DEFENSESTORM

RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These resources highlight our recent research and success stories.

DefenseStorm
Romance Scam to Money Mule

Fraud Squad

Romance Scam to Money Mule

Romance scams continue to gain prevalence as scammers use online dating platforms and social media to prey on vulnerable individuals looking for love.  Continue reading to learn how a man nearly fell victim to a romance scam where the perpetrator intended to use him as a money mule, but the scam was stopped before any transactions occurred, thanks to a concerned bank employee.

AnyDesk Threat Alert

Threat Alerts

AnyDesk Threat Alert

DefenseStorm is aware of an incident involving  AnyDesk and the compromise of some of their production systems.  The incident was reported by AnyDesk on 2/2/2024.  We have not been able to locate any usable technical details or IOCs at this time.  AnyDesk is a widely used remote desktop software that allows users to access and control computers from anywhere in the world.

Love, Lies and Deception: A Romance Scam

Fraud Squad

Love, Lies and Deception: A Romance Scam

With the rise of online dating and social media, millions of people flock to digital platforms to find love. But from behind the protection of a computer screen, scammers exploit the most vulnerable people seeking romance and relationships, ultimately leaving the unsuspecting victim with a broken heart and an empty bank account.

Election Scams

Insights

Election Scams

With election season beginning to ramp up, it’s important to be aware and prepared for the barrage of phishing, smishing, vishing, and other “ishing” scams and campaigns that are sure to follow. Just this weekend, I received multiple texts related to voting and polling, so let’s explore a few of the common scams and tactics that bad actors will try to leverage to obtain your personal information.

The Rise of Banking Trojans in Rogue Mobile Apps

Insights

The Rise of Banking Trojans in Rogue Mobile Apps

Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. As investment from fast-moving threat actors continues to increase, traditional security practices are unable to keep up.

Pasadena Federal Credit Union Testimonial

Case Studies

Pasadena Federal Credit Union Testimonial

Pasadena Federal Credit Union was consistently disappointed in their previous IT vendors, so they began the daunting task of shopping around for a cyber risk management solution. The wanted a relationship- a partner, and DefenseStorm was the obvious choice for them. Within a few months of signing, a simple phone call from DefenseStorm proved a real return on investment in their new partnership.

New GRID Active Governance Program and Reporting Functionality – Linking Dashboards to Task Schedules

Insights

New GRID Active Governance Program and Reporting Functionality – Linking Dashboards to Task Schedules

DefenseStorm has recently updated its GRID Active Governance Program with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution.  Organizations now can link dashboards to task schedules for scheduling and documenting report reviews.

The Tech Support Scam That Cost a Senior Citizen Her Life Savings

Fraud Squad

The Tech Support Scam That Cost a Senior Citizen Her Life Savings

Technology is advancing at an unprecedented pace, and even the most tech-savvy individuals can find themselves in need of assistance to remain connected and productive. Unfortunately, with the increased demand for tech support comes a rise in fraudulent activity exploiting this important service. Senior citizens are the most vulnerable group because they are more likely to seek help in navigating the complexities of technology.

Venture Tech 2023 Podcast: Interview with DefenseStorm CEO, Steve Soukup

Webinars & Videos

Venture Tech 2023 Podcast: Interview with DefenseStorm CEO, Steve Soukup

Learn how DefenseStorm helps your credit union drive change, and enable growth without compromising safety, by approaching cybersecurity with the same risk management disciplines you use in other areas of business.

 

New GRID Active Risk Assessment Functionality – Exception Tracking and Reporting

Insights

New GRID Active Risk Assessment Functionality – Exception Tracking and Reporting

DefenseStorm has recently updated its GRID Active Risk Assessment with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution with GRID Active Risk Assessment Exceptions.

Safeguarding Credit Unions with Threat Intelligence with Elizabeth Houser and James Bruhl

Webinars & Videos

Safeguarding Credit Unions with Threat Intelligence with Elizabeth Houser and James Bruhl

Listen to Director of Cyber Defense, Elizabeth Houser, and Director of Cyber Threat Intelligence, James Bruhl discuss with NAFCU about what threat intelligence is and why is it important to Financial Institutions.

PSA:  Apple’s Name Drop Feature

Insights

PSA: Apple’s Name Drop Feature

Apple just rolled out a new default feature for iPhone and Apple watch that allows nearby users to share contact information with one another.  This feature has sparked some concern in online social communities and even prompted law enforcement agencies to release statements and privacy warnings over the last few days due to the concern that people could “drop” information on another user’s phone at random, which seems scary.

CISO on Cyber Risk: Embracing Accountability and Transparency in the Wake of the SolarWinds Lawsuit

Insights

CISO on Cyber Risk: Embracing Accountability and Transparency in the Wake of the SolarWinds Lawsuit

Insights from the desk of Chief Information Security Officer, William Wetherill

The Importance of Asset Management

Insights

The Importance of Asset Management

Cybersecurity is a critical concern for any organization, regardless of its size or industry; however, for financial institutions (FIs), it’s vital due to the sensitive data and valuable assets they are entrusted to safeguard. While there are many aspects to consider in building a robust cybersecurity program, one crucial component is effective asset management.

DefenseStorm releases User Behavior Analytics (UBA) model in GRID Active Fraud Detection

Insights

DefenseStorm releases User Behavior Analytics (UBA) model in GRID Active Fraud Detection

Powered by machine learning to help better proactively detect fraud, financial institutions can monitor suspicious non-monetary activities for individuals to complement rules-based approaches and detect fraudulent activities.

SIM Swapping

Insights

SIM Swapping

If you stay up to date with cybersecurity news and events, you are likely bombarded with technical analysis of the latest ransomware, malware, dropper, trojan, or vulnerability that was exploited by bypassing controls and using “living off the land” techniques.  While these tactics, techniques, and analyses are incredibly important and useful, we can often forget that it’s sometimes the simple, age-old ways of getting your information and property that can also harm us.
That’s where SIM swapping comes in. 

Holiday Fraud Delivery Notification Scams: “You have a package for delivery!”

Fraud Squad

Holiday Fraud Delivery Notification Scams: “You have a package for delivery!”

With the holiday season just around the corner, it’s a time for celebrations, travel, and shopping, but it’s also prime time for fraudsters to prey on unsuspecting consumers. Amidst the hustle and bustle of planning and festivities, people become easy targets for scammers.

Critical Severity Authentication Vulnerability: CVE-2023-22518

Threat Alerts

Critical Severity Authentication Vulnerability: CVE-2023-22518

A recent vulnerability has been discovered for Confluence Server and Data Center and is being tracked as CVE-2023-22518.  At this time of this writing, this vulnerability is NOT known to have been exploited; however, Atlassian is recommending that those impacted take immediate action.  The below information was taken directly from the Atlassian FAQ page for CVE-2023-22518, and the page was last updated on November 1, 2023.

GRID Active Fraud Detection:  Alert Enhancements

Insights

GRID Active Fraud Detection: Alert Enhancements

As fraud detection and prevention continue to be crucial in today’s digital landscape, it’s imperative for fraud investigators to utilize efficient tools that empower and support their investigative work.  The current Trigger and Alert views have been strategically modified to enhance the service provided to fraud investigators where they can now see relevant information that is intuitive to their role.

AI and its Impact on Cybersecurity Part 3: The DefenseStorm Approach

Insights

AI and its Impact on Cybersecurity Part 3: The DefenseStorm Approach

In our final entry into our series, AI and its Impact on Cybersecurity, we will explore how DefenseStorm utilizes AI in our own built-for-banking technology.

Deepfake Scam “Mom, Dad, I need your help.”

Fraud Squad

Deepfake Scam “Mom, Dad, I need your help.”

In our latest article in Fraud Squad series, we cover a deepfake scam that started with a call, a familiar voice, and a frantic plea for help. One couple is scammed out of nearly $10,000 when they received a call from whom they believed to be their incarcerated son requesting money for bail.

Cyber Threat Surveillance Operations (CTS Ops) Team

Datasheets

Cyber Threat Surveillance Operations (CTS Ops) Team

DefenseStorm Cyber Threat Surveillance Operations (CTS Ops) team is an extension of your cybersecurity team to bolster your cyber defenses and ensure your FI is threat ready. Our team’s professional expertise and certifications make them your ally in the fight against cybercrime, diligently working to stop threats from becoming costly and destructive attacks. 

 

 

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

Insights

The Human Firewall: Strengthening the Weakest Link in Cybersecurity

Innovative technology has revolutionized the way we work and live by unlocking a wealth of new capabilities. As artificial intelligence makes daily operations more efficient and flexible, people become increasingly reliant on the luxury of digital technology. Of course, businesses then competitively introduce the latest and greatest to meet the demands. With new technology and changed business operations comes exposure to new cyber risks, prompting companies to prioritize and invest in stronger cybersecurity measures.

Malware: Xenomorph Android Banking Trojan

Threat Alerts

Malware: Xenomorph Android Banking Trojan

Xenomorph, an Android banking trojan, has resurfaced in a more advanced form. Originally discovered in early 2022, this malicious software was initially targeted at European banks using screen overlay phishing techniques and was distributed through Google Play. However, the latest iteration of Xenomorph has expanded its scope to include over 35 financial institutions in the United States and various cryptocurrency applications. 

AI and its Impact on Cybersecurity Part 2:  The Role of AI in Financial Services

Insights

AI and its Impact on Cybersecurity Part 2: The Role of AI in Financial Services

The financial sector has seen a significant transformation due to digital technology. The industry has been pushed to be more dynamic to meet the demands of customers, regulatory requirements, and security threats, and remain competitive while safeguarding customer data and assets.

PSA – MICROSOFT MITIGATES DATA EXPOSURE

Threat Alerts

PSA – MICROSOFT MITIGATES DATA EXPOSURE

If you haven’t already, you will likely begin to see cyber news headlines about a massive data exposure related to Microsoft.  While the exposure is bad and nothing to overlook, the report coming from Microsoft is that “ No customer data was exposed, and no other internal services were put at risk because of this issue. No customer action is required in response to this issue.” This was taken directly from Microsoft’s Security Research and Defense page.   

Understanding Business Email Compromise

Insights

Understanding Business Email Compromise

Business email compromise (BEC) is a type of cyberattack that usually occurs through some type of social engineering campaign where the criminals assume the identity of a trusted person or organization and attempt to influence their victims into providing money through transfers or other digital payments, divulging personal information, making phony purchases, providing credentials to accounts, etc

 

Zelle Bank Impersonation Scam

Fraud Squad

Zelle Bank Impersonation Scam

As peer-to-peer (P2P) digital payment platforms like Venmo and Paypal rapidly grew in popularity for their ability to provide easy, convenient money transfers, several major banks collaborated to create Zelle. The new transfer application promised to be “the next big thing” in banking, yielding near-instantaneous transfers directly between banks. Unfortunately, with new digital technology comes increased risk.

PSA – CISA Warns of Hurricane Related Scams

Threat Alerts

PSA – CISA Warns of Hurricane Related Scams

With the recent natural disasters that have occurred, it’s important to be aware that bad actors will attempt to leverage those devasting incidents for gain.  CISA has released a warning urging users to be aware of malicious activity when these types of incidents occur.  Please read the below alert from CISA.

Redefining Cybersecurity Part 5: Cyber Risk Awareness

Insights

Redefining Cybersecurity Part 5: Cyber Risk Awareness

The previous posts in this series have covered topics like shifting from cybersecurity to proactive cyber risk management, reinforcing cyber risk readiness, bridging communication gaps, and harnessing the power of a buyer’s guide to build a robust cyber risk management solution. While these are integral to designing an efficient cyber risk management program, the final and crucial piece of the puzzle is cyber risk awareness. If your employees lack awareness of the constantly evolving threats to your financial institution (FI), they become a significant liability to your security, despite your adherence to the latest recommendations and employment of state-of-the-art technology.