There has been a domain scam particularly in Canada that has been going on for quite awhile. When I was introduced to it taking place and being a person, they also tried to target. I decided it would be best to expose how they try to scam people so that people do not fall prey to them. I have heard stories of people falling for this scam. This post is for the ones that end up landing on this blog post for more info.
Why is this important
Personally, reading all the comments and posts online about these scammers. I feel the right thing to do is to create some awareness, so more people do not fall prey to the scam. There are many innocent victims, who may fall for this scam due to the lack of cyber security awareness. So, lets go out there and educate people and let them know about this scam. Hopefully, it can at least prevent a few people from falling prey to this scam.
What did they do
This organization is sending thousands of letters on an ongoing basis to people. These mailed letters show up at your home or offices and make it seem like it is an urgent matter to address right away. The letter will state a domain name you own, the expiry date of the domain, a section to paste your credit card number, and an envelope the mail the form back.
This time around, I’ve decided to make this
blog post as a Part 1 of many several parts that will be released. There
is just too much Azure security information to put up in a single post. So, my
plan is to make multiple posts over time.
Azure has many great security features that not everyone may be aware of right from the start. This post will focus on some key areas of Azure, and how it can better enhance the security of the environment. Key focus will investigate security best practices for Azure.
One of the most exciting parts of the BCAware conference was getting to meet Brian Krebs live in person!
During his talk he shared some interesting topics such as how
cyber criminals are using websites similar to https://haveibeenpwned.com/
Except, that these “other” websites will actually list out
the users leaked password(s) in plaintext. And, with this method attackers can
now attack various social media, banking and other commonly used services
online to possibly find valid emails/passwords to accounts.
Another topic was related to how cyber criminals determine how much money to ask for during a
ransomware attack. The typical amount seems to point at about 10% of total
revenue a business makes from the previous year. This way, they do not ask for
too much or too little. It gets close to an amount that the organization can
afford, and finds would be cheaper than to recover from backups or rebuilding
the environment.
I’m proud to announce that I have now obtained my SANS – GIAC GCIH certification. It was a long process, and I pushed myself to get it done before the start of the New Year – 2020.
New SANS GIAC changes to exams
One thing that was particularly new
for me compared to the other 2 SANS exams I’ve done was the lab questions. SANS
with GIAC now has added a section that tests your knowledge through a virtual
lab. Now, I have to say I think it’s actually pretty awesome! It puts your real
world skills to the test to see if you can actually can apply needed practical
skills. It also gives companies assurance that their employees are also getting
and being tested on real hands on work and not just theory based topics.
Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell
This week, I was hanging out with a friends, who happened to
forget their Wi-Fi Password to connect a new device to their network. I
decided, I would find a way and help them out so they could obtain the Wi-Fi
password. It then led me to a thought, that a malicious attacker could
technically use the same technique. Or, that it could be a good technique used
when pen testing an environment. So, therefore, I have decided to make a blog
post about it. Enjoy!
My name is Harry Taheem
I am a Cyber Security Engineer.
My aim is to post things I learn or find interesting and allow others to hopefully gain some more insight. I also plan on posting general IT related issues, as I’d like StealthBay to be a place where IT users can find some form of knowledge and education. And, hopefully I can learn a few new things from other users as well who also wish to share their own experiences and knowledge.