Return-Path: <1921889-488-1022@be5.maropost.com>
Delivered-To: edward@transocean.com
Received: from vps.transocean.com
	by vps.transocean.com (Dovecot) with LMTP id wbTcDbQfpFlFPQAAInt2oQ
	for <edward@transocean.com>; Mon, 28 Aug 2017 06:50:44 -0700
Return-path: <1921889-488-1022@be5.maropost.com>
Envelope-to: edward@transocean.com
Delivery-date: Mon, 28 Aug 2017 06:50:44 -0700
Received: from mta7168.mp2200.com ([162.247.117.168]:53704)
	by vps.transocean.com with esmtp (Exim 4.89)
	(envelope-from <1921889-488-1022@be5.maropost.com>)
	id 1dmKQu-00048c-Uv
	for edward@transocean.com; Mon, 28 Aug 2017 06:50:44 -0700
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
 s=default; d=knowbe4.com; t=1503928228; l=1; h=from:subject:date:to;
 bh=nR4OLZRZ0GUjrRPiikCTwjFrqv567Fsl8w66LhE1mcQ=;
 b=itXgODBmbQDBtsLtg0wjXOZ7llliZoXjJVYMz9j+QGEcGJ5F3w8rSabdeqjdatdxGDkebN
 ZQ0lSC/StVLH6pccZUxeN1typMT0M4alS2WR97QlnUpjMwFUkCg2R8igW9KBsAdW3Ww98Y
 aOGNZF+JDYjWY1Go8xAVUF1lhXpO0bU=
Received: from [<1921889-488-1022@be5.maropost.com>] ([<1921889-488-1022@be5.maropost.com>] helo=) 
 by 771426-mailer10 (envelope-from 1921889-488-1022@be5.maropost.com)
 (Jetsend MTA 0.0.1 with ESMTP; Mon Aug 28 09:27:26 EDT 2017
Date: Mon, 28 Aug 2017 09:27:24 -0400
From: CyberheistNews <feedback@knowbe4.com>
Reply-To: feedback@knowbe4.com
To: edward@transocean.com
Message-ID: <8d834f10-6e22-0135-48e2-1402ec83b870@knowbe4.com>
Subject: Scam of the Week: Hurricane Harvey Charity Fraud
Mime-Version: 1.0
Content-Type: multipart/alternative;
 boundary="--==_mimepart_59a41a3cc0b6c_5c6971ad7ac4096172da";
 charset=UTF-8
Content-Transfer-Encoding: 7bit
List-Unsubscribe: <mailto:1921889-488-1022-162.247.117.168-gmail@abuse.maropost.com>
X-CampaignID: 488
X-Campaign-ID: 488
X-ContactID: 1921889
X-AccountID: 1022
X-Binding: 162.247.117.168
X-DkimDomain: knowbe4.com
X-DkimSelector: default
X-Feedback-ID: 488:Maropost
X-Spam-Status: No, score=-1.2
X-Spam-Score: -11
X-Spam-Bar: -
X-Ham-Report: Spam detection software, running on the system "vps.transocean.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  This email was sent to &amp;lt;b&amp;gt;edward@transocean.com&amp;lt;/b&amp;gt;
    by &amp;lt;b&amp;gt;feedback@knowbe4.com&amp;lt;/b&amp;gt; Manage Subscriptions
    http://newsletter.knowbe4.com/a/1022/unsubscribe/488/1921889/91dbe84ad75083502cd89e9d95d9aaacffda766b
    33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA Report Spam http://newsletter.knowbe4.com/a/1022/report_spam/488/1921889/91dbe84ad75083502cd89e9d95d9aaacffda766b
    [...] 
 
 Content analysis details:   (-1.2 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: newyorklawjournal.com]
  0.0 T_SPF_TEMPERROR        SPF: test of record failed (temperror)
  0.0 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail
                             domains are different
 -0.0 SPF_HELO_PASS          SPF: HELO matches SPF record
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.0 T_KAM_HTML_FONT_INVALID BODY: Test for Invalidly Named or Formatted
                             Colors in HTML
  0.8 MPART_ALT_DIFF         BODY: HTML and text parts are different
 -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%
                             [score: 0.0000]
 -0.1 DKIM_VALID             Message has at least one valid DKIM or DK signature
  0.1 DKIM_SIGNED            Message has a DKIM or DK signature, not necessarily valid
 -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from author's
                             domain
  0.0 UNPARSEABLE_RELAY      Informational: message has unparseable relay lines
X-Spam-Flag: NO


----==_mimepart_59a41a3cc0b6c_5c6971ad7ac4096172da
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

This email was sent to &amp;lt;b&amp;gt;edward@transocean.com&amp;lt;/b&amp;gt; by &amp;lt;b&amp;gt;feedback@knowbe4.com&amp;lt;/b&amp;gt;
Manage Subscriptions
http://newsletter.knowbe4.com/a/1022/unsubscribe/488/1921889/91dbe84ad75083502cd89e9d95d9aaacffda766b
33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA
Report Spam
http://newsletter.knowbe4.com/a/1022/report_spam/488/1921889/91dbe84ad75083502cd89e9d95d9aaacffda766b


----==_mimepart_59a41a3cc0b6c_5c6971ad7ac4096172da
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

  <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3=
.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
  <html xmlns=3D"http://www.w3.org/1999/xhtml">
    <head>
      <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DU=
TF-8">
      <meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-sc=
ale=3D1.0">
      <title>Scam of the Week: Hurricane Harvey Charity Fraud</title>
    </head>
    <body>
      <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http=
://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><table cellpadding=3D"0" cellspacing=3D"0" width=3D"100%">
<tr><td>
<img height=3D"1" width=3D"1" alt=3D"" style=3D"display:block;" src=3D"ht=
tp://newsletter.knowbe4.com/a/1022/open/488/1921889/91dbe84ad75083502cd89=
e9d95d9aaacffda766b">
</td></tr>
<tr><td>


<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF-8">=

<title></title>
<meta charset=3D"utf-8">
<meta name=3D"viewport" content=3D"width=3Ddevice-width, initial-scale=3D=
1">
<meta http-equiv=3D"X-UA-Compatible" content=3D"IE=3Dedge">
<link href=3D"https://fonts.googleapis.com/css?family=3DOpen+Sans:300,400=
,600,700,800" rel=3D"stylesheet">
<style type=3D"text/css">/* CLIENT-SPECIFIC STYLES */
    #outlook a{padding:0;} /* Force Outlook to provide a "view in browser=
" message */
    .ReadMsgBody{width:100%;} .ExternalClass{width:100%;} /* Force Hotmai=
l to display emails at full width */
    .ExternalClass, .ExternalClass p, .ExternalClass span, .ExternalClass=
 font, .ExternalClass td, .ExternalClass div {line-height: 100%;} /* Forc=
e Hotmail to display normal line spacing */
    body, table, td, a{-webkit-text-size-adjust:100%; -ms-text-size-adjus=
t:100%;} /* Prevent WebKit and Windows mobile changing default text sizes=
 */
    table, td{mso-table-lspace:0pt; mso-table-rspace:0pt;} /* Remove spac=
ing between tables in Outlook 2007 and up */
    img{-ms-interpolation-mode:bicubic;} /* Allow smoother rendering of r=
esized image in Internet Explorer */

    /* RESET STYLES */
    body{margin:0; padding:0; background-color:#ffffff;}
    img{border:0; height:auto; line-height:100%; outline:none; text-decor=
ation:none;}
    body{height:100% !important; margin:0; padding:0; width:100% !importa=
nt;}

    /* iOS BLUE LINKS */
    .appleBody a {color:#f16824; text-decoration: none;}
    .appleFooter a {color:#f16824; text-decoration: none;}

    /* MOBILE STYLES */
    @media screen and (max-width: 525px) {
</style>
<!--SUBJECT & DIRECT LINK-->


<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 20px 20px;=
">
<div style=3D"max-width:600px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:left; text-align:left; line-height:12px;"><span style=3D"font-size:10p=
x; line-height:10px; font-family: 'Open Sans', sans-serif; color:#676767;=
">Scam of the Week: Hurricane Harvey Charity Fraud<br>
=C2=A0</span></div>

<div style=3D"max-width:200px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:right; text-align:right; line-height:12px;"><span style=3D"font-size:1=
0px; line-height:10px; font-family: 'Open Sans', sans-serif; color:#67676=
7;">Email not displaying?<br>
<a href=3D"http://newsletter.knowbe4.com/a/1022/click/488/1921889/b0b95ee=
283cb9cc9fc41475b777a158c4a77b943/91dbe84ad75083502cd89e9d95d9aaacffda766=
b" style=3D"color:#f16824; text-decoration:none;" target=3D"_blank">View =
Knowbe4 Blog</a></span></div>
</div>
<!--SUBJECT & DIRECT LINK--><!--LOGO-->

<div style=3D"max-width:800px; margin:auto; padding: 40px 20px 20px 20px;=
 text-align:center;"><a href=3D"http://newsletter.knowbe4.com/a/1022/clic=
k/488/1921889/044ac0b3da603dc543019ea4b8f92228baf8fbe8/91dbe84ad75083502c=
d89e9d95d9aaacffda766b" target=3D"_blank"><img align=3D"center" src=3D"ht=
tp://cdn2.hubspot.net/hubfs/241394/CHN-LOGO-2017-1.png" style=3D"width:10=
0%;"></a></div>
<!--/LOGO--><!--ISSUE & DATE-->

<div style=3D"max-width:800px; margin:auto; padding: 0px 20px 0px 20px; t=
ext-align:center;">
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<span style=3D"font-size:14px; line-height:14px; font-family: 'Open Sans'=
, sans-serif; color:#676767;">CyberheistNews Vol 7 #34 =C2=A0 | =C2=A0 Au=
g. 28th., 2017</span>

<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
</div>
<!--/ISSUE & DATE--><!--MAIN STORY-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Scam of the Week: Hurricane Harvey Charit=
y Fraud</span> <span style=3D"font-size:16px; line-height:22px; font-fami=
ly: 'Open Sans', sans-serif; color: #333333;"> <img align=3D"right" src=3D=
"http://cdn2.hubspot.net/hubfs/241394/CHN-STU-2017-1.png" style=3D" paddi=
ng: 20px 0px 20px 20px;" width=3D"144"><br>
<br>
Hurricane Harvey hit hard and especially Houston, TX got badly flooded. T=
he death toll is rising and you can also count on low-life cyber-scum exp=
loiting this disaster.<br>
<br>
Disgusting.<br>
<br>
Scammers are now using the Hurricane Harvey disaster to trick people in c=
licking on links, on Facebook, Twitter and phishing emails trying to soli=
cit charitable giving for the flood victims.<br>
<br>
Here are some examples: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">Facebook pages dedicated to victim re=
lief contain links to scam websites.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">Tweets are going out with links to ch=
aritable websites soliciting donations, but in reality include links to s=
cam sites or links that lead to a malware infection.</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color: #333333;">Phishing emails dropping in a user's =
inbox asking for donations to #HurricaneHarvey Relief Fund.</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> Previous disasters have been exploited li=
ke this, and the bad guys are going at it again will all guns blazing. Be=
 wary of anything online covering the Hurricane Harvey disaster in the fo=
llowing weeks.<br>
<br>
I suggest you send employees, friends and family an email about this Scam=
 of the Week, you're welcome to copy/paste/edit:<br>
<br>
<i>"Heads-up! Bad guys are exploiting the Hurricane Harvey disaster. Ther=
e are fake Facebook pages, tweets are going out with fake charity website=
s, and phishing emails are sent out asking for donations to #HurricaneHar=
vey Relief Funds that they keep for themselves. Don't fall for any scams.=
 If you want to make a donation, go to the website of the charity of your=
 choice and make a donation. Type the address in your browser or use a bo=
okmark. Do not click on any links in emails or text you might get. Whatev=
er you see in the coming weeks about Hurricane Harvey disaster relief... =
THINK BEFORE YOU CLICK.</i><br>
<br>
For KnowBe4 customers, at Monday Morning 8/28 at 10:00am we will have a n=
ew template in Current Events about "Hurricane Harvey." Send this to your=
 employees as soon as possible to inoculate them against disaster relief =
scams like this.<br>
<br>
Let's stay safe out there. </span>

<p align=3D"left"><span style=3D"font-size:16px; line-height:22px; font-f=
amily: 'Open Sans', sans-serif; color: #333333;">Warm Regards,<br>
Stu Sjouwerman<br>
Founder and CEO<br>
KnowBe4</span></p>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"> </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">[ALERT] The RopeMaker Exploit Can CHANGE =
an Already Delivered Email</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;"><b>Our friends at Mimecast are warning aga=
inst something scary. This is a sobering example of why scanners and filt=
ers will always be behind in the security arms race...</b><br>
<br>
They wrote: "Most people live under the assumption that email is immutabl=
e once delivered, like a physical letter. A new email exploit, dubbed ROP=
EMAKER by Mimecast=E2=80=99s research team, turns that assumption on its =
head, undermining the security and non-repudiation of email; even for tho=
se that use SMIME or PGP for signing." The attack works by remotely alter=
ing cascading style sheets (CSS) in HTML emails."<br>
<br>
Using the ROPEMAKER exploit a malicious actor can change the displayed co=
ntent in an email at will. For example, a malicious actor could swap a be=
nign URL with a malicious one in an email already delivered to your inbox=
, turn simple text into a malicious URL, or edit any text in the body of =
an email whenever they want. <i>All of this can be done without direct ac=
cess to the inbox.</i><br>
<br>
<b>So what is ROPEMAKER?</b><br>
<br>
The origin of ROPEMAKER lies at the intersection of email and Web technol=
ogies, more specifically Cascading Style Sheets (CSS) used with HTML. Whi=
le the use of these Web technologies has made email more visually attract=
ive and dynamic relative to its purely text-based predecessor, this has a=
lso introduced an exploitable attack vector for email.<br>
<br>
Clearly, giving attackers remote control over any aspect of ones=E2=80=99=
 applications or infrastructure is a bad thing. As is described in more d=
epth in the ROPEMAKER Security Advisory, this remote-control-ability coul=
d enable bad actors to direct unwitting users to malicious Web sites or c=
ause other harmful consequences using a technique that could bypass commo=
n security controls and fool even the most security savvy users. ROPEMAKE=
R could be leveraged in ways that are limited only by the creativity of t=
he threat actors, which experience tells us, is often unlimited.<br>
<br>
Mimecast continued: "To date, Mimecast has not seen ROPEMAKER exploited i=
n the wild. (yet) We have, however, shown it to work on most popular emai=
l clients and online email services. Given that Mimecast currently serves=
 more than 27K organizations and relays billions of emails monthly, if th=
ese types of exploits were being widely used it is very likely that Mimec=
ast would see them. However, this is no guarantee that cybercriminals are=
n=E2=80=99t currently taking advantage of ROPEMAKER in very targeted atta=
cks."<br>
<br>
<b>What to Do About It</b><br>
<br>
This topic is in the very early stages, mitigation is still being worked =
on. Turn off HTML in email? Not a chance. However, SANS commented: "A net=
work filter could be added blocking remote CSS download by email clients.=
"<br>
<br>
The exploit doesn=E2=80=99t work on browser-based emails such as Gmail, O=
utlook Web Access, or iCloud, but Mimecast warns that both the desktop an=
d mobile versions of Microsoft Outlook, the desktop and mobile versions o=
f Apple Mail, and Mozilla=E2=80=99s Thunderbird could fall victim to ROPE=
MAKER.<br>
<br>
The problem is that Micecast showed in great detail how this exploit work=
s, so you can expect the bad guys to jump on this immediately. Mimecast h=
as shared its research privately with all of the primary email client ven=
dors, but so far not one of them has acknowledged ROPEMAKER as a vulnerab=
ility or exploit.<br>
<br>
More tactics on what to do about this, Links, Screen-shots, and in-depth =
technical background at the KnowBe4 Blog, where we will keep updating you=
 with the latest news about ROPEMAKER:<br>
https://blog.knowbe4.com/the-ropemaker-email-exploit-can-change-an-alread=
y-delivered-email </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Here Is a Cool and Useful INFOGRAPHIC Abo=
ut Social Engineering</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">Kevin Mitnick, KnowBe4's Chief Hacking Off=
icer retweeted a link to a well-executed infographic about social enginee=
ring, and here it is, courtesy of the team at Smartfile.com. You can shar=
e this with your users as part of your continued awareness training progr=
am. It's here at the KnowBe4 Blog:<br>
https://blog.knowbe4.com/here-is-a-cool-and-useful-infographic-about-soci=
al-engineering </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">New Defray Ransomware Demands 5,000 Dolla=
rs in Customized Spear Phishing Attacks</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">This newly discovered ransomware strain is=
 targeting healthcare, education, manufacturing and tech sectors in the U=
S and UK, using customized spear phishing emails.<br>
<br>
Defray is demanding a relatively high ransom amount - 5,000 dollars in Bi=
tcoin, and ironically the word defray means "to provide money to pay a po=
rtion of a cost or expense."<br>
<br>
The Defray ransomware infection vector is spear-phishing emails with mali=
cious Microsoft Word document attachments, and the campaigns are as small=
 as just a few messages each. The planning and sophistication of the atta=
cks point to a highly-organized cybercrime gang. More detail at the blog:=
<br>
https://blog.knowbe4.com/new-defray-ransomware-demands-5000-in-customized=
-spear-phishing-attacks </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">Weak Password Test Contest =E2=80=93 Last=
 Chance</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">Last Chance! Try the Weak Password Test to=
 win a Nintendo Switch...<br>
<br>
Are your user=E2=80=99s passwords...P@ssw0rd? Verizon's recent Data Breac=
h Report showed that 81% of hacking-related breaches used either stolen a=
nd/or weak passwords. Employees are the weakest link in your network secu=
rity.<br>
<br>
KnowBe4's Weak Password Test checks your Active Directory for 10 differen=
t types of weak password-related threats and reports any fails so that yo=
u can take action. Plus, you=E2=80=99ll be entered to win a Nintendo Swit=
ch!<br>
<br>
Also, EVERYONE in the US/Canada will receive a real Kevin Mitnick collect=
ible stainless-steel lock-pick business card!<br>
<br>
To enter just go here fill out the form, it's quick, easy and often a sho=
cking discovery:<br>
https://info.knowbe4.com/wpt-sweepstakes-082017 </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
">
<span style=3D"font-size: 24px; line-height:30px; font-family: 'Open Sans=
', sans-serif; color: #f16622;">WSJ: The Disturbing Inevitability of Cybe=
rattacks</span><br>
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color: #333333;">This is a great article for forward to you=
r C-suite who may have missed this. The data provided is excellent ammo f=
or more IT Security budget.<br>
<br>
Brian Finch started out with: "A small but growing number of cybersecurit=
y experts warn that we are a few keystrokes away from a dystopian world w=
ith no lights, running water or modern communications. Some even argue th=
at it will take such a disastrous attack to jolt us into finally building=
 more effective virtual defenses.<br>
<br>
While the possibility of large-scale cyberattacks gets the lion=E2=80=99s=
 share of attention, chaos by small doses is more probable.<br>
<br>
Government and private businesses have invested billions of dollars in cy=
bersecurity measures to protect critical infrastructure, dramatically dec=
reasing the likelihood that hackers could bring about another Stone Age.<=
br>
<br>
While rogue squirrels nesting in utility components are responsible for t=
housands of blackouts, cyberattacks have caused few. Recent incidents rev=
eal a far likelier scenario: paralyzed operations for countless businesse=
s.<br>
<br>
And even concerns about cyberattacks against business operations have his=
torically taken a back seat to worries about personal data hacks, which c=
an affect millions of individual consumers.<br>
<br>
Hackers are increasingly turning to =E2=80=9Cransomware,=E2=80=9D a type =
of virus that encrypts computer systems and data without the owner=E2=80=99=
s approval. Unless prepared to pay a =E2=80=9Cransom=E2=80=9D to the hack=
er, the victim is effectively blocked from ever again accessing the syste=
m.<br>
<br>
Ransomware attacks are bad enough, but their effect can be much worse if =
the damage is irreversible. And that is exactly how =E2=80=9CNotPetya,=E2=
=80=9D the latest in a string of global cyberattacks, appears to be playi=
ng out." Here is the link to the article. (Note, the WSJ has a paywall:)<=
br>
https://www.wsj.com/article_email/the-disturbing-inevitability-of-cyberat=
tacks-1503355170-lMyQjAxMTE3OTI2MjgyOTI3Wj/ </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><span style=3D"font-size: 24px; line-height=
:30px; font-family: 'Open Sans', sans-serif; color: #f16622;">NEW: On-Dem=
and Webinar: How to Phish Like the Bad Guys</span><br>
<br>
Despite all the spectacular news stories about advanced persistent threat=
s and targeted hacks from nation-states, the most common security challen=
ge facing enterprises today continues to be social engineering. Successfu=
l hackers understand that the user is the weakest link in the security ch=
ain.<br>
<br>
Email phishing campaigns have proven to be the path of least resistance t=
o get unsuspecting individuals to download and install their malicious so=
ftware. Getting users to identify phishing attacks and training them not =
to click on links in email messages is not a trivial task.<br>
<br>
In this 30-minute webinar, you=E2=80=99ll learn the strategies and techni=
ques that social engineers are finding success with. You=E2=80=99ll also =
learn how to implement these techniques, using KnowBe4=E2=80=99s simulate=
d phishing platform to easily create a real-world phishing email to test =
your employees and see how phish-prone they really are.<br>
<br>
Key topics covered in this webinar: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Latest phishing attacks strategies and=
 techniques</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Some of the top-clicked phishing email=
s from Q2-2017</span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">How to create a simulated phishing att=
ack in minutes with KnowBe4=E2=80=99s platform</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"> You can watch this webinar right now:<br>
https://info.knowbe4.com/webinar-how-to-phish-like-the-bad-guys </span>
</div>
<!--/MAIN STORY--><!--QUOTES DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Quotes of the Week</span></div=
>
<!--/QUOTES DIV--><!--QUOTES TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:center;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><i>"Courage is resistance to fear, mastery =
of fear -- not absence of fear."</i> - Mark Twain<br>
<br>
<i>"America was not built on fear. America was built on courage, on imagi=
nation and an unbeatable determination to do the job at hand."</i> - Harr=
y S Truman </span><br>
=C2=A0
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<br>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><strong>Thanks for reading CyberheistNews</=
strong><br>
But if you want to unsubscribe, you can do that <a href=3D"http://newslet=
ter.knowbe4.com/a/1022/click/488/1921889/486ae771c748e753c0a203927ab7bc2a=
f91a1576/91dbe84ad75083502cd89e9d95d9aaacffda766b" style=3D"color:#f16824=
; text-decoration:none;" target=3D"_blank">right here</a><br>
<br>
<strong>You can read CyberheistNews online at our Blog</strong><br>
https://blog.knowbe4.com/cyberheistnews-vol-7-34 </span>
</div>
<!--/QUOTES TEXT--><!--SECURITY DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Security News</span></div>
<!--/SECURITY DIV--><!--SECURITY TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><span style=3D"font-size: 24px; line-height=
:30px; font-family: 'Open Sans', sans-serif; color: #f16622;">100% of Gov=
ernment IT Workers Said Employees Are Biggest Threat to Cybersecurity</sp=
an><br>
<br>
The government sector lags behind others in implementing modern cybersecu=
rity defenses, according to a new report from security firm Netwrix. This=
 failure to update has led to an increase in breaches: 72% of government =
entities worldwide had their security compromised in 2016, the report fou=
nd.<br>
<br>
Some highlights: </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">72% of government entities worldwide h=
ad their security compromised in 2016. </span></li>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Only 14% of government organizations c=
onsider themselves to be well-protected against cyber threats.</span></li=
>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">100% of IT specialists working for gov=
ernment agencies worldwide said employees are the biggest threat to secur=
ity. </span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"> Full article:<br>
http://www.techrepublic.com/article/100-of-government-it-workers-said-emp=
loyees-are-biggest-threat-to-cybersecurity/ </span>
</div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Microsoft Explains How Humans Are Your Weakest Link</span><br>
<br>
The 800-pound Redmond Gorilla asks: "Should your security focus be on sys=
tems or people?"<br>
<br>
They wrote: "In the latest Modern Workplace episode, =E2=80=9CCyber Intel=
ligence=E2=80=94The Human Element,=E2=80=9D we look at how organizations =
not only need to look at their systems but also have to address the secur=
ity threats that stem from the behavior of their own employees, who often=
times are the source of cyber-attacks. Phil Ferraro, CISO of Nielsen, exp=
lains how security is not a responsibility to be merely delegated to IT a=
nd how failures in security have a direct impact on the business.<br>
<br>
In the past, organizations typically focused on ensuring their networks w=
ere secure. But today, so many attacks are a result of employee actions, =
taking advantage of human behavior because employees provide easier entry=
 points for malicious attacks. For example, spear phishing emails are com=
monplace and becoming more sophisticated. Here is the promo video:<br>
https://products.office.com/en-US/business/articles/cyber-risk-is-a-busin=
ess-risk?<br>
<br>
I suggest you register and watch this half-hour webcast about human error=
 during lunch. It's a fabulous pitch for training your employees, and exc=
ellent ammo for security awareness training budget, courtesy Microsoft!:<=
br>
https://products.office.com/en-us/business/modern-workplace/human-element=
 </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Talent Shortage Labeled Security Market's Biggest Trend</span><br=
>
<br>
Analyst Cybersecurity Ventures highlights growing skills gap as it unveil=
s its Cybersecurity 500 list.<br>
<br>
Intelligence analyst Cybersecurity Ventures has flagged up an "epidemic" =
skills shortage in the cyber security market as it unveiled its latest qu=
arterly list of the world's hottest cyber security companies.<br>
<br>
The California-based research firm has compiled a quarterly Cybersecurity=
 500 list since 2015, cataloging what it sees as the hottest and most inn=
ovative industry leaders in IT security based on a variety of factors (se=
e bottom).<br>
<br>
Feedback from 2017's top cohort - including first on the list, Herjavec G=
roup, IBM Security (second) and Raytheon Cyber (third) - has revealed gro=
wing concern over the widening gap between security threats and the numbe=
r of people qualified to tackle them, its chief executive, Steve Morgan, =
told Channelnomics' UK sister title.<br>
<br>
"The single biggest trend, globally, is that there are chronic work short=
ages of qualified cyber security staff. It's an absolute epidemic." Morga=
n warned.<br>
<br>
Meanwhile, Morgan said recent research his firm conducted predicts that c=
yber crime damages will cost the world 6 trillion dollars annually by 202=
1, up from 3 trillion dollars in 2015<br>
<br>
"From the end of 2013 to 2015, Cisco published research on global cyber s=
ecurity that showed there were one million cyber security positions open =
globally." Morgan said, adding that Cybersecurity Ventures' own research =
suggests that this deficit will become more dramatic.<br>
<br>
"Due to the growth in cyber crime, by 2021, we expect there to be 3.5 mil=
lion vacant cyber security job openings. So, the pipeline of security tal=
ent isn't where it needs to be to help curb the rise in more widespread, =
and more sophisticated, cyber crime."<br>
<br>
Morgan argued that shortfalls in specialized education in information tec=
hnology and computer science around the world urgently needs to be addres=
sed.<br>
<br>
"Companies are already resorting to getting new graduates in, who simply =
don't have the experience=E2=80=A6 Our colleges and universities are not =
putting enough of these people out. And why is that? Because they don't h=
ave enough experienced professors to pass on this training."<br>
<br>
However, Morgan praised what he described as innovative market leaders wh=
o are proactively trying to address this issue head on. He highlighted Kn=
owBe4 for educating the workforce at large.<br>
<br>
Run out of Florida, one of KnowBe4's equity partners is the former world-=
famous U.S. hacker Kevin Mitnick. The company's ethos is that every IT po=
sition is now a cyber security position and any na=C3=AFve employee a pot=
ential weakest link.<br>
<br>
KnowBe4 trains staff to recognize the warning signs of ransomware - which=
 Cybersecurity Ventures said is trending up, and has resulted in 5 billio=
n dollars in damages globally in 2017 alone - spearphishing and fraudulen=
t emails.<br>
<br>
"This lack of basic knowledge is plaguing the industry. For instance, som=
e software developers don't understand IT security and vice versa." Morga=
n said.<br>
<br>
"Every corporation must be providing their staff with that kind of traini=
ng." Out of the top 10 ranked firms, seven are based out of the U.S., one=
 in Canada, one in IT security hub Israel and one in the UK (Sophos). Mor=
e:<br>
https://www.channelnomics.com/channelnomics-us/news/3016138/talent-shorta=
ge-labeled-security-markets-biggest-trend </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Want to Improve Cybersecurity? Try Phishing Your Own Employees</s=
pan><br>
<br>
Employees are a company's weakest security link. Here's why running inter=
nal phishing attacks can strengthen your cybersecurity posture.<br>
<br>
More than 90% of cyberattacks and resulting data breaches start with a sp=
ear phishing campaign=E2=80=94and many employees remain unable to discern=
 these malicious emails from benign ones. To improve cybersecurity educat=
ion, some companies are turning to a nontraditional method: Phishing thei=
r own employees.<br>
<br>
Too often, companies only offer annual training on cybersecurity that doe=
sn't keep up with the evolving threat landscape, according to Wesley Simp=
son, COO of (ISC)2. "Using internal phishing exercises is a very inexpens=
ive tool that helps fight the risk, and is an investment in staff's knowl=
edge and education," Simpson said. "It's not something that should happen=
 once a year=E2=80=94it should be continuous."<br>
<br>
ISC(2) runs regular internal phishing exercises on employees. The IT team=
 crafts the emails based on ones that employees actually receive, Simpson=
 said: For example, those that mimic a coffee shop offering a complimenta=
ry beverage, or a postal service package notification.<br>
<br>
Before making the campaign public, companies should take a baseline measu=
rement of how employees react to one of the phishing exercises, according=
 to Carl Leonard, principal security analyst at Forcepoint. Then, you hav=
e a metric to measure improvement against. Full article at TechRepublic:<=
br>
http://www.techrepublic.com/article/want-to-improve-cybersecurity-try-phi=
shing-your-own-employees/ </span></div>

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;"><span style=3D"font-size:16px; line-height:22px; font-=
family: 'Open Sans', sans-serif; color:#333333;"><span style=3D"font-size=
: 24px; line-height:30px; font-family: 'Open Sans', sans-serif; color: #f=
16622;">Interesting News Items This Week</span><br>
<br>
Is Antivirus Protection Still Relevant?:<br>
https://securityintelligence.com/news/is-antivirus-protection-still-relev=
ant/<br>
<br>
Easy-to-Use Apps Allow Anyone to Create Android Ransomware Within Seconds=
:<br>
http://thehackernews.com/2017/08/create-android-ransomware.html<br>
<br>
CryptoMix Variant Can Communicate Offline:<br>
https://www.infosecurity-magazine.com/news/cryptomix-variant-offline/<br>=

<br>
Most large companies don't use standard email security to combat spoofing=
:<br>
https://www.cyberscoop.com/fortune-500-companies-dmarc-email-security-ant=
i-spoofing-phishing/<br>
<br>
There was discussion of a link-hovering exploit method back in early June=
 but it is limited to links in Powerpoint presentations. No idea if Micro=
soft has subsequently issued a patch/fix for this hover vulnerability:<br=
>
https://www.darkreading.com/endpoint/new-attack-method-delivers-malware-v=
ia-mouse-hover-/d/d-id/1329105?<br>
<br>
Cyber Ransoms: Mr. Smith Attacks HBO's Loot Train. The legal perspective =
on the ongoing HBO ransom attack:<br>
http://www.newyorklawjournal.com/id=3D1202796507725/Cyber-Ransoms-Mr-Smit=
h-Attacks-HBOs-Loot-Train </span></div>
<!--/SECURITY TEXT--><!--FAVE DIV-->

<div style=3D"max-width:800px; margin:auto; background-color:#676767; pad=
ding: 10px 10px 10px 10px; text-align:center; border-radius:6px;"><span s=
tyle=3D"font-size:24px; line-height:24px; font-family: 'Open Sans', sans-=
serif; color:#ffffff; letter-spacing:6px;">Cyberheist 'Fave' Links</span>=
</div>
<!--/FAVE DIV--><!--FAVE TEXT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 40px 20px;=
 text-align:left;">
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"><span style=3D"font-size: 24px; line-height=
:30px; font-family: 'Open Sans', sans-serif; color: #f16622;">This Week's=
 Links We Like, Tips, Hints and Fun Stuff</span> </span>

<ul>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Rally champion Ken Block takes his 600=
-horsepower Ford Fiesta ST RX43 to the beautiful desert of Southern Utah =
and rips!:<br>
	http://www.flixxy.com/rally-champion-ken-block-drifting-in-the-desert.ht=
m?utm_source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">OK, drop what you are doing, take 6 mi=
nutes off and see this video! :-))) Retiring Admiral William H. McRaven d=
elivers a most inspiring speech:<br>
	http://www.flixxy.com/inspiring-change-the-world-by-making-your-bed.htm?=
utm_source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">OK, Who -Is- This Stu Guy Anyway? [VID=
EO] I had a freelance video PR crew follow me one day at Black Hat, to gi=
ve you an idea of who the heck I am:<br>
	https://blog.knowbe4.com/ok-who-is-this-stu-sjouwerman-guy-anyway-video<=
/span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Watch a horde of robots (1,069) dance =
their way to a Guinness world record:<br>
	https://qz.com/1061372/watch-1069-robots-dance-their-way-to-a-guinness-w=
orld-record/</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">"A Rare Look Inside North Korea And It=
s Luxury Ski Resort." This is well-done propaganda. See it as such and be=
 amused:<br>
	http://www.flixxy.com/a-rare-look-inside-north-korea-and-its-luxury-ski-=
resort.htm?utm_source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Someone asked if we had "Human Firewal=
l" t-shirts. We didn't, but after 15 minutes at Cafepress we had at least=
 some kind of solution!:<br>
	http://www.cafepress.com/knowbe4.104641077</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">An amazing acrobatic dance performance=
 recorded in Hanoi, Vietnam. Never seen this before. One guy, two girls:<=
br>
	http://www.flixxy.com/amazing-acrobatic-dance.htm?utm_source=3D4</span><=
/li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">Magician Eric Jones amazes the judges =
and audience with his unbelievable magic tricks at America's Got Talent 2=
017 Quarter Finals:<br>
	http://www.flixxy.com/amazing-magic-by-eric-jones-americas-got-talent-20=
17.htm?utm_source=3D4</span></li>
	<br>
	<li><span style=3D"font-size:16px; line-height:22px; font-family: 'Open =
Sans', sans-serif; color:#333333;">From The Archives: The Bizarre Border =
Between Canada And The United States:<br>
	http://www.flixxy.com/the-bizarre-border-between-canada-and-the-united-s=
tates.htm?utm_source=3D4</span></li>
</ul>
<span style=3D"font-size:16px; line-height:22px; font-family: 'Open Sans'=
, sans-serif; color:#333333;"> </span>
</div>
<!--/FAVE TEXT--><!--SOCIAL & COPYRIGHT-->

<div style=3D"max-width:800px; margin:auto; padding: 20px 20px 20px 20px;=
">
<hr style=3D"border: 0; height: 1px; background-image: linear-gradient(to=
 right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0));">
<div style=3D"max-width:400px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:left; text-align:left; line-height:12px;"><span style=3D"font-size:10p=
x; line-height:10px; font-family: 'Open Sans', sans-serif; color:#676767;=
">FOLLOW US ON: <a href=3D"http://newsletter.knowbe4.com/a/1022/click/488=
/1921889/12f6f18bb2280eb257fda0ee104ee0a8a9355394/91dbe84ad75083502cd89e9=
d95d9aaacffda766b" style=3D"color:#f16824; text-decoration:none;" target=3D=
"_blank">Twitter</a> | <a href=3D"http://newsletter.knowbe4.com/a/1022/cl=
ick/488/1921889/35c8d23f428e99808212e79c497c5c7904ccc19f/91dbe84ad7508350=
2cd89e9d95d9aaacffda766b" style=3D"color:#f16824; text-decoration:none;" =
target=3D"_blank">LinkedIn</a> | <a href=3D"http://newsletter.knowbe4.com=
/a/1022/click/488/1921889/665fd8e8468a0fa0d279b30bd4c7ba97f04517dd/91dbe8=
4ad75083502cd89e9d95d9aaacffda766b" style=3D"color:#f16824; text-decorati=
on:none;" target=3D"_blank">Google</a> | <a href=3D"http://newsletter.kno=
wbe4.com/a/1022/click/488/1921889/947165ed658284c668dbae4f407761b5796d074=
5/91dbe84ad75083502cd89e9d95d9aaacffda766b" style=3D"color:#f16824; text-=
decoration:none;" target=3D"_blank">YouTube</a></span></div>

<div style=3D"max-width:400px; margin:auto; padding: 0px 0px 0px 0px; flo=
at:right; text-align:right; line-height:12px;"><span style=3D"font-size:1=
0px; line-height:10px; font-family: 'Open Sans', sans-serif; color:#67676=
7;">Copyright =C2=A9 2014-2017 KnowBe4, Inc. All rights reserved.</span><=
/div>
</div>
<!--SOCIAL & COPYRIGHT-->


</td></tr>
<tr><td>
<div class=3D"footersp" style=3D"height:1px; width: 100%; margin-left: au=
to; margin-right: auto; background-color:black;display:block !important;"=
>=C2=A0</div>
=C2=A0

<div class=3D"footerco" style=3D"margin-left: auto; margin-right: auto; w=
idth: 100%; background-color:#ffffff !important; display:block !important=
;">
<table border=3D"0" cellpadding=3D"0" cellspacing=3D"0" style=3D"width:10=
0%; display:table !important;">
	<tbody>
		<tr style=3D"display:table-row !important;">
			<td style=3D"width:20%; display:table-cell !important;">=C2=A0</td>
			<td align=3D"center" style=3D"mso-table-lspace: 0pt;mso-table-rspace: =
0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;text-align:=
center;vertical-align:middle; display:table-cell !important;font-size:8.0=
pt; font-family:'Arial','sans-serif'; color:#666666;">This email was sent=
 to <b>edward@transocean.com</b> by <b>feedback@knowbe4.com</b><br>
			<br>
			33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA<br>
			=C2=A0
			<div style=3D"display:block"><a class=3D"maro_no_record" href=3D"http:=
//newsletter.knowbe4.com/a/1022/one_click_unsubscribe/488/1921889/91dbe84=
ad75083502cd89e9d95d9aaacffda766b" rel=3D"nofollow" style=3D"border:0px;c=
olor:#000;display:inline !important;">1-Click Unsubscribe</a></div>
			</td>
			<td align=3D"right" style=3D"text-align:right;mso-table-lspace: 0pt;ms=
o-table-rspace: 0pt;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: =
100%;width:20%;vertical-align:middle; display:table-cell !important;font-=
size:8.0pt; font-family:'Arial','sans-serif'; color:#666666;" valign=3D"m=
iddle">=C2=A0</td>
		</tr>
	</tbody>
</table>
</div>
</td></tr>
</table></body></html>


    </body>
  </html>

----==_mimepart_59a41a3cc0b6c_5c6971ad7ac4096172da--
