CERT mailing list archives

Current Activity - Fraud Advisory for Businesses Released: Corporate Account Take Over


From: Current Activity <us-cert () us-cert gov>
Date: Mon, 25 Oct 2010 13:50:42 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Fraud Advisory for Businesses Released: Corporate Account Take Over

Original release date: October 25, 2010 at 12:35 pm
Last revised: October 25, 2010 at 12:35 pm


As part of a joint effort, the United States Secret Service, the
Federal Bureau of Investigation, the Internet Crime Complaint Center
(IC3) and the Financial Services Information Sharing and Analysis
Center (FS-ISAC) have released Fraud Advisory for Businesses:
Corporate Account Take Over (PDF). The document explains that cyber
criminals are targeting small- and medium- sized businesses and using
methods such as malicious code, phishing, and social engineering
attacks to compromise business banking accounts. Once these accounts
have been compromised, cyber criminals can fraudulently transfer funds
out of them and can cause significant business disruption and
substantial monetary loss.

This advisory provides information that businesses can use to help
understand, prevent, detect, and respond to the threats of corporate
account take over. US-CERT encourages users and administrators to
review this document and to remain vigilant in combating the threats
of corporate account takeover.

Relevant Url(s):
<http://www.ic3.gov/media/2010/CorporateAccountTakeOver.pdf>

====
This entry is available at
http://www.us-cert.gov/current/index.html#fraud_advisory_for_businesses_released

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTMXDYD6pPKYJORa3AQLCfQgAnr3YPGOkJm8PgFmy/xr3/CK8tEDna2+V
Ysxp1sjQ77a404wf33qGZe5aSuClsg09zKa1RtX6EZMT3hLKonI4fRO1Saz3CaKV
20x8tgYcv2XAQG/nmy5l2kKF6unDxsa6049qoQnztZVC0NQVGUmsTBHjmhgb+snU
DzOICD6Yf66ETN3xyanuh8rBzLndOim1fXDCASlxAOkWGtDhwiXgEMsuxQHNpB5t
MxF8WB9wgDBDhle3M18B2Y7dpNoA1uHr+n7OsrE+mas7J4vLDkgqkBXXnq44wYNt
IFVgTk/snJrTA1YWQcMJFvnxTwojFRr/ebwljEZzVCrYRFhpnWINmw==
=p1G9
-----END PGP SIGNATURE-----


Current thread: