Return-Path: <1921889-460-1022@be2.maropost.com>
Delivered-To: edward@transocean.com
Received: from vps.transocean.com
	by vps.transocean.com (Dovecot) with LMTP id OSdmK8uukVkebgAAInt2oQ
	for <edward@transocean.com>; Mon, 14 Aug 2017 07:08:11 -0700
Return-path: <1921889-460-1022@be2.maropost.com>
Envelope-to: edward@transocean.com
Delivery-date: Mon, 14 Aug 2017 07:08:11 -0700
Received: from mta7196.mp2200.com ([162.247.117.196]:13283)
	by vps.transocean.com with esmtp (Exim 4.89)
	(envelope-from <1921889-460-1022@be2.maropost.com>)
	id 1dhG28-0007LI-Jz
	for edward@transocean.com; Mon, 14 Aug 2017 07:08:11 -0700
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 s=default; d=knowbe4.com; t=1502719675; l=1; h=from:subject:date:to;
 bh=nR4OLZRZ0GUjrRPiikCTwjFrqv567Fsl8w66LhE1mcQ=;
 b=zdDIDGo7R13aV1hbF+dRAtqCXkwBfOUq7iWcGi6UnmZkjuzJWxb+gwDExWgdgMtDNC64gn
 9E0739BzNYb0T2EuIGalistPVwuIZIRk78sn37URnh+xi5txUewe3vpSyZ5e1l/x0VtIMQ
 6iOaHjHTK/3J8KCrZaK9D8pDuRciUzg=
Received: from [<1921889-460-1022@be2.maropost.com>] ([<1921889-460-1022@be2.maropost.com>] helo=) 
 by 649893-mailer3 (envelope-from 1921889-460-1022@be2.maropost.com)
 (Jetsend MTA 0.0.1 with ESMTP; Mon Aug 14 09:44:19 EDT 2017
Date: Mon, 14 Aug 2017 09:44:17 -0400
From: CyberheistNews <feedback@knowbe4.com>
Reply-To: feedback@knowbe4.com
To: edward@transocean.com
Message-ID: <973b9d60-6324-0135-225b-0cdcd4b634c4@knowbe4.com>
Subject: [ALERT] A Big Locky Ransomware Phishing Attack Infects With the New
 Diablo6 Strain
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary="--==_mimepart_5991a93149c84_5c2f72b6f18306049128";
 charset=UTF-8
Content-Transfer-Encoding: 7bit
List-Unsubscribe: <mailto:1921889-460-1022-162.247.117.196-gmail@abuse.maropost.com>
X-CampaignID: 460
X-Campaign-ID: 460
X-ContactID: 1921889
X-AccountID: 1022
X-Binding: 162.247.117.196
X-DkimDomain: knowbe4.com
X-DkimSelector: default
X-Feedback-ID: 460:Maropost
X-Spam-Status: No, score=-1.2
X-Spam-Score: -11
X-Spam-Bar: -
X-Ham-Report: Spam detection software, running on the system "vps.transocean.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  This email was sent to &amp;lt;b&amp;gt;edward@transocean.com&amp;lt;/b&amp;gt;
    by &amp;lt;b&amp;gt;feedback@knowbe4.com&amp;lt;/b&amp;gt; Manage Subscriptions
    http://newsletter.knowbe4.com/a/1022/unsubscribe/460/1921889/1171fedd5142f8871402e5a815d95ae0f2502430
    33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA Report Spam http://newsletter.knowbe4.com/a/1022/report_spam/460/1921889/1171fedd5142f8871402e5a815d95ae0f2502430
    [...] 
 
 Content analysis details:   (-1.2 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: assetfinanceinternational.com]
  0.0 T_SPF_HELO_TEMPERROR   SPF: test of HELO record failed (temperror)
 -0.0 SPF_PASS               SPF: sender matches SPF record
  0.0 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail
                             domains are different
 -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                             [score: 0.0000]
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.8 MPART_ALT_DIFF         BODY: HTML and text parts are different
  0.0 T_KAM_HTML_FONT_INVALID BODY: Test for Invalidly Named or Formatted
                             Colors in HTML
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                             domain
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay lines
X-Spam-Flag: NO


----==_mimepart_5991a93149c84_5c2f72b6f18306049128
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

This email was sent to &amp;lt;b&amp;gt;edward@transocean.com&amp;lt;/b&amp;gt; by &amp;lt;b&amp;gt;feedback@knowbe4.com&amp;lt;/b&amp;gt;
Manage Subscriptions
http://newsletter.knowbe4.com/a/1022/unsubscribe/460/1921889/1171fedd5142f8871402e5a815d95ae0f2502430
33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA
Report Spam
http://newsletter.knowbe4.com/a/1022/report_spam/460/1921889/1171fedd5142f8871402e5a815d95ae0f2502430


----==_mimepart_5991a93149c84_5c2f72b6f18306049128
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

  <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3=
.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
  <html xmlns=3D"http://www.w3.org/1999/xhtml">
    <head>
      <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DU=
TF-8">
      <meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-sc=
ale=3D1.0">
      <title>[ALERT] A Big Locky Ransomware Phishing Attack Infects With =
the New Diablo6 Strain</title>
    </head>
    <body>
      <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http=
://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><table cellpadding=3D"0" cellspacing=3D"0" width=3D"100%">
<tr><td>
<img height=3D"1" width=3D"1" alt=3D"" style=3D"display:block;" src=3D"ht=
tp://newsletter.knowbe4.com/a/1022/open/460/1921889/1171fedd5142f8871402e=
5a815d95ae0f2502430">
</td></tr>
<tr><td>


<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8">=

<title></title>
<meta charset=3D"utf-8">
<meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-scale=3D=
1">
<meta http-equiv=3D"X-UA-Compatible" content=3D"IE=3Dedge">
<link href=3D"https://fonts.googleapis.com/css?family=3DOpen+Sans:300,400=
,600,700,800" rel=3D"stylesheet">
<style type=3D"text/css">/* CLIENT-SPECIFIC STYLES */
    #outlook a{padding:0;} /* Force Outlook to provide a "view in browser=
" message */
    .ReadMsgBody{width:100%;} .ExternalClass{width:100%;} /* Force Hotmai=
l to display emails at full width */
    .ExternalClass, .ExternalClass p, .ExternalClass span, .ExternalClass=
 font, .ExternalClass td, .ExternalClass div {line-height: 100%;} /* Forc=
e Hotmail to display normal line spacing */
    body, table, td, a{-webkit-text-size-adjust:100%; -ms-text-size-adjus=
t:100%;} /* Prevent WebKit and Windows mobile changing default text sizes=
 */
    table, td{mso-table-lspace:0pt; mso-table-rspace:0pt;} /* Remove spac=
ing between tables in Outlook 2007 and up */
    img{-ms-interpolation-mode:bicubic;} /* Allow smoother rendering of r=
esized image in Internet Explorer */

    /* RESET STYLES */
    body{margin:0; padding:0; background-color:#ffffff;}
    img{border:0; height:auto; line-height:100%; outline:none; text-decor=
ation:none;}
    body{height:100% !important; margin:0; padding:0; width:100% !importa=
nt;}

    /* iOS BLUE LINKS */
    .appleBody a {color:#f16824; text-decoration: none;}
    .appleFooter a {color:#f16824; text-decoration: none;}

    /* MOBILE STYLES */
    @media screen and (max-width: 525px) {
</style>
<!--SUBJECT & DIRECT LINK-->


<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 20px 20px;=
">
<div style=3D"max-width:600px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:left; text-align:left; line-height:12px;"><span style=3D"font-size:10p=
x; line-height:10px; font-family: 'Open Sans', sans-serif; color:#676767;=
">[ALERT] A Big Locky Ransomware Phishing Attack Infects With the New Dia=
blo6 Strain<br>
=C2=A0</span></div>

<div style=3D"max-width:200px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:right; text-align:right; line-height:12px;"><span style=3D"font-size:1=
0px; line-height:10px; font-family: 'Open Sans', sans-serif; color:#67676=
7;">Email not displaying?<br>
<a href=3D"http://newsletter.knowbe4.com/a/1022/click/460/1921889/b0b95ee=
283cb9cc9fc41475b777a158c4a77b943/1171fedd5142f8871402e5a815d95ae0f250243=
0" style=3D"color:#f16824; text-decoration:none;" target=3D"_blank">View =
Knowbe4 Blog</a></span></div>
</div>
<!--SUBJECT & DIRECT LINK--><!--LOGO-->

<div style=3D"max-width:800px; margin:auto; padding: 40px 20px 20px 20px;=
 text-align:center;"><a href=3D"http://newsletter.knowbe4.com/a/1022/clic=
k/460/1921889/044ac0b3da603dc543019ea4b8f92228baf8fbe8/1171fedd5142f88714=
02e5a815d95ae0f2502430" target=3D"_blank"><img align=3D"center" src=3D"ht=
tp://cdn2.hubspot.net/hubfs/241394/CHN-LOGO-2017-1.png" style=3D"width:10=
0%;"></a></div>
<!--/LOGO--><!--ISSUE & DATE-->

<div style=3D"max-width:800px; margin:auto; padding: 0px 20px 0px 20px; t=
ext-align:center;">
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<span style=3D"font-size:14px; line-height:14px; font-family: 'Open Sans'=
, sans-serif; color:#676767;">CyberheistNews Vol 7 #32 =C2=A0 | =C2=A0 Au=
g. 14th., 2017</span>

<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
</div>
<!--/ISSUE & DATE--><!--MAIN STORY-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">[ALERT] A Big Locky Ransomware Phishing A=
ttack Infects With the New Diablo6 Strain</span> <span style=3D"font-size=
:16px; line-height:22px; font-family: 'Open Sans', sans-serif; color: #33=
3333;"> <img align=3D"right" src=3D"http://cdn2.hubspot.net/hubfs/241394/=
CHN-STU-2017-1.png" style=3D" padding: 20px 0px 20px 20px;" width=3D"144"=
><br>
<br>
Security researcher Racco42 discovered a new phishing campaign that is pu=
shing a new Locky strain which appends the .diablo6 extension.<br>
<br>
Larry at Bleepingcomputer wrote: "Locky is back and currently being heavi=
ly distributed worldwide. While Locky was at one point considered the lar=
gest distributed ransomware, over time it became much more common to see =
other ransomware such as Cerber, Spora, and now even GlobeImposter.<br>
<br>
While it is too soon to tell if this is just another brief surge or an at=
tempt to become a large player again, what we do know is that this partic=
ular campaign is strong with a wide distribution."<br>
<br>
This phishing campaign arrives in your end-user's inbox with subject line=
s like E 2017-08-09 (698).docx. The message body simply states "Files att=
ached. Thanks". It is not possible to decrypt the Locky Ransomware Diablo=
6 strain. More technical details and screenshots at the KnowBe4 Blog:<br>=

https://blog.knowbe4.com/locky-ransomware-returns-with-phishing-campaign-=
pushing-the-diablo6-variant </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Report: "Ransomware Attack Downtime, Not =
Ransom Demand, is the Business Killer"</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">I have been saying this here for the last =
few years, and I am encouraged to see it now confirmed by a new survey fr=
om our friends at Malwarebytes.<br>
<br>
They released their =E2=80=9CSecond Annual State of Ransomware Report=E2=80=
=9D, and the study surveyed 1,054 companies with less than 1,000 employee=
s across North America, France, U.K., Germany, Australia, and Singapore.<=
br>
<br>
The report, conducted by Osterman Research, explores ransomware attack fr=
equency, impacts of attacks in SMB environments, costs of attacks, attitu=
des towards ransom payments, preparedness and more.<br>
<br>
<b>22% of impacted businesses had to cease operations immediately</b><br>=

<br>
Survey results found that more than one-third of businesses have experien=
ced a ransomware attack in the last year. Twenty-two percent of these imp=
acted businesses had to cease operations immediately.<br>
<br>
=E2=80=9CBusinesses of all sizes are increasingly at risk for ransomware =
attacks,=E2=80=9D said Marcin Kleczynski, CEO, Malwarebytes. =E2=80=9CHow=
ever, the stakes of a single attack for a small business are far differen=
t from the stakes of a single attack for a large enterprise. Osterman=E2=80=
=99s findings demonstrate that SMBs are suffering in the wake of attacks,=
 to the point where they must cease business operations.<br>
<br>
To make matters worse, most of them lack the confidence in their ability =
to stop an attack, despite significant investments in defensive technolog=
ies. To be effective, the security community must thoroughly understand t=
he battles that these companies are facing, so we can better protect them=
.=E2=80=9D<br>
<br>
=E2=80=9CSecond Annual State of Ransomware Report=E2=80=9D top findings i=
nclude: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>The impact of ransomware on SMBs c=
an be devastating.</b> For roughly one in six impacted organizations, a r=
ansomware infection caused 25 or more hours of downtime, with some organi=
zations reporting that it caused systems to be down for more than 100 hou=
rs. Further, among SMBs that experienced a ransomware attack, 22 percent =
reported that they had to cease business operations immediately, and 15 p=
ercent lost revenue.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>Most organizations make addressing=
 ransomware a high priority, but still lack confidence in their ability t=
o deal with it.</b> Seventy-five percent of organizations surveyed place =
a high or very high priority on addressing the ransomware problem. Despit=
e these investments, nearly one-half of the organizations surveyed expres=
sed little to only moderate confidence in their ability to stop a ransomw=
are attack.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>For many, the source of ransomware=
 is unknown and infections spread quickly.</b> For 27 percent of organiza=
tions that suffered a ransomware infection, decision makers could not ide=
ntify how the endpoint(s) became infected. Further, more than one-third o=
f ransomware infections spread to other devices. For two percent of organ=
izations surveyed, the ransomware infection impacted every device on the =
network.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>SMBs in the U.S. are being hit har=
der than SMBs in Europe by malicious emails containing ransomware.</b> Th=
e most common source of ransomware infections in U.S.-based organizations=
 was related to email use. Thirty-seven percent of attacks on SMBs in the=
 U.S. were reported as coming from a malicious email attachment and 27 pe=
rcent were from a malicious link in an email. However, in Europe, only 22=
 percent of attacks were reported as coming from a malicious email attach=
ment. An equal number were reported as coming from malicious link in an e=
mail.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>Most SMBs do not believe in paying=
 ransomware demands.</b> Seventy-two percent of respondents believe that =
ransomware demands should never be paid. Most of the remaining organizati=
ons believe that demands should only be paid if the encrypted data is of =
value to the organization. Among organizations that chose not to pay cybe=
rcriminals=E2=80=99 ransom demands, about one-third lost files as a resul=
t.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>The financial services industry is=
 most concerned about ransomware. Transportation entities are least conce=
rned.</b> Fifty-four percent of firms in the financial services industry =
are concerned or extremely concerned about ransomware. Meanwhile, only 26=
 percent of transportation entities are this concerned about ransomware.<=
/span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;"><b>Current investments in technology =
might not be enough.</b> Over one-third of SMBs claim to have been runnin=
g anti-ransomware technologies, while about one-third of businesses surve=
yed still experienced a ransomware attack.</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> =E2=80=9CIt=E2=80=99s clear from these fi=
ndings that there is widespread awareness of the threat of ransomware amo=
ng businesses, but many are not yet confident in their ability to deal wi=
th it,=E2=80=9D said Adam Kujawa, Director of Malware Intelligence, Malwa=
rebytes. =E2=80=9CCompanies of all sizes need to remain vigilant and cont=
inue to place a higher priority on protecting themselves against ransomwa=
re.=E2=80=9D<br>
<br>
To view the full global =E2=80=9CSecond Annual State of Ransomware=E2=80=9D=
 report for more detailed findings and analysis, visit:<br>
https://go.malwarebytes.com/OstermanRansomware2017_PRSocial.html<br>
<br>
I strongly suggest you get a quote for new-school security awareness trai=
ning for your organization and find out how affordable this is. You simpl=
y have got to start training and phishing your users ASAP to prevent rans=
omware infections because your filters never catch all of it. Get a quote=
 now and you will be pleasantly surprised:<br>
https://info.knowbe4.com/kmsat_get_a_quote_now-chn </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Cyber-Attacks Soar by a Quarter as Phishi=
ng Dominates</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">Cyber-attacks were up by a quarter in Q2 2=
017, with a surprising twist: global manufacturing is now the top target.=
 The report from NTT Security also shows that phishing is still the most =
popular threat vector, two-thirds (67%) of attacks came in the form of ju=
st such a threat.<br>
<br>
NTT is a very large global managed security provider, and they came out w=
ith: "Global Threat Intelligence Center (GTIC) Quarterly Threat Intellige=
nce Report" showing there was a 24% increase in attacks on its worldwide =
customer base in the period of April to June, with a third (34%) of all a=
ttacks targeting manufacturers.<br>
<br>
This data actually gets confirmed by Verizon, who claimed in their recent=
 Data Breach Investigations Report 2017 that phishing attacks were way up=
 from the previous reporting period. The tactic of embedding malicious VB=
A macros into documents sent via phishing emails was particularly popular=
.<br>
<br>
Here are a few NTT highlights: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">In terms of attack types, 'reconnaiss=
ance' (33%) dominated the manufacturing threat landscape in the period, f=
ollowed by brute-force attacks (22%) and regular malware (9%).</span></li=
>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">Public-facing Microsoft SQL (MSSQL) s=
ervers were popular targets for brute-forcing.</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">Over a third (37%) of manufacturers c=
laimed they don=E2=80=99t have an incident response plan in place. OUCH</=
span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> =E2=80=9CThe motivations for these attack=
s are often criminal in nature, including extortion via ransomware, indus=
trial espionage, and theft of data such as account numbers,=E2=80=9D said=
 Jon Heimerl, manager of NTT Security=E2=80=99s Threat Intelligence Commu=
nication Team.<br>
<br>
=E2=80=9CWhat poses an even greater problem is that when these breaches a=
re successful, yet go undetected, they allow hackers to establish foothol=
ds in organizations=E2=80=99 networks where they have no restraints and w=
reak havoc over extended periods.=E2=80=9D<br>
<br>
=E2=80=9CThis is very concerning as manufacturers=E2=80=99 IT security li=
abilities often impacted not just the manufacturing organizations, but su=
ppliers, as well as related industries and consumers,=E2=80=9D said Heime=
rl. Blog Post with links:<br>
https://blog.knowbe4.com/cyber-attacks-soar-by-a-quarter-as-phishing-domi=
nates </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Find out Which User's Passwords Are Weak =
for a Chance to Win!</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">Are your user=E2=80=99s passwords=E2=80=A6=
P@ssw0rd? Verizon's recent Data Breach Report showed that 81% of hacking-=
related breaches used either stolen and/or weak passwords. Employees are =
the weakest link in your network security.<br>
<br>
KnowBe4's Weak Password Test checks your Active Directory for 10 differen=
t types of weak password related threats and reports any fails so that yo=
u can take action. Plus, you=E2=80=99ll be entered to win a Nintendo Swit=
ch!<br>
<br>
Also, EVERYONE in the US/Canada will receive a real Kevin Mitnick collect=
ible stainless-steel lock-pick business card!<br>
<br>
This will take you 5 minutes and may give you some insights you never exp=
ected.<br>
https://info.knowbe4.com/wpt-sweepstakes-082017 </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">OK, Who -Is- This Stu Guy Anyway? [VIDEO]=
</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">I had a freelance video PR crew follow me =
one day at Black Hat, and here are two short clips that will give you an =
idea of who the heck I am.<br>
<br>
One is the show, the other one is an interview question. If you do not kn=
ow me, I hope I am making a good first impression! :-D<br>
<br>
https://www.knowbe4.com/hubfs/Rants/Stu%20-%20Short%20Vlog%20Final%20Cut.=
mp4<br>
https://www.knowbe4.com/hubfs/Rants/Rants%20Copy%2004.mp4<br>
<br>
Let's stay safe out there. </span>

<p align=3D"left"><span style=3D"font-size:16px; line-height:22px; font-f=
amily: 'Open Sans', sans-serif; color: #333333;">Warm Regards,<br>
Stu Sjouwerman<br>
Founder and CEO<br>
KnowBe4, Inc.</span></p>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> </span>
</div>
<!--/MAIN STORY--><!--QUOTES DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Quotes of the Week</span></div=
>
<!--/QUOTES DIV--><!--QUOTES TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:center;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><i>"If you focus on the hurt, you will cont=
inue to suffer. If you focus on the lesson, you will continue<br>
to grow."</i> - Buddha<br>
<br>
<i>"The best revenge is no revenge. Just forget they exist."</i> - Buddha=
 </span><br>
=C2=A0
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><strong>Thanks for reading CyberheistNews</=
strong><br>
But if you want to unsubscribe, you can do that <a href=3D"http://newslet=
ter.knowbe4.com/a/1022/click/460/1921889/486ae771c748e753c0a203927ab7bc2a=
f91a1576/1171fedd5142f8871402e5a815d95ae0f2502430" style=3D"color:#f16824=
; text-decoration:none;" target=3D"_blank">right here</a><br>
<br>
<strong>You can read CyberheistNews online at our Blog</strong><br>
https://blog.knowbe4.com/cyberheistnews-vol-7-32-alert-a-big-locky-ransom=
ware-phishing-attack-infects-with-the-new-diablo6-strain </span>
</div>
<!--/QUOTES TEXT--><!--SECURITY DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Security News</span></div>
<!--/SECURITY DIV--><!--SECURITY TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">APT28 Uses Spear Phishing and NSA EternalBlue Exploit to Attack H=
otel Wi-Fi</span><br>
<br>
Russian APT28 (aka the Fancy Bear hacking group) is harnessing EternalBlu=
e; NSA's Windows SMB exploit which made the WannaCry ransomware and Petya=
 so effective =E2=80=94 and are using it to spread laterally in cyber att=
acks against hotels in Europe. Wait for the same thing to happen in the U=
.S. (By the way, did you apply the MS17-010 patch yet?)<br>
<br>
Researchers at FireEye posted that they uncovered a malicious document se=
nt in spear phishing emails to multiple companies in the hospitality indu=
stry, including hotels in at least seven European countries and one Middl=
e Eastern country in early July. Successful execution of the macro within=
 the malicious document results in the installation of APT28=E2=80=99s si=
gnature GameFish malware.<br>
<br>
As soon as GameFish is successfully installed, it takes advantage of Eter=
nalBlue to worm its way into the network and compromises personal compute=
rs used for controlling both guest and and internal Wi-Fi networks. Once =
in control of these machines, the malware deploys an open source Responde=
r tool, allowing it to steal any credentials sent over the wireless netwo=
rk.<br>
<br>
"This is the first time we have seen APT28 incorporate this exploit into =
their intrusions, and as far as we believe, the variant used was based on=
 the public version," Cristiana Brafman Kittner, senior analyst at FireEy=
e, told ZDNet. FireEye warns that publicly accessible Wi-Fi networks pres=
ent a significant threat and "should be avoided when possible".<br>
<br>
With the public release of the EternalBlue exploit, it's not surprising t=
hat hacking groups are looking to harness that and other Vault7 leaks for=
 their own gain. It's an epic fail that the American intelligence communi=
ty lost control of this toolkit and let the genie out of the box.<br>
<br>
<b>Recommendation</b><br>
<br>
For C-level execs that need to do a lot of travel, I recommend an iPad Pr=
o, with its own cell-phone number, and use VPN to connect to any remote s=
ervers. I would tell them to avoid Wi-Fi on the road all together. Also, =
never run any software updates while traveling. I have successfully used =
this setup for a few years now.<br>
<br>
<b>Phish Your Users With Office Document Attachments That Have Macros</b>=
<br>
<br>
It's a must these days to send all employees simulated phishing attacks w=
ith Office attachments that have macros and see if they open that documen=
t and click on "Enable Editing". If they do, that means a social engineer=
ing failure and they need to get some remedial training immediately. Also=
, give them access to the KnowBe4 complimentary Phish Alert Button so tha=
t they can forward phishy emails to your Incident Response team.<br>
<br>
<b>Complimentary Phish Alert Button</b><br>
<br>
When new spear phishing campaigns hit your organization, it is vital that=
 IT staff be alerted immediately. One of the easiest ways to convert your=
 employees from potential targets and victims into allies and partners in=
 the fight against cybercrime is to roll out KnowBe4's complimentary Phis=
h Alert Button to your employees' desktops. Once installed, the Phish Ale=
rt Button allows your users to sound the alarm as a last line of defense =
when suspicious and potentially dangerous phishing emails slip past all t=
he other layers of protection your organization relies on to keep the bad=
 guys at bay.<br>
<br>
Get Your Phish Alert Button Here:<br>
https://info.knowbe4.com/phish-alert-chn </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Destructive, Disk-Encrypting Mamba Ransomware Springs Back to Lif=
e</span><br>
<br>
The Mamba family of ransomware has suddenly returned -- and it's encrypti=
ng the entire hard drives of targeted organisations again.<br>
<br>
A powerful form of ransomware, which encrypts whole hard drives instead o=
f just files, has suddenly returned -- and there's no way for victims to =
decrypt the data.<br>
<br>
Similar tactics have been used in other ransomware attacks, most notably =
Petya, which experts said was designed to outright destroy data rather th=
an generate ransom money.<br>
<br>
The return of Mamba ransomware has been flagged by Kaspersky Lab. Its ret=
urn comes after researchers recently suggested that ransomware designed f=
or destruction, rather than extorting a Bitcoin ransom for profit, is set=
 to become the new normal.<br>
<br>
While Mamba isn't a particularly common form of ransomware, it claimed a =
high-profile victim in the form of the San Francisco Municipal Transporta=
tion Agency in November last year. The attack forced the SFMTA operators =
to temporarily open the gates of ticket barriers and allow passengers to =
travel on the trains for no charge in order to minimise disruption.<br>
<br>
The effectiveness of the ransomware stems partially from its use of a leg=
itimate open source software tool, DiskCryptor, to fully lock down the ha=
rd drive of targeted organisations. Mamba first appeared in September 201=
6 and mainly targets corporates and other large organisations.<br>
<br>
Unlike other forms of ransomware which usually have a set ransom, the att=
ackers behind Mamba alter their demand depending on the number of systems=
 infected.<br>
<br>
"For every victim this group is demanding different amounts of bitcoins. =
This depends on how many endpoints and server were affected," Anton Ivano=
v, Senior Malware Analyst at Kaspersky Lab told ZDNet:<br>
http://www.zdnet.com/article/destructive-disk-encrypting-mamba-ransomware=
-springs-back-to-life/ </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Social Engineering: The Basics</span><br>
<br>
Excellent article if you submit budget for awareness training and need a =
"Social Engineering 101" for the people holding the purse strings. The ar=
ticle forgets to mention KnowBe4 but never mind. :-)<br>
<br>
"That firewall won't mean much if your users are tricked into clicking on=
 a malicious link they think came from a Facebook friend or LinkedIn conn=
ection. Here's what you need to know to protect your organization and you=
r users.<br>
<br>
Social engineering is essentially the art of gaining access to buildings,=
 systems or data by exploiting human psychology, rather than by breaking =
in or using technical hacking techniques. For example, instead of trying =
to find a software vulnerability, a social engineer might call an employe=
e and pose as an IT support person, trying to trick the employee into div=
ulging his password.<br>
<br>
Even if you've got all the bells and whistles when it comes to securing y=
our data center, your cloud deployments, your building's physical securit=
y, and you've invested in defensive technologies, have the right security=
 policies and processes in place and measure their effectiveness and cont=
inuously improve, still a crafty social engineer can weasel his way right=
 through (or around).<br>
<br>
Here are answers to some frequently asked questions about social engineer=
ing, including the common tactics social engineers use and tips for ensur=
ing your staff is on guard."" Here goes:<br>
http://www.itnews.com/article/2124681/social-engineering/security-awarene=
ss-social-engineering-the-basics.html </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">In Illinois, Cybersecurity Training for State Employees Now Requi=
red by Law</span><br>
<br>
On Aug. 7, Gov. Bruce Rauner signed legislation, which he called a welcom=
e display of "bipartisanship," aimed at educating end users and strengthe=
ning the state's first line of defense against cyberattacks.<br>
<br>
The state of Illinois, which has taken pioneering strides with various bl=
ockchain projects in testing new Internet technology, is taking additiona=
l steps to improve cybersecurity at its first line of defense: with end u=
sers.<br>
<br>
On Monday, Aug. 7, Gov. Bruce Rauner signed House Bill 2371, an amendment=
 to the state=E2=80=99s Data Security on State Computers Act requiring an=
nual cybersecurity training from the Department of Innovation and Technol=
ogy (DoIT) for state employees.<br>
<br>
The amendment allows DoIT to adopt rules to implement the training and to=
 make the training an online course. It also requires that the education =
cover how to detect phishing scams; prevent spyware infections and identi=
ty theft; and how to prevent and respond to data breaches. It takes effec=
t on Jan. 1, 2018. More:<br>
http://www.govtech.com/policy/In-Illinois-Cybersecurity-Training-for-Stat=
e-Employees-Now-Required-by-Law.html<br>
<br>
<b>OCR Tells Organizations to Step up Phishing Scam Awareness</b><br>
<br>
And proof that this is needed comes from the OCR, which tells organizatio=
ns to step up phishing scam awareness, because employees still falling fo=
r email schemes, leading to more breaches.<br>
<br>
"Employees are still falling for phishing scams that are leading to major=
 breaches, including those related to ransomware attacks such as WannaCry=
, say federal regulators who are urging healthcare entities to step up th=
eir workforce training and awareness of email schemes.<br>
<br>
In its latest monthly cybersecurity email newsletter, the Department of H=
ealth and Human Services notes that a 2017 study by consulting firm KPMG =
found a 10 percent increase over the past two years in the number of heal=
thcare providers and health plans that have had instances of security-rel=
ated HIPAA violations or cyberattacks impacting protected health informat=
ion."<br>
<br>
Phishing, however, is a favorite vehicle of hackers launching attacks tha=
t are increasingly resulting in breaches of PHI, OCR says.<br>
<br>
"This increase in HIPAA violations includes breaches due to ransomware ev=
ents, such as WannaCry, and other cyberattacks which could have been prev=
ented by an informed workforce trained to detect and properly respond to =
them," OCR adds. "Training on data security for workforce members is not =
only essential for protecting an organization against cyberattacks, it is=
 also required by the HIPAA Security Rule." More:<br>
http://www.inforisktoday.com/ocr-tells-organizations-to-step-up-phishing-=
scam-awareness-a-10174? </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Interesting News Items This Week</span><br>
<br>
IRS Warns of Fake Tax Software Update Scheme:<br>
http://www.bankinfosecurity.com/irs-warns-fake-tax-software-update-scheme=
-a-10182<br>
<br>
Malicious code written into DNA infects the computer that reads it:<br>
https://techcrunch.com/2017/08/09/malicious-code-written-into-dna-infects=
-the-computer-that-reads-it/<br>
<br>
Botched Firmware Update Bricks Hundreds of Smart Door Locks:<br>
https://www.bleepingcomputer.com/news/hardware/botched-firmware-update-br=
icks-hundreds-of-smart-door-locks/<br>
<br>
FireEye's Post Mortem: Analyst Didn't Change Passwords:<br>
http://www.bankinfosecurity.com/fireeyes-post-mortem-analyst-didnt-change=
-passwords-a-10175?<br>
<br>
=E2=80=98Stunning=E2=80=99 growth in records exposed in data breaches:<br=
>
http://assetfinanceinternational.com/index.php/technology/technology-arch=
ive/technology-articles/15718-stunning-growth-in-records-exposed-in-data-=
breaches </span></div>
<!--/SECURITY TEXT--><!--FAVE DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Cyberheist 'Fave' Links</span>=
</div>
<!--/FAVE DIV--><!--FAVE TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><span style=3D"font-size: 24px; line-height=
:30px; font-family: 'Open Sans', sans-serif; color: #f16622;">This Week's=
 Links We Like, Tips, Hints and Fun Stuff</span> </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">The revolving sail bridge that looks l=
ike a dragonfly Transformer:<br>
	http://newatlas.com/margot-krasojevic-revolving-sail-bridge/50782/</span=
></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">=E2=80=9C101 Fascinating Facts That Yo=
u Didn't Know About Domain Names=E2=80=9D It has a timeline, demographics=
 and a variety of different facts about domain names:<br>
	https://webmastersjury.com/101-facts-about-domain-names-that-you-must-kn=
ow/</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Watch closely as Will Tsai brings his =
pet fish back to life on America's Got Talent 2017:<br>
	http://www.flixxy.com/magician-will-tsai-makes-pet-fish-reappear-america=
s-got-talent-2017.htm?utm_source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Canadian artist Serge Belo has created=
 the world's largest water mosaic, to raise awareness about the shortage =
of clean water globally:<br>
	http://www.flixxy.com/artist-creates-worlds-largest-water-mosaic-with-66=
000-cups.htm</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Train Wreck: Experiments To Derail Tra=
ins - Very interesting Archive Footage:<br>
	https://www.youtube.com/watch?v=3DD-8gV4DJZUw</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">For the kids: bear cubs hitch a ride o=
n mom's back as she swims across Lake Aleknagik in Alaska:<br>
	http://www.flixxy.com/a-ride-across-the-lake-is-a-bear-necessity-for-the=
se-two-cubs.htm?utm_source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">These dogs are incredible! Here are th=
e best of the best at the Crufts Agility Championship final:<br>
	http://www.flixxy.com/fastest-runs-from-the-agility-championship-final-a=
t-crufts-2017.htm?utm_source=3D4</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"> </span>
</div>
<!--/FAVE TEXT--><!--SOCIAL & COPYRIGHT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 20px 20px;=
">
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<div style=3D"max-width:400px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:left; text-align:left; line-height:12px;"><span style=3D"font-size:10p=
x; line-height:10px; font-family: 'Open Sans', sans-serif; color:#676767;=
">FOLLOW US ON: <a href=3D"http://newsletter.knowbe4.com/a/1022/click/460=
/1921889/12f6f18bb2280eb257fda0ee104ee0a8a9355394/1171fedd5142f8871402e5a=
815d95ae0f2502430" style=3D"color:#f16824; text-decoration:none;" target=3D=
"_blank">Twitter</a> | <a href=3D"http://newsletter.knowbe4.com/a/1022/cl=
ick/460/1921889/35c8d23f428e99808212e79c497c5c7904ccc19f/1171fedd5142f887=
1402e5a815d95ae0f2502430" style=3D"color:#f16824; text-decoration:none;" =
target=3D"_blank">LinkedIn</a> | <a href=3D"http://newsletter.knowbe4.com=
/a/1022/click/460/1921889/665fd8e8468a0fa0d279b30bd4c7ba97f04517dd/1171fe=
dd5142f8871402e5a815d95ae0f2502430" style=3D"color:#f16824; text-decorati=
on:none;" target=3D"_blank">Google</a> | <a href=3D"http://newsletter.kno=
wbe4.com/a/1022/click/460/1921889/947165ed658284c668dbae4f407761b5796d074=
5/1171fedd5142f8871402e5a815d95ae0f2502430" style=3D"color:#f16824; text-=
decoration:none;" target=3D"_blank">YouTube</a></span></div>

<div style=3D"max-width:400px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:right; text-align:right; line-height:12px;"><span style=3D"font-size:1=
0px; line-height:10px; font-family: 'Open Sans', sans-serif; color:#67676=
7;">Copyright =C2=A9 2014-2017 KnowBe4, Inc. All rights reserved.</span><=
/div>
</div>
<!--SOCIAL & COPYRIGHT-->


</td></tr>
<tr><td>
<div class=3D"footersp" style=3D"height:1px; width: 100%; margin-left: au=
to; margin-right: auto; background-color:black;display:block !important;"=
>=C2=A0</div>
=C2=A0

<div class=3D"footerco" style=3D"margin-left: auto; margin-right: auto; w=
idth: 100%; background-color:#ffffff !important; display:block !important=
;">
<table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" style=3D"width:10=
0%; display:table !important;">
	<tbody>
		<tr style=3D"display:table-row !important;">
			<td style=3D"width:20%; display:table-cell !important;">=C2=A0</td>
			<td align=3D"center" style=3D"mso-table-lspace: 0pt;mso-table-rspace: =
0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;text-align:=
center;vertical-align:middle; display:table-cell !important;font-size:8.0=
pt; font-family:'Arial','sans-serif'; color:#666666;">This email was sent=
 to <b>edward@transocean.com</b> by <b>feedback@knowbe4.com</b><br>
			<br>
			33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA<br>
			=C2=A0
			<div style=3D"display:block"><a class=3D"maro_no_record" href=3D"http:=
//newsletter.knowbe4.com/a/1022/one_click_unsubscribe/460/1921889/1171fed=
d5142f8871402e5a815d95ae0f2502430" rel=3D"nofollow" style=3D"border:0px;c=
olor:#000;display:inline !important;">1-Click Unsubscribe</a></div>
			</td>
			<td align=3D"right" style=3D"text-align:right;mso-table-lspace: 0pt;ms=
o-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: =
100%;width:20%;vertical-align:middle; display:table-cell !important;font-=
size:8.0pt; font-family:'Arial','sans-serif'; color:#666666;" valign=3D"m=
iddle">=C2=A0</td>
		</tr>
	</tbody>
</table>
</div>
</td></tr>
</table></body></html>


    </body>
  </html>

----==_mimepart_5991a93149c84_5c2f72b6f18306049128--
