跌。Green Radar SOC 統計數據顯示最常被冒充的三大品牌包括:LinkedIn、微軟和恆生銀行;排行第四和五的分別是Facebook和DocuSign。相信Facebook榜上有名大家已見慣不怪,而第一次出現的DocuSign很值得留意。DocuSign成立於2003年,是一家來自美國的電子簽名服務提供商,提供基於雲的電子簽名平台,幫助企業或用戶在線上快速創建並獲取合法有效的電子簽名。黑客利用非法手段竊取其客戶電郵地址後,偽造了一個假域名“DocuSgn”(比DocuSign少一個字母i),並偽裝成財務部門的發票向用戶發出惡意電郵,由於郵件標題及內容均使用DocuSign的品牌標識,輕易獲取了用戶信任。因此用戶一不留神便被誘使點擊含有惡意代碼的word文檔。如沒有強大的電郵保安措施,企業的内部資料會輕易受到黑客攻擊,造成損失。

(黑客假冒DocuSign示意圖)

十大惡意軟件家族排行榜的第一位是HEUR:Hoax.HTML.Phish,第二位是HEUR:Exploit.MSOffice,HEUR:Exploit.MSOffice.CVE-2018-0802則排行第三位,表示這類軟件頗受黑客歡迎,需要多加留意。

黑客看準時機設計釣魚陷阱

疫情放緩加上旅游業復蘇,黑客看準時機假冒旅游預訂網站向其客戶發送釣魚電郵。根據 SOC提供的booking.com釣魚案例可見,黑客透過盜取用戶的網絡交易資料假冒「網站」以信用卡使用情況有「可疑」並會取消預訂為由實施釣魚詐騙。黑客善於操縱心理,利用用戶收到電郵後的不安情緒逐步讓對方落入自己所設下的陷阱,誘使收件人點擊假網站的連結以盜取其個人及信用卡資料;黑客在電郵中提到「此通知將在72小時後失效」和「booking.com不會向您發送電郵或……驗證你的賬戶密碼或銀行信息」等字眼獲取信任和增加迫切性。只要小心閲讀,便會發現電郵内容是自相矛盾的,一方面讓用戶點擊連結一方面提醒切勿點擊連結。

在此提醒大家在點擊任何連結前請三思,因爲很可能在幾秒鐘的時間内識別到黑客的漏洞從而避免損失。所以,了解釣魚威脅並進行適當的釣魚意識評估和演習必不可少,尤其是當黑客針對性地向企業出擊,提早預防可以消除潛在威脅,大大減少資料外洩、勒索程式及詐騙的風險。Green Radar的grMail 和grAssessment(釣魚意識演習)可為企業提供最適切的電郵解決方案,增加員工對電郵威脅的了解,成爲你企業的把關者。

(黑客假冒booking.com的釣魚電郵例子)

Green Radar 服務營運執行副總裁李祟基先生表示:「網絡犯罪活動越趨頻繁,而且ChatGPT的出現無疑為黑客提供便利,只要巧妙運用字眼便可以利用ChatGPT編寫釣魚内容。所以,選用優質的電郵保安服務供應商是保護企業的第一道防綫,强化企業保護屏障。針對未來發展,我們會不斷優化grMail的技術水平,以自家研發的AI(aidarTM)去調整並提升全球及本地威脅情報、監控及攔截能力,緊貼用戶防衛需求。」

如欲了解更多電郵威脅最新情報,歡迎點擊下載 2022 Q4 GERTI:Green Radar_1H 2023 GRETI Press Release_CN

(25th July 2023, Hong KongGreen Radar (Hong Kong) Limited (“Green Radar” or “Company”) has released the Green Radar Email Threat Index (“GRETI” or “Index”) for the first half of 2023. The index for the first half is 62.1 (the index released for 2022 was 64.3), the index reflects a moderate decrease compared to the  last assessment, though the overall risk level remains ‘High’. Compared to the same period last year, Green Radar observes an 1% increase in overall attack volume per email, showing that the overall attack volume is relatively stable. However, in actual terms the absolute increase in attack volume was 86% year on year and is a significant number. Of this volume, the Unknown / Zero Day attacks had increased by 33% vs the same time last year.

The rise of ChatGPT and other AI tools have facilitated hackers to create phishing emails and fake websites more efficiently, thereby lowers the barrier in launching cyber attacks. In another showing of hackers executes timely attacks, to the summer and holiday season promotions were impersonated with fake travel booking emails and websites to defraud credit cards and personal sensitive information. Green Radar’s Email Security Operations Center (SOC) intercepted many related phishing emails, most of which were phishing on the grounds that the credit card usage was “suspicious”.

LinkedIn ranks no. 1 for most impersonated brand, DocuSign on the list for the first tim

According to GRETI statistics in this first half, business email compromise (BEC)attacks recorded a slight decrease over the same period last year. Though that is not to say that the threat is lessening, the top three most frequently counterfeited brands include: LinkedIn, Microsoft and Hang Seng Bank, with Facebook and DocuSign being the fourth and fifth respectively. It is no surprise that Facebook is enlisted, but DocuSign which debuted on the list is worth noting. Founded in 2003, DocuSign is an electronic signature service provider from the United States. It provides a cloud-based electronic signature platform to help enterprises or users quickly create and obtain legal and valid electronic signatures online. Hackers used illegal means to steal their customers’ email addresses, forged a fake domain name “DocuSgn” (one letter i less than DocuSign), and disguised themselves as invoices from the financial department to send malicious emails to users. Using DocuSign’s brand identity, it is easy to gain the trust of users. Therefore, users are tempted to click on the word documents containing malware without paying attention. In the absence of strong email security solution, this could bring loss to enterprises as their internal data could then be easily hacked.

HEUR:Hoax.HTML.Phish ranks first on the list of top ten malware families, with HEUR:Exploit.MSOffice the second. HEUR:Exploit.MSOffice.CVE-2018-0802 places third. Such ranking indicates that the software is popular among hackers and enterprises should pay more attention to it.

Hackers saw the right time to design phishing traps

With the easing of the epidemic and the recovery of tourism, hackers took advantage of the upsurge to send phishing emails to customers by impersonating travel booking websites. In the phishing case of booking.com, hackers defraud users of their online transaction information and impersonate “websites” to carry out phishing scams, claiming that the credit card usage was “suspicious” and the reservation would be cancelled. Riding on mental manipulation and users’ anxiety after receiving these emails, hackers induce users to fall into their trap gradually by luring recipients to click on fake website links to steal their personal and credit card information. “This notice will be expired in 72 hours” and “booking.com will not send you an email or… verify your account password or bank details” are used to gain trust and add urgency.

Users should be viligent when responding over any links. It is essential to understand phishing threats and conduct appropriate awareness assessment training for enterprises, who with its ample staff of different levels of cyberthreat awareness are prime targets for hackers and potential returns high and worthwhile. Early preventions can eliminate potential threats and greatly reduce the risks of data leakage, ransomware, and financial frauds. Green Radar’s grMail and grAssessment (phishing assessment services) can provide enterprises with the most appropriate email security solutions, increase employees’ understanding of email threats, and become the gatekeepers of your enterprises.

Mr. Francis Lee, Executive Vice President, Service Operations at Green Radar, said, “Cybercrime activities are becoming more and more frequent. The emergence of ChatGPT undoubtedly facilitates hackers by writing phishing content, as long as they weigh their words skillfully. Choosing a professional email security service provider with good quality builds the first line of defense to protect the enterprises and strengthen their protection barriers. For future development, we will continue to optimise the technical level of grMail, as well as adjusting and enhancing global and local threat intelligence, monitoring and interception capabilities by using our own developed AI (aidarTM), so as to align with users’ needs to defense.”

For more email threat updates, please click to download 2022 Q4 GERTI: Green Radar_1H 2023 GRETI Press Release_EN

 

 

Green Radar 公佈2022年第四季電郵威脅指數 grMail獲Frost & Sullivan認可為電郵安全服務領導者

(香港,2023年2月2日)劍達(香港)有限公司(「Green Radar」或「公司」)發表 2022 年第四季度的電郵威脅指數 Green Radar Email Threat Index(「GRETI」或「指數」)。第四季指數顯示為 64.3分(第三季為68.1分),反映電郵威脅風險較上季適度下跌。根據分析,網絡釣魚和商業電郵詐騙攻擊有所緩和但出現大量且持續的回避攻擊(“evasive attacks”),因此風險級別水平維持在「高」。今季報告發現,年近歲晚金融服務業繼續是網絡釣魚攻擊活動的目標,黑客以財務部發放年度獎金為由廣撒電郵,利用大衆期待獎金的情緒釣魚。此外,Green Radar 的 grMail 於 2023 年 1 月被 市場調研公司Frost & Sullivan 評為香港和新加坡地區電子郵件安全服務供應商的行業領導者,反映了對公司產品在這兩個營運地區在技術水平及複雜程度的認可。

DHL再次升至最常假冒品牌榜首  Apple榜上有名

根據今季GRETI 報告,商業電郵詐騙攻擊較上季下跌。Green Radar電郵安全監控中心(SOC )統計數據顯示最常被冒充的三大品牌包括:DHL 、微軟和 LinkedIn。另外,滙豐銀行在本季雖未上榜,但SOC 攔截了不少與其相關的釣魚電郵;内容以 “不活躍的帳號警報”為題,誘使用戶點擊連結並激活賬號,進一步盜取用戶的個人資料和憑證密碼。根據SOC統計,在過去的3個月黑客每日發動超過1,000次含有釣魚連結的攻擊,這意味著沒有足夠强大的電郵保安措施,企業便會輕易受到黑客攻擊,造成難以預料的損失。

十大惡意軟件家族排行榜的第一位是HEUR:Exploit.MSOffice.CVE-2018-0802由第三位升至第一位,HEUR: Exploit.MSOffice繼續維持在第二位,HEUR: Exploit.MSOffice.Badur則由第五位升至第三位,表示這類軟件頗受黑客歡迎,需要多加留意。

内部培訓有效應對釣魚危機

 了解公司的內部威脅並為員工提供適當的釣魚意識評估十分重要,衆所周知黑客會針對企業最薄弱的環節出擊,而員工正是所潛在的威脅。對企業而言,前述每日超過1,000 次的攻擊,每一個都代表著資料外洩、勒索程式及詐騙的風險。員工由於意外或疏忽而在無意間泄露資料,例如遙距工作時繞過資訊科技保安控制措施和相關的安全設定;黑客可以在未經授權的情況下竊取敏感和機密資料。

由此可見,提升員工的安全意識能幫助員工成爲防禦黑客攻擊的第一道防綫。Green Radar的grAssessment(釣魚意識演習)可為企業度身定做合適的方案,增加員工對電郵威脅的認識,建立安全屏障。據SOC的統計,發現不少客戶在進行第二次的釣魚意識演習後,員工的安全意識提高了至少51%。

Quishing釣魚手法仍肆虐 冒充財務部發放年終獎金

 根據Green Radar SOC 提供的釣魚電郵可見,黑客善於掌握大衆情緒和心理,乘當時話題之勢出擊。年近歲晚,有近38%的釣魚電郵假借財務部之名發出,黑客瞄準特定群體,製作出具說服力的電郵內容獲利。電郵內附帶載有釣魚網站的QR Code圖片,利誘收件人掃瞄開啟並連結至假網站,帳戶便落入黑客手中。由於QR Code屬圖像檔案,不是所有的保安系統都能偵測。不過,現時市面上已有技術可應對這類攻擊,如Green Radar的grMail AI技術已能夠準確識別電郵的惡意連結、附件和QR Code。

(黑客製作附有QR Code的釣魚電郵例子)

Green Radar 產品營銷執行副總裁李祟基先生表示:「網絡犯罪活動越來越精密,針對商業機構的技倆也越趨成熟,要讓公司有足夠的防禦能力來抵擋電郵攻擊,除了選用卓越的電郵保安服務供應商之外,員工對網絡安全意識的演習也不可或缺。」對於grMail產品獲選為電郵安全服務商領導者,李祟基補充:「Frost & Sullivan的報告是對Green Radar在技術研發方面的重要認可,我們矢志為企業客戶提供最合適及全面的電郵保護方案,不斷優化grMail的技術水平以提升本地威脅情報、監控及攔截能力。」

如欲了解更多電郵威脅最新情報,歡迎點擊下載 2022 Q4 GERTI:Green Radar 2022 Q4 GRETI Press Release_CN

(2nd February 2023, Hong KongGreen Radar (Hong Kong) Limited (“Green Radar” or “Company”) has released the Green Radar Email Threat Index (“GRETI” or “Index”) for the fourth quarter of 2022. The index for this quarter is 64.3 (the index released in October was 68.1), suggesting that the risk of email threats has moderately decreased. The overall the risk level remains “High” despite the moderation of phishing and Business Email Compromise (BEC) attacks, due to the continuous evasive and high volume of evasive attacks monitored. This report revealed that hackers sent out mass emails at the end of the year, took advantage of the public’s anticipation of annual bonuses and attempted phishing by impersonating companies’ financial departments. The FSI(“financial service industry”) sector continues to be a prime target for phishing attack campaigns. Meanwhile, grMail, the premier product that Green Radar offers to protect organizations against email threats, was recognised by market research company Frost & Sullivan in January 2023 as a leader in email security in Hong Kong and Singapore, reflecting the technological and sophistication of the product in these two operating regions.

DHL reclaims the top spot of the most impersonated brand listing, while Apple debuts its presence with a fifth place

According to the GRETI Q4 report, commercial email scam attacks have decreased compared to the previous quarter. Green Radar Email Security Operations Centre (SOC) statistics showed that the top three most impersonated brands are DHL, Microsoft and LinkedIn. Besides, although HSBC could not reach the top 5, SOC intercepted numerous related phishing emails. Prevalent contents mimicked “Inactive Account Alert”, lured users to click the link and “re-activate” the account, hence attempted to steal their personal information and credentials. According to the Green Radar SOC data, more than 1,000 phishing attacks with hyperlinks were triggered daily, implying that corporates are easily exposed to hackers’ attacks without ample protection from email security solution providers, leading to unforeseen losses.

HEUR:Exploit.MSOffice.CVE-2018-0802 rose from the third place to the top among malwares. HEUR: Exploit.MSOffice remained at the second place. HEUR: Exploit.MSOffice.Badur made its way to the top three from the fifth place, showing that such malware is popular among hackers and more attention is needed.

Internal Awareness training is effective against the phishing crisis

It is essential to understand your company’s internal threats and provide employees with a proper phishing awareness assessment, hackers are known to target the weakest point in a business, and employees are a potential threat. As mentioned before, there were more than 1,000 phishing attacks daily. Every attack represents a risk of data leakage, ransomware and fraud to enterprises. Inadvertent disclosure of data by employees due to accident or negligence, such as bypassing IT security controls and related security settings while working remotely, would allow hackers to access sensitive and confidential information without authorisation.

Therefore, improving employees’ security awareness can equip them as the frontline of defence against cyber attacks. Green Radar’s grAssessment (Phishing Awareness Training) can tailor solutions for corporates, increase employees’ awareness of email threats and fortify the security barrier. According to the statistics of SOC, it is found that after the second phishing awareness training was conducted, employees’ security awareness increased by at least 51%.

Quishing techniques still running rampant, ‘issuing’ year-end bonuses impersonating finance departments

According to phishing emails provided by Green Radar SOC, hackers were adept at manipulating the public’s emotions and leveraging the hot topics in town. By the end of the year, nearly 38% of phishing emails were sent under the guise of the finance departments. Hackers target specific groups and craft persuasive email content for profit.

The email contained a QR Code photo of a phishing website, which lured the recipient to scan and open the link to the fake website. The account would be in the wrong hands if users fall into the trap. QR Code is an image file, which can easily bypass the security systems. Fortunately, there are existing technologies on the market to deal with this type of attack such as grMail’s AI technology, one of the solutions provided by Green Radar, it can precisely identify malicious links, attachments, and QR Codes in emails.

Mr. Francis Lee, Executive VP, Product Marketing at Green Radar, commented, “Cybercrime is getting more advanced, and its tactics against businesses are getting more sophisticated. For the company to have an adequate defence to withstand email attacks, besides choosing an excellent email security service provider, cybersecurity awareness exercises for employees are also indispensable.” Regarding grMail being acknowledged as the leader of email security service provider, he added, ”Frost & Sullivan’s report is an important recognition of Green Radar’s technology research and development. We are dedicated to providing corporate customers with the most tailored and comprehensive email protection solutions, continuously advancing the technology of grMail to enhance local threat intelligence, detection and interception capabilities.”

For more email threat updates, please click to download 2022 Q4 GERTI: Green Radar 2022 Q4 GRETI Press Release_ENG