Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

According to acting United States Attorney Joon H. Kim, “This case should serve as a wake-up call to all companies--even the most sophisticated--that they too can be victims of phishing attacks by cyber criminals.” These words apply to the business world for one major reason: the public doesn’t know who, specifically, the two affected companies are. All that we know is that one of them is a “multinational online social media company” and the other a “multinational technology company.”

Rimasauskas is facing charges of orchestrating a phishing attack that was supposed to convince the victims to wire transfer funds into accounts in Latvia and Cyprus. The U.S. Department of Justice explains that this feat was accomplished by building a company in Latvia with the same name as a computer manufacturer in Asia. The fake company then used its new identity to reach out to companies that had a known relationship with the Asian manufacturer or its services, claiming that there were balances that had yet to be paid. Following the wire transfer, Rimasauskas would then divvy up the funds for transfer to various global bank accounts.

These allegations have brought wire fraud charges against Rimasauskas that could potentially land him in prison for up to 20 years, as well as three more counts of money laundering, each also worth a maximum of 20 years each. To top it all off, he has a single count of aggravated identity theft with a minimum of two years in prison.

So, what can your business learn from this incident? Well, the first is that these victims were described as “multinational,” meaning that they are large countries that are easily recognizable. Companies as large as these certainly have the means to protect themselves from the odd phishing scammer, but the perpetrator was able to bypass these security standards by targeting the users directly.

The old adage, a chain is only as strong as its weakest link, still holds strong; and, in situations like these, that link is painfully clear. For smaller organizations, the need is only more important, as it becomes more critical to shore up this particular weakness. Larger organizations have more difficulty ensuring these high standards for all employees. It’s important that each and every member of your staff understand company security policies.

The second lesson that you can learn from this event comes from the process used by hackers to defraud businesses. Considering that many hackers will only want to put in the minimum amount of effort to hit their targets, it’s logical to assume they would rather go after an easier target than invest more effort with no possibility for a return. It’s simply a matter of how much work it is to get around enterprise-level security.

What happens when all it takes to collect data is writing a couple of emails and setting up bank accounts? A hacker can then communicate with the target and take whatever they can get, and do the same thing to any other companies foolish enough to fall for the trick.

The biggest takeaway from this event is that you can’t ignore the basics. Training, in combination with powerful enterprise-level security, can be a great way to ward off potential attacks. In fact, companies are quite rarely breached due to advanced threats, and are often brought down due to something small that was overlooked, like a spam email or access log discrepancy.

You won’t catch Symmetric Engineering Group ignoring important details that could threaten your business. For more information about what we can do for your network’s security, reach out to us at (813) 749-0895.



No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services Best Practices Cloud IT Infrastructure Management Technology IT Companies in Tampa Business Computing Business Continuity Malware Email Privacy Business Mobility IT Support Services Hackers Business IT Solutions I.T. Management Productivity Microsoft IT Professional Services Custom Business Solutions Hosted Solutions Internet Managed Service Provider Business IT Management IT Business Solutions Business Applications Outsourced IT Software Mobile Devices Ransomware Network Security Computer Technology Consultants Managed IT Managed IT Service in Florida Windows 10 Business IT Support Android Managed IT Service I.T. Support Windows Managed Services in Florida IT Support Services in Tampa Data Backup Dynamic Solutions Backup IT Risk Management User Tips Disaster Recovery Data I.T. Services Cloud Computing Data Management IT Outsourcing in Tampa IT Services in Florida Google Browser Internet of Things Remote Monitoring Communication Smartphone Data Recovery IT Support in Tampa Hardware IT Service Managed Services Small Business Smartphones Innovation Encryption Upgrade Managed Services in Tampa Bay IT Managed Services Microsoft Office Gmail Holiday Workplace Tips Server Network Firewall Vendor Management Social Media IT Services in Tampa Business Management Mobile Device Management Cybersecurity Tech Companies in Tampa BYOD Artificial Intelligence Mobile Device App Tampa IT Support Phishing Office 365 IT Outsourcing IT Outsourcing in Florida Business IT Support Services Efficiency Save Money Small Business IT Solutions IT Vendor Management Apple Data Computer Services Infrastructure Antivirus Operating System Tip of the week Risk Management Unified Threat Management Passwords Computer Networking Content Filtering IT Service Management Collaboration IT Company Business Plan Word Managed Service in Tampa SaaS IT solutions Settings Automation Applications Bring Your Own Device Data loss Customer Relationship Management Wireless Technology Website Hosted Solution Telephone Systems IT Company Data storage Mobile Computing Data Security Analytics Productivity Robot Windows 10 Government Big Data Retail Facebook Money IT Support Chrome Computer Hardware Repair Tech Term Project Management WiFi IT Management Services Saving Money Two-factor Authentication Remote Computing Miscellaneous Business Technology User Error Budget Information Technology Apps Licensing Bandwidth Business Application Augmented Reality Solid State Drive Recovery Training Presentation Document Management VoIP VPN HIPAA Scam Administration Google Drive Computer Support IT Consulting Vulnerability I.T. Company Mobile Security The Internet of Things YouTube Computer Networking Services Network Congestion Virtual Desktop IT Companies in Florida Search IT Support Helpdesk Office Virtual Private Network Computing Mobility communications IT Management Service Storage Spam Uninterrupted Power Supply Unified Communications End of Support Laptop Managed IT Outsourcing Outlook BDR Net Neutrality Business Continuity Services Wireless LiFi Flexibility Digital Payment Redundancy IBM Compliance Employer-Employee Relationship Paperless Office Monitors Server Management Alert Tablet Computer Network Services Help Desk Customer Service Regulations Mouse Virtualization Managed IT Services Office Tips Virtual Reality Microsoft Virtual Server Hosting in Tampa and Florida Maintenance Consulting Services Blockchain Backups Operations Corporate Profile Unified Threat Management Bitcoin Help Desk Support Identities Outsourced Computer Support Avoiding Downtime Jobs IT Service in Tampa Router Quick Tips Cyber Monday Current Events Technology Consulting Firms Lenovo Information Technology Consulting Automobile Service IT Permissions Legal Wearable Technology Professional Service WannaCry Printer Windows 8 Modem Time Management Going Green Shortcut Application Software Tips Superfish IT Consulting Services Education IT Solutions for Small Business Fraud IT Managed Service Provider Access Control IT Vendor Management in Tampa Fun Alt Codes Samsung Data Technology File Sharing Health Cookies Network Management Software as a Service Printing Identity Theft Patch Management Downtime Managed Services in Floirda Sync Hacker Password Microsoft Affiliate Program Internet Exlporer IT Technicians History VoIP SharePoint Network Support in Florida Typing Hacking Files Writing Nanotechnology Business Growth Touchscreen Technology Tips Halloween Google Docs Cabling Networking IT Company in Tampa Mobile Device Managment Microsoft Business Solutions Mirgation Healthcare IT Disaster Digital Downloads Scary Stories Websites Domains Social Engineering Smart Technology Hotspot Users Managed Service in Florida Best Practice Hard Drives Migration Gadgets Spyware Multi-Factor Security Health Care IT Services Mail Merge Sports Server Hosting in Tampa Public Speaking Distributed Denial of Service Google Wallet Language Business Continuity Service Providers Techology Marketing Safety Heating/Cooling Computers Chatbots Dark Data Google Calendar Cortana Computer Repair Business IT Solutions Address Programming Break Fix Drones Computing Infrastructure Hard Disk Drive Disaster Resistance IT Support Companies in Tampa Full Service IT Display Identity How To Legislation Top IT Outsourcing Company Servers Knowledge Buisness Server Hosting Tech Support Dark Web Alerts IT Consulting Service Proactive IT Intranet IT Support and Solutions Travel Wi-Fi Managed it Services in Tampa Firefox Comparison Computer Care Experience Trending USB Data Warehousing Server Hosting in Florida Cooperation Data Breach Co-managed IT IT Managed Service in Tampa Deep Learning Managed Service Providers Undo Social Networking Digital Signature Assessment Specifications Social Statistics Google Maps CIO Microsoft Excel Save Time Staff Humor Technology Laws Cryptocurrency Help Desk Support in Tampa Tampa IT Services Tech Company in Tampa User Careers Politics Competition Motherboard Consultation Black Friday Hacks Bluetooth IT Tech Support Public Cloud Upgrades Webcam Congratulations Twitter Telephony Tracking Update 3D Printing Business Appplications Point of Sale Processors Electronic Medical Records Saving Time Cybercrime Chromebook Administrator Web Server Running Cable Unsupported Software Cameras Physical Security Notifications IP Address Mobile Data CCTV Screen Reader Mobile Office Taxes Hiring/Firing Crowdsourcing Supercomputer Botnet Smart Tech Virus Emoji G Suite Refrigeration CrashOverride Black Market IT Budget Managed Servers Machine Learning Connectivity Work/Life Balance Cost Management Cleaning Relocation Law Enforcement I.T. Managament Private Cloud Lithium-ion Battery Motion Sickness 5G Personal Information Gadget Staffing Emergency Error How To Meetings Thank You IT Consultant GPS

Latest Blog Entry

One of the primary goals of technology development has long been to make technology as small as possible, while simultaneously improving its performance. The result of these efforts is the field of nanotechnology, which is now applied in a variety of uses.

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login