This week DigitalBond, a firm that specializes in security for Industrial Control Systems (ICS), reported that it had been the victim of a spearphishing cyberattack. Demonstrating the clever personalization that social engineering requires, DigitalBond reported:
It’s a bit concerning that a company whose sole focus is securing industrial control systems should be spear phished. The attacker clearly went to enough trouble to try to understand ICS security lingo to get the employee to open the link, and had to compromise a DNS server.
This is the spearphishing email:
Security Week reports that this attack was part of a series of attacks:
The potential (and likely) list of victims and confirmed targets are a diverse group. In addition to DigitalBond, the list includes NJVC (a DOD Contractor), the Chertoff Group, customers of Equifax’s Anakam two factor authentication, attendees of the IT SCC meeting, Carnegie Mellon University, Purdue University, and the University of Rhode Island.
Spearphishing warnings are important. However, as important as detection and remedial action are, prevention is also important. SP Guard from Iconix provides the ability to distinguish real email from spearphishing attacks. Clear here to learn more.