Since 2019, public authorities, universities and healthcare institutions have increasingly become the target of hacking attacks. The Berlin Court of Appeal, the University of Gießen and the Hospital of Fürth are only the best-known victims of cyber criminals. And they have two things in common: in all cases the IT infrastructures were infected with the malware Emotet, and the consequences of all infections were catastrophic.
Much has been written lately about Emotet and the consequences that an infestation with this banking Trojan can have. Among other things, public institutions have had and are struggling with the consequences of successful cyberattacks that have polluted and crippled their respective IT infrastructures, with sometimes catastrophic consequences. The Berlin Chamber Court is perhaps the best-known example, as large amounts of data could probably be stolen over several days. A real IT total damage. We have already explained how you and your company can protect yourself from emotet elsewhere.
But what does an emotet email actually look like? Three concrete examples show how authentic emotet emails now look. All three examples have been reported to us and have only been anonymized by us to the extent necessary for data protection reasons.
A large number of cyber attacks hit public institutions and authorities in 2019. The administration of the city of Frankfurt am Main, the Berlin Chamber Court and the administration of Neustadt am Rübenberge are just three examples that show the catastrophic consequences that an infestation with malware can have for authorities. In all these cases, it was the banking Trojan Emotet – the most dangerous malware in the world at the moment, according to the Federal Ministry for Information Security (BSI) – that was able to paralyze these authorities and in some cases still does so.
Currently, due to a security vulnerability, criminals are apparently able to smuggle malicious code into iPhones and iPads via emails. Affected are iOS devices on whichenen the software is installed in version 13.4.1 or a previous version up to version 6 . The Federal Office for Information Security (BSI) assesses the vulnerability as very critical […]
In IT Finanzmagazin, the specialist magazine for IT and organisation at banks, savings banks and insurance companies, Metehan Manap, head of the IT Operational Services department at WWK, looks back on a great project in the field of e-mail encryption. Together with GlobalSign, NoSpamProxy secures the data protection compliant communication of the insurance group with […]
In many cases, the banking Trojan Emotet reaches IT infrastructures via contaminated Office files containing so-called macros. A macro is a kind of mini-program that – if permission has been granted – executes a specific sequence of instructions. Cyber criminals have used macros to find a way to infect computers with emotet and other malware. Because they are often not needed, these macros can be prevented from running in Office 365, either manually or through Group Policy – if it weren’t for a glaring vulnerability in certain business versions of Office 365.eklatante Sicherheitslücke in bestimmten Business-Versionen von Office 365.
Stefan Cink, Product Manager of NoSpamProxy and email security expert at Net at Work, is the new Business Unit Manager for NoSpamProxy as of January 1, 2020. As Business Unit Manager, he reports directly to the management and is responsible for the business objectives regarding profitability, growth and sustainability. He takes over this task from Dr. Horst Joepen, who has led the expansion of the NoSpamProxy business as an external consultant for five years and will continue to actively support us as a consultant for strategy and new market opportunities.
Read the full press release (German only)
Every email is vulnerable – theoretically. The journey of an email through the Internet is long, although the speed of transmission often makes this forget. Emails can be intercepted, read, or even modified during transportation. At least if they are sent unencrypted. The consequences may be devastating: Qinthe ancendatous damage, loss of data or loss of image are at risk for all those who exchange emails unencrypted. In addition, unencrypted emails are already no longer compatible with data protection – also with regard to the General Data Protection Regulation (GDPR)
One way to enable secure email communication and send information confidentially and securely is to use PKI-based e-mail encryption and signature. PKI stands for Public Key Infrastructure, and the most common standard for such encryption is S/MIME (Secure/Multipurpose Internet Mail) Extensions).
NoSpamProxy
Categories
Latest News
- End-to-End Encryption or Gateway-to-Gateway Encryption?13.02.2025 - 10:00
- DMARC Policy: Why p=none is a bad choice27.01.2025 - 10:00