{"id":961,"date":"2013-02-02T00:00:00","date_gmt":"2013-02-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/02\/new-phishing-malware-targets-indian-aerospace-defence-industries-times-of-india\/"},"modified":"2021-12-30T11:38:29","modified_gmt":"2021-12-30T11:38:29","slug":"new-phishing-malware-targets-indian-aerospace-defence-industries-times-of-india","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/02\/new-phishing-malware-targets-indian-aerospace-defence-industries-times-of-india\/","title":{"rendered":"New phishing malware targets Indian aerospace, defence industries &#8211; Times Of India"},"content":{"rendered":"<p>Anand Naik, managing director, sales, India and SAARC, Symantec, said &#8220;The rapid proliferation of phishing attacks in India and globally especially in verticals which contain critical information, is becoming a major problem for businesses. The attackers used a report published in 2012 regarding the outlook of the aerospace and defense industries as the lure.   The intention of the attackers was to make it seem as though this email originally came from the company that authored the report.   The emails were also crafted to look as though they were being forwarded by internal employees or individuals from within the industries.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The release said that this spear phishing campaign continues to show the sophistication and preparation of attackers, especially gathering intelligence on what social engineering will best entice targets.   Also, Symantec Intelligence report (June, 2012) revealed that globally, the defense industry (a sub category of the Public Sector) has been the targeted industry of choice in the first half of the year, with an average of 7.3 attacks per day.<\/p>\n<p>Organizations should thus ensure that proper email security is in place and also make patch management a priority, as the vulnerability exploited here was patched in 2011.   Businesses will have to engage with IT security solutions providers as their business partners and engage with them in an ongoing, service level agreement based relationships.<\/p>\n<p>Link: http:\/\/articles.timesofindia.indiatimes.com\/2013-02-02\/software-services\/36703043_1_symantec-intelligence-report-targets-attackers<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-961","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=961"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/961\/revisions"}],"predecessor-version":[{"id":3448,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/961\/revisions\/3448"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}