Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (2024)

Anthony Spaelti

Hyperion | Stanford MBA |McKinsey

  • Report this post

Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoid spam is to check the "From". If you know the address, you're (most likely) good. (see last paragraph)๐Ÿ“† Spam/Phishing has gotten really good (sometimes)Yesterday at Noon, I received a fantastically made phishing email. (See first screenshot).Two common pointers to identify fraudulent emails were not there:1) Incorrect format (blurry graphics, etc.): Nope, looks good2) Spelling: Eh, good enough...๐Ÿšฉ But then the red flags showed up:1) AWS specific: AWS will always reference your account number. If you don't see your account number, it's not an AWS email.2) That link "aws.<web login enac com>" -- <web login enac com>? That can't be Amazon.3) The "From" -- sent from an email "support@workaci.com", definitely not Amazon.And then I did what we shouldn't do: Open the link. (see second screenshot)๐Ÿ–ฅ๏ธ <web login enac com>:It looks EXACTLY like the AWS login window, except that once you've entered your credentials, it will tell you, "There was an error; please try again," and then it will re-route you to the actual AWS login window. But by that time, they already have your credentials.๐Ÿ“ง Why checking the "From" is "good enough"?Simplified: An email is built like a letter in an envelope. The envelope has the "From" and the "To", once you open the envelope and take out the letter you usually see again a "From" and a "To". Emails work the same way: There is a message header (the envelope) with a "From" and a "To" which you don't see, the mailbox "opens" the envelope for you. All you see are the "From" and "To" as on the first screenshot once it's in your inbox.In comes DKIM -- a mail security protocol. Your email provider will check if the header and content of the message are authentic. If the malicious actor would have put @amazon.com or @amazonaws.com as the sending domain, the DKIM check would have failed, and the message would have not been delivered.โ“Why did it not land in spam? It's clearly spam?!Unfortunately, the sender email support@workaci.com is a valid, legit business email from a legit Wisconsin Company that got hacked. They might not even be aware of this yet (by now I've informed them of their breach). This is, unfortunately, very common.

  • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (2)
  • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (3)

1

Like Comment

To view or add a comment, sign in

More Relevant Posts

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    The cat-and-mouse game between law enforcement and cybercriminals selling sensitive information continues: BreachForum v2 has been seized.โ“ BreachForum:Users were able to purchase hacking software, leaked sensitive data (e.g. the LinkedIn 2021 Leak was also on sale on that site), and services (i.e. paying cybercriminals to engage in illicit activities for you)๐Ÿ“• Origin:The forum started as RaidForums in 2015 until it was seized by law enforcement in 2022. It reopened as BreachForums in 2022 and was seized again in early 2023. It reopened in June 2023 as BreachForums V2 and was seized on May 16, 2024.๐Ÿ™‡ Challenge:The timeline illustrates the inherent copycat issue law enforcement faces: While they were able to make arrests in each of the seizures, the forums re-spawned only months afterward.๐Ÿ”œ What's next?On the day of the seizure, a cybercriminal known as "USDoD" already announced the forum's re-opening as "Breach Nation" on July 4th (U.S. Independence Day); likewise, a former moderator of BreachForums also announced creating a "spin-off." This shows how easy it is to re-spawn those self-hosted "websites" on the darknet.๐Ÿ’กBut...Law enforcement seized the second and third installments of RaidForums at incredible speed, making it likely they found a way to more easily physically locate where these particular servers are in the world, or the server software that is being used has vulnerabilities law enforcement knows how to exploit and corrupt them, or there are insiders who support law enforcement, ... or something else entirely!Either way, I would not be surprised if "USDoD"'s version will not be up for long either!(P.S. Being originally from Zurich I can't help but quickly give a shoutout to Kantonspolizei Zรผrich for participating in this raid! ๐ŸŽ‰)(P.P.S: The image attached is the current splash screen the FBI installed on BreachForums' darknet website. A pretty common practice, see my post here: https://lnkd.in/gVMbRZcR)

    • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (6)

    16

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    Sunday Fumbles: "I predict the Internetโ€ฆwill soon go spectacularly supernova and in 1996 catastrophically collapse." And even more: "In 1996, CD-ROMs through FedEx will emerge as the information superhighway."On December 4, 1995 Robert Metcalfe โ€“ the inventor of ethernet (that's basically what enables internet in your house) โ€“ published a column in Infoworld magazine titled "Predicting the Internetโ€™s catastrophic collapse and ghost sites galore."He didn't just blast out empty words, he had a list of actually very rationale arguments, most of which didn't turn out to be catastrophic for the Internet.Two examples:Business model: Internet Service Providers are forced to continuously invest in new physical infrastructure, something a "flat rate business model" will never be able to carry.โžž He didn't foresee the ubiquitous adoption (like: everyone wants to be online) and additional government investments that make it well worth it for ISPs to expand services.Video demand: Robert was convinced that the internet's original TCP/IP infrastructure will not be able to handle video.โžž He wasn't wrong in 1995, but subsequent protocol changes and the introduction of protocols like RTP and UDP made video streaming possible without causing too much stress on the network (though to this day it remains a challenge for ISPs because it uses a lot of bandwidth).Check out the 1995 article on the Internet Archive:https://lnkd.in/grixHAcE

    Predicting the Internet's catastrophic collapse and ghost sites galore in 1996 web.archive.org

    9

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    California & America, getting laid off from a 500bn company while on maternity leave should not be legal.A close friend of mine got laid off from Tesla alongside 14,000 other colleagues while on maternity leave. While layoffs are an unfortunate economic reality, especially large corporations have the opportunity to execute them fairly.How can we strive to become an equitable society that has everyone be equal parts of the workforce, but then forget about the nurturing of out next generation? Thatโ€˜s disheartening. We end up with career driven couples who canโ€˜t have kids in an ageing society that slowly vanishes from the face of the earthโ€ฆ. That sounds terrible.

    11

    4 Comments

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    ๐’๐ฎ๐ง๐๐š๐ฒ ๐…๐ฎ๐ฆ๐›๐ฅ๐ž๐ฌ: "remote shopping, while entirely feasible, will flop" -- ๐‘‡๐‘–๐‘š๐‘’ ๐‘€๐‘Ž๐‘”๐‘Ž๐‘ง๐‘–๐‘›๐‘’, 1966.In a six part essay from 1966, Time Magazine collaborated with "Futurists" to predict the year 2000. Why did Time Magazine think online shopping will flop? Simply, "because women [sic] like to get out of the house, like to handle the merchandise, like to be able to change their minds."Naturally, that quote raises a whole bunch of other questions about "developments" Time Magazine apparently didn't foresee in 1966 when it comes to equality between men and women.Check out the Essay for free in Time Magazine's archive: https://lnkd.in/ge4vbmH2

    Essay: THE FUTURISTS: Looking Toward A.D. 2000 content.time.com

    7

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    GenAI models will soon use 100% of human-produced data to train themselves.That's a HUGE number. Let's explore some fun comparisons:๐Ÿ™‹ ๐–๐ก๐š๐ญ ๐ข๐ฌ ๐ก๐ฎ๐ฆ๐š๐ง-๐ฉ๐ซ๐จ๐๐ฎ๐œ๐ž๐ ๐๐š๐ญ๐š? Simplified, think of this term as the collective knowledge of humanity. Everything we've produced as a species that is written down, recorded, drawn, scanned, photographed, etc. digitized.๐Ÿ’พ ๐‡๐จ๐ฐ ๐ฆ๐ฎ๐œ๐ก ๐๐š๐ญ๐š ๐š๐ซ๐ž ๐ฐ๐ž ๐ญ๐š๐ฅ๐ค๐ข๐ง๐  ๐š๐›๐จ๐ฎ๐ญ? The collective human data is estimated to be around ๐Ÿ๐ŸŽ๐ŸŽ-๐Ÿ๐Ÿ“๐ŸŽ ๐™๐ž๐ญ๐ญ๐š๐›๐ฒ๐ญ๐ž๐ฌ. A zettabyte is 1 billion terabytes. The entire printed collection of the US Library of Congress, the largest library in the world, is estimated at only 20 terabytes - a minuscule fraction of <1% of the total human-produced data.๐ŸŒŽ ๐ˆ ๐œ๐š๐ง'๐ญ ๐ข๐ฆ๐š๐ ๐ข๐ง๐ž ๐ญ๐ก๐ข๐ฌ ๐ง๐ฎ๐ฆ๐›๐ž๐ซ. Here are some comparisons:โžŸ ๐Ž๐ฎ๐ซ ๐ฉ๐ฅ๐š๐ง๐ž๐ญ: Printed out on letter/A4 format paper, this data would be a stack of paper 6 billion miles high. That's enough to wrap around the earth 240,000 times.โžŸ ๐Ž๐ฎ๐ซ ๐ฎ๐ง๐ข๐ฏ๐ž๐ซ๐ฌ๐ž: There are 70 sextillion (7 followed by 22 zeros) stars in the observable universe. If each star represented a byte, we're talking about 1.5-2 times the number of stars we can observe.โžŸ ๐‡๐ฎ๐ฆ๐š๐ง ๐‚๐ž๐ฅ๐ฅ๐ฌ: The human body is made up of approximately 37.2 trillion cells. If each byte in 100 Zettabytes represented a single human cell, it would equal the total cell count of about 2.69 billion humans.โžŸ ๐’๐š๐ง๐ ๐†๐ซ๐š๐ข๐ง๐ฌ ๐จ๐ง ๐„๐š๐ซ๐ญ๐ก'๐ฌ ๐๐ž๐š๐œ๐ก๐ž๐ฌ: While estimates vary, a common figure is that there are roughly 7.5 x 10^18 (7.5 quintillion) grains of sand on all the world's beaches. 100 Zettabytes, in sand grain terms, would then represent about 13,333 times more sand grains than what's found on Earth's beaches.

    16

    4 Comments

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    ๐—ฆ๐˜‚๐—ป๐—ฑ๐—ฎ๐˜† ๐—™๐˜‚๐—บ๐—ฏ๐—น๐—ฒ๐˜€: The idea of a wireless personal communicator in every pocket is "a pipe dream driven by greed."These famous words were ushered at the 1992 Motorola Tech Conference by none other than Andrew Grove. Then-CEO of Intel.As of 2024, there are an estimated ~6 billion smartphones around, almost exclusively powered by non-Intel chips.Source: NY Times 1992 article:https://lnkd.in/epHh8jGe

    11

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    ๐—ฆ๐˜‚๐—ป๐—ฑ๐—ฎ๐˜† ๐—™๐˜‚๐—บ๐—ฏ๐—น๐—ฒ๐˜€: "Screw the Nano. What the hell does the Nano do? Who listens to 1,000 songs?" This was Motorola CEO Ed Zander at a conference in 2006 about Apple's new iPod Nano. Motorola's competing ROKR held a mere 100 songs at that time. The iPod Nano went on to become the most popular "mp3 player" before mp3 players fell out of fashion altogether when being fully integrated into modern smartphones.

    14

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    Does your website have a /security.txt? If not, it might be time to create one. If security researches or white hat hackers find vulnerabilities on your website it's essential they have a way to contact you about it. The Internet Engineering Task Force (IETF) have issued this as information standard RFC 9116. You should store your security.txt file so it's accessible via the top-level directory /security.txt or via /.well-known/security.txt. Both are totally fine! Facebook, e.g., uses the top-level directory for the file (https://lnkd.in/gjW7hjVi) LinkedIn the .well-known directory (https://lnkd.in/gJKw_NPQ) As a start, you can use this one: # Conforms to IETF `RFC 9116` Canonical: [Link to this document] Contact: [link to a dedicated contact form, ideally not on this domain / server and/or an email address] Policy: [(optional) potentially a link to your policy, if you have one] https://lnkd.in/gKnGbJ4d

    https://www.facebook.com/security.txt)

    4

    2 Comments

    Like Comment

    To view or add a comment, sign in

  • Anthony Spaelti

    Hyperion | Stanford MBA |McKinsey

    • Report this post

    Take a break -- have a look at the "splash screens of victory" on dark websites. Dark websites are usually hosted on sub-par servers and are not accessible through regular domains. While it's hard to find the physical infrastructure these websites are hosted on, it's not impossible. One of the widest publicized seizures of dark websites was the 2013 Silk Road Marketplace takedown (see the last image). The "silk road anonymous market" sold drugs, weapons, (child) p*rnography, and everything else bad actors across the world might want. Through a relatively sophisticated dark web escrow concept, they even enabled the smooth transfer of these illegal goods & services. Since this takedown, displaying these splash screens as a sign of deterrence has become standard practice. It also signals the increased and complex cooperation between law enforcement agencies across the world. However, a big critique is that these services usually quickly spawn up again somewhere else and law enforcement would do better "imitating" these services to also track the users of these sites. But naturally, this is not always that easy (& legally possible) to do!

    • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (35)
    • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (36)
    • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (37)
    • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (38)
    • Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (39)

      +2

    12

    5 Comments

    Like Comment

    To view or add a comment, sign in

Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (42)

Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (43)

1,826 followers

  • 95 Posts

View Profile

Follow

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Anthony Spaelti on LinkedIn: Cybersecurity / SPAM PSA: In 2024, the quickest and easiest way to avoidโ€ฆ (2024)
Top Articles
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6409

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.