Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

According to acting United States Attorney Joon H. Kim, “This case should serve as a wake-up call to all companies--even the most sophisticated--that they too can be victims of phishing attacks by cyber criminals.” These words apply to the business world for one major reason: the public doesn’t know who, specifically, the two affected companies are. All that we know is that one of them is a “multinational online social media company” and the other a “multinational technology company.”

Rimasauskas is facing charges of orchestrating a phishing attack that was supposed to convince the victims to wire transfer funds into accounts in Latvia and Cyprus. The U.S. Department of Justice explains that this feat was accomplished by building a company in Latvia with the same name as a computer manufacturer in Asia. The fake company then used its new identity to reach out to companies that had a known relationship with the Asian manufacturer or its services, claiming that there were balances that had yet to be paid. Following the wire transfer, Rimasauskas would then divvy up the funds for transfer to various global bank accounts.

These allegations have brought wire fraud charges against Rimasauskas that could potentially land him in prison for up to 20 years, as well as three more counts of money laundering, each also worth a maximum of 20 years each. To top it all off, he has a single count of aggravated identity theft with a minimum of two years in prison.

So, what can your business learn from this incident? Well, the first is that these victims were described as “multinational,” meaning that they are large countries that are easily recognizable. Companies as large as these certainly have the means to protect themselves from the odd phishing scammer, but the perpetrator was able to bypass these security standards by targeting the users directly.

The old adage, a chain is only as strong as its weakest link, still holds strong; and, in situations like these, that link is painfully clear. For smaller organizations, the need is only more important, as it becomes more critical to shore up this particular weakness. Larger organizations have more difficulty ensuring these high standards for all employees. It’s important that each and every member of your staff understand company security policies.

The second lesson that you can learn from this event comes from the process used by hackers to defraud businesses. Considering that many hackers will only want to put in the minimum amount of effort to hit their targets, it’s logical to assume they would rather go after an easier target than invest more effort with no possibility for a return. It’s simply a matter of how much work it is to get around enterprise-level security.

What happens when all it takes to collect data is writing a couple of emails and setting up bank accounts? A hacker can then communicate with the target and take whatever they can get, and do the same thing to any other companies foolish enough to fall for the trick.

The biggest takeaway from this event is that you can’t ignore the basics. Training, in combination with powerful enterprise-level security, can be a great way to ward off potential attacks. In fact, companies are quite rarely breached due to advanced threats, and are often brought down due to something small that was overlooked, like a spam email or access log discrepancy.

You won’t catch Symmetric Engineering Group ignoring important details that could threaten your business. For more information about what we can do for your network’s security, reach out to us at (813) 749-0895.

 

Comments

No comments made yet. Be the first to submit a comment

Search

Mobile? Grab this Article!

Qr Code

Tag Cloud

IT Support IT Services Tip of the Week Security Managed IT Services IT Infrastructure Management IT Companies in Tampa Best Practices Business Mobility IT Support Services Cloud Business Continuity Business IT Solutions I.T. Management IT Professional Services Custom Business Solutions Business Computing Technology Hackers Email Microsoft IT Business Solutions Business Applications Privacy Internet IT Management Productivity Technology Consultants Business Malware Managed Service Provider Managed IT Service in Florida Windows 10 Business IT Support Managed IT Service Hosted Solutions Computer Managed Services in Florida I.T. Support IT Support Services in Tampa I.T. Services Windows Dynamic Solutions IT Risk Management Mobile Devices IT Outsourcing in Tampa IT Services in Florida IT Support in Tampa Disaster Recovery Data IT Service Internet of Things Managed Services Software Managed IT Ransomware Outsourced IT Managed Services in Tampa Bay Google Hardware Communication IT Managed Services Workplace Tips IT Services in Tampa Upgrade Mobile Device Management Backup Microsoft Office Tech Companies in Tampa Network Security Remote Monitoring Android App Tampa IT Support Network Gmail Vendor Management Computer Networking Phishing Social Media IT Service Management IT Vendor Management IT Company Business Plan Firewall Apple Save Money Innovation Data Management IT Outsourcing Business IT Support Services Browser Small Business IT Solutions Operating System User Tips Content Filtering Data Computer Services Mobile Device Collaboration Managed Service in Tampa Unified Threat Management Smartphone IT Outsourcing in Florida WiFi Computer Hardware Repair Bring Your Own Device Customer Relationship Management Smartphones Settings Cloud Computing IT solutions IT Company Robot Wireless Technology Cybersecurity Retail Passwords Telephone Systems Hosted Solution BYOD Data storage IT Management Services Big Data Holiday Risk Management Facebook Miscellaneous Server IT Support Customer Service Efficiency Money Automation Artificial Intelligence Office Tips Business Application Managed IT Services Word Computer Network Services Office 365 Budget Apps Network Congestion Recovery Presentation IT Companies in Florida IT Support Helpdesk Encryption Analytics IT Management Service Mobile Computing Training Solid State Drive End of Support Data Backup Laptop Website YouTube Virtual Desktop Small Business Google Drive Administration Office Computer Support I.T. Company Computer Networking Services Monitors Productivity Alert Help Desk communications Virtualization Uninterrupted Power Supply Wireless BDR Remote Computing Saving Money Microsoft Virtual Server Hosting in Tampa and Florida IBM Managed IT Outsourcing SaaS Chrome Business Continuity Services LiFi Information Technology IT Service in Tampa Managed it Services in Tampa Top IT Outsourcing Company Jobs Co-managed IT Firefox Computer Care Service IT Undo IT Consulting Service Tablet CIO Two-factor Authentication Managed Service Providers Mouse Assessment IT Solutions for Small Business Application User Competition IT Vendor Management in Tampa Deep Learning Google Maps User Error Maintenance Tech Company in Tampa Social Data Technology Save Time Managed Services in Floirda Consultation Microsoft Affiliate Program Avoiding Downtime Politics History Humor Network Support in Florida Cryptocurrency IT Consulting IT Tech Support Corporate Profile Writing Business Growth Hacks Backups IT Company in Tampa Quick Tips Augmented Reality Microsoft Business Solutions The Internet of Things Disaster Automobile Bitcoin Identities Licensing Technology Consulting Firms WannaCry Social Engineering VoIP Current Events Legal Managed Service in Florida Information Technology Consulting Time Management Bandwidth Fun Gadgets Professional Service Health Antivirus Windows 8 Health Care IT Services Software Tips Server Hosting in Tampa Downtime Data loss Hacker Password Going Green IT Consulting Services Network Management Education File Sharing Computers Sync Outlook IT Managed Service Provider Business IT Solutions Alt Codes Halloween VoIP Net Neutrality Printing IT Support Companies in Tampa Flexibility Search Scary Stories Cabling Display Domains Mobile Device Managment Full Service IT Typing Server Hosting Users Digital Compliance Best Practice Hard Drives Intranet Google Docs IT Support and Solutions Mobility Sports Infrastructure Public Speaking Healthcare IT Spam Marketing Spyware Regulations Safety USB Computing IT Managed Service in Tampa Cortana Server Hosting in Florida Digital Signature Storage Programming Virtual Reality Google Wallet Business Continuity Service Providers Help Desk Support in Tampa Tampa IT Services Unified Communications Knowledge Buisness Hard Disk Drive Dark Data Careers Computer Repair How To Consulting Services Employer-Employee Relationship Drones Help Desk Support Outsourced Computer Support Experience Digital Payment Trending Travel Update 3D Printing 5G Law Enforcement Private Cloud Business Appplications Saving Time Motion Sickness I.T. Managament Electronic Medical Records Chromebook Staffing Gadget Error Business Management Meetings Unsupported Software GPS Public Cloud Physical Security Webcam Twitter Windows 10 Mobile Data Tracking Telephony Cybercrime Point of Sale VPN Processors Tip of the week Document Management Administrator Running Cable Web Server Samsung Emoji Identity Theft Virus Hacking Black Market Managed Servers IP Address Cameras Notifications Files Touchscreen Mobile Office CCTV Websites Hiring/Firing Paperless Office Taxes Lithium-ion Battery Heating/Cooling Crowdsourcing Refrigeration Botnet Supercomputer G Suite Personal Information CrashOverride How To Government Cost Management Machine Learning Thank You IT Budget IT Consultant Tech Support Upgrades Wi-Fi Cleaning Work/Life Balance Relocation Congratulations

Latest Blog Entry

There are some tasks that are essential to the health of your business’ network. For example, you need to make sure that you are engaging in regular network management activities. Do you know what this task entails?

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login