Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

According to acting United States Attorney Joon H. Kim, “This case should serve as a wake-up call to all companies--even the most sophisticated--that they too can be victims of phishing attacks by cyber criminals.” These words apply to the business world for one major reason: the public doesn’t know who, specifically, the two affected companies are. All that we know is that one of them is a “multinational online social media company” and the other a “multinational technology company.”

Rimasauskas is facing charges of orchestrating a phishing attack that was supposed to convince the victims to wire transfer funds into accounts in Latvia and Cyprus. The U.S. Department of Justice explains that this feat was accomplished by building a company in Latvia with the same name as a computer manufacturer in Asia. The fake company then used its new identity to reach out to companies that had a known relationship with the Asian manufacturer or its services, claiming that there were balances that had yet to be paid. Following the wire transfer, Rimasauskas would then divvy up the funds for transfer to various global bank accounts.

These allegations have brought wire fraud charges against Rimasauskas that could potentially land him in prison for up to 20 years, as well as three more counts of money laundering, each also worth a maximum of 20 years each. To top it all off, he has a single count of aggravated identity theft with a minimum of two years in prison.

So, what can your business learn from this incident? Well, the first is that these victims were described as “multinational,” meaning that they are large countries that are easily recognizable. Companies as large as these certainly have the means to protect themselves from the odd phishing scammer, but the perpetrator was able to bypass these security standards by targeting the users directly.

The old adage, a chain is only as strong as its weakest link, still holds strong; and, in situations like these, that link is painfully clear. For smaller organizations, the need is only more important, as it becomes more critical to shore up this particular weakness. Larger organizations have more difficulty ensuring these high standards for all employees. It’s important that each and every member of your staff understand company security policies.

The second lesson that you can learn from this event comes from the process used by hackers to defraud businesses. Considering that many hackers will only want to put in the minimum amount of effort to hit their targets, it’s logical to assume they would rather go after an easier target than invest more effort with no possibility for a return. It’s simply a matter of how much work it is to get around enterprise-level security.

What happens when all it takes to collect data is writing a couple of emails and setting up bank accounts? A hacker can then communicate with the target and take whatever they can get, and do the same thing to any other companies foolish enough to fall for the trick.

The biggest takeaway from this event is that you can’t ignore the basics. Training, in combination with powerful enterprise-level security, can be a great way to ward off potential attacks. In fact, companies are quite rarely breached due to advanced threats, and are often brought down due to something small that was overlooked, like a spam email or access log discrepancy.

You won’t catch Telesys Voice and Data ignoring important details that could threaten your business. For more information about what we can do for your network’s security, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 22 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Privacy Malware Business Computing Productivity Business Email Microsoft Windows 10 Internet Hosted Solutions Backup IT Services Ransomware Software Computer Managed Service Provider Network Security Mobile Devices Android Smartphone User Tips Google IT Support Managed IT services Workplace Tips Browser Communication Social Media Hardware Disaster Recovery Business Continuity Outsourced IT Efficiency Smartphones Innovation App Data Management Cloud Computing Holiday Upgrade Data Small Business Office Business Management Facebook Miscellaneous WiFi Microsoft Office Server Office 365 Data Backup Windows Remote Monitoring Spam Encryption Network Artificial Intelligence Gmail Big Data Internet of Things Apps Phishing Hosted Solution Recovery Robot Password Data Recovery Firewall Content Filtering Unified Threat Management Tip of the week Passwords Chrome Cybersecurity Office Tips How To Apple Avoiding Downtime Government Save Money Paperless Office Money Employer-Employee Relationship Customer Service Risk Management Mobile Device Management Work/Life Balance Saving Money Word Remote Computing Infrastructure Productivity Hacker Tech Term Telephone Systems Data storage Document Management Computing Social Data Security Website IT Support Health Wi-Fi Virtual Reality Managed IT Services Applications Hacking SaaS Mobile Computing BYOD Two-factor Authentication Tech Support Settings IT Management Analytics Antivirus The Internet of Things Computers Operating System Mobile Device Managed IT Data loss VoIP Presentation Bandwidth Business Growth Vendor Management Education Customer Relationship Management Windows 10 Cybercrime Outlook Alert Scam Botnet User Printing Vulnerability IT solutions Samsung Safety Retail Wireless Technology VPN Wireless Storage Best Practice Identity Theft Lithium-ion battery Downtime Virtual Private Network Computer Care Business Owner communications Server Management YouTube Training Marketing Unified Communications Licensing Maintenance LiFi HIPAA Digital Payment Automobile Upgrades Competition Mobile Security Budget End of Support Information Technology Mouse Project Management Humor Augmented Reality Collaboration IBM Legal Running Cable Business Technology Analyitcs Tablet File Sharing Twitter Monitors Bring Your Own Device Politics Search Travel Sports Google Drive IT service Cortana Automation Specifications Websites Physical Security Virtualization Going Green Taxes Administration Fort Worth Writing Spyware Typing Tracking Buisness Blockchain Personal Information Internet Protocol Solid State Drive IT Consultant Staff Multi-Factor Security Knowledge flu shot Social Engineering Networking How To Cryptocurrency Compliance Machine Learning iPhone Meetings Permissions Computer Repair VoIP streamlines Heating/Cooling Hard Disk Drive Cleaning Flexibility Notifications Google Calendar Relocation Experience Fort Worth IT Firefox Bitcoin Regulations Webcam Fraud Electronic Medical Records business network infrastructure Google Wallet Servers Dark Data Operations Crowdsourcing Legislation Private Cloud DFW IT Service Techology Assessment Windows 8 Social Networking Supercomputer Help Desk Point of Sale Net Neutrality Domains data services Drones Entrepreneur Mail Merge Wearable Technology 5G IT Budget Error PowerPoint Smart Technology Application Disaster Resistance Consultation Motherboard Statistics Users Internet Exlporer Public Speaking User Error Address Consumers Software as a Service Distributed Denial of Service Proactive IT Router Bluetooth Software Tips Web Server Update Redundancy Corporate Profile IT Technicians Technology Tips Administrator Laptop Managed IT Service 3D Printing Hard Drives IT Consulting Quick Tips eWaste Modem Cameras Virtual Desktop Hotspot Chromebook IT Sevices Network Congestion WannaCry Mirgation Law Enforcement Comparison Halloween Break Fix Unsupported Software Refrigeration Data Breach Time Management Environment Cookies Cabling CCTV Language Emoji Printer Display Deep Learning Migration Gadget Fun Black Friday Nanotechnology Scary Stories Dark Web Mobile Data Technology Laws Hacks Network Management Troubleshooting Computing Infrastructure Access Control Cyber Monday Lenovo VoIP Chatbots Staffing BDR Phone System Data Warehousing Undo Unified Threat Management Current Events Touchscreen Shortcut Disaster G Suite Alerts Processors IP Address SharePoint flu season Superfish Digital Alt Codes Identity GPS Google Maps Motion Sickness Microsoft Excel business communications systems Patch Management Uninterrupted Power Supply Cooperation Mobile Office Downloads Google Docs

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code