Get Started Today!  (813) 749-0895    SEARCH SITE

IT Professional Services and Business Continuity

Blog for IT Support and Managed Services in Tampa and Florida

Providing Business IT Support such as technical IT Helpdesk Support, Outsourced Computer Support, Technology Consulting, and Managed IT Services to small and medium-sized businesses in Tampa and Florida.

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

According to acting United States Attorney Joon H. Kim, “This case should serve as a wake-up call to all companies--even the most sophisticated--that they too can be victims of phishing attacks by cyber criminals.” These words apply to the business world for one major reason: the public doesn’t know who, specifically, the two affected companies are. All that we know is that one of them is a “multinational online social media company” and the other a “multinational technology company.”

Rimasauskas is facing charges of orchestrating a phishing attack that was supposed to convince the victims to wire transfer funds into accounts in Latvia and Cyprus. The U.S. Department of Justice explains that this feat was accomplished by building a company in Latvia with the same name as a computer manufacturer in Asia. The fake company then used its new identity to reach out to companies that had a known relationship with the Asian manufacturer or its services, claiming that there were balances that had yet to be paid. Following the wire transfer, Rimasauskas would then divvy up the funds for transfer to various global bank accounts.

These allegations have brought wire fraud charges against Rimasauskas that could potentially land him in prison for up to 20 years, as well as three more counts of money laundering, each also worth a maximum of 20 years each. To top it all off, he has a single count of aggravated identity theft with a minimum of two years in prison.

So, what can your business learn from this incident? Well, the first is that these victims were described as “multinational,” meaning that they are large countries that are easily recognizable. Companies as large as these certainly have the means to protect themselves from the odd phishing scammer, but the perpetrator was able to bypass these security standards by targeting the users directly.

The old adage, a chain is only as strong as its weakest link, still holds strong; and, in situations like these, that link is painfully clear. For smaller organizations, the need is only more important, as it becomes more critical to shore up this particular weakness. Larger organizations have more difficulty ensuring these high standards for all employees. It’s important that each and every member of your staff understand company security policies.

The second lesson that you can learn from this event comes from the process used by hackers to defraud businesses. Considering that many hackers will only want to put in the minimum amount of effort to hit their targets, it’s logical to assume they would rather go after an easier target than invest more effort with no possibility for a return. It’s simply a matter of how much work it is to get around enterprise-level security.

What happens when all it takes to collect data is writing a couple of emails and setting up bank accounts? A hacker can then communicate with the target and take whatever they can get, and do the same thing to any other companies foolish enough to fall for the trick.

The biggest takeaway from this event is that you can’t ignore the basics. Training, in combination with powerful enterprise-level security, can be a great way to ward off potential attacks. In fact, companies are quite rarely breached due to advanced threats, and are often brought down due to something small that was overlooked, like a spam email or access log discrepancy.

You won’t catch Symmetric Engineering Group ignoring important details that could threaten your business. For more information about what we can do for your network’s security, reach out to us at (813) 749-0895.



No comments made yet. Be the first to submit a comment


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week IT Services IT Support Managed IT Services IT Infrastructure Management Best Practices IT Companies in Tampa Cloud Technology Business Continuity Business Mobility IT Support Services Business Computing Privacy Hackers Business IT Solutions Email I.T. Management Malware Productivity IT Professional Services Microsoft Custom Business Solutions Internet Managed Service Provider Business IT Management IT Business Solutions Business Applications Outsourced IT Software Hosted Solutions Technology Consultants Managed IT Service in Florida Mobile Devices Business IT Support Network Security Windows 10 Managed IT Android Managed IT Service Computer Managed Services in Florida I.T. Support Windows Ransomware Dynamic Solutions IT Risk Management Data IT Support Services in Tampa I.T. Services Google User Tips Backup Disaster Recovery Internet of Things Remote Monitoring IT Outsourcing in Tampa Data Backup IT Services in Florida IT Service Data Recovery Browser Small Business Managed Services Communication IT Support in Tampa Smartphone Encryption Hardware Microsoft Office IT Managed Services Gmail Smartphones Holiday Data Management Managed Services in Tampa Bay Workplace Tips Tech Companies in Tampa Network Vendor Management Upgrade Business Management Mobile Device Management Tampa IT Support Cloud Computing Phishing IT Services in Tampa Office 365 App Firewall Cybersecurity Innovation Server IT Outsourcing Efficiency Business IT Support Services Social Media Unified Threat Management Small Business IT Solutions Mobile Device Apple Data Computer Services Managed Service in Tampa Risk Management Antivirus IT Outsourcing in Florida Operating System Word IT Vendor Management Content Filtering BYOD Computer Networking Artificial Intelligence Tip of the week Collaboration IT Service Management Save Money IT Company Business Plan IT solutions Wireless Technology Project Management Automation Bring Your Own Device Customer Relationship Management IT Support IT Management Services Applications Hosted Solution Big Data Facebook Analytics SaaS Data storage Chrome WiFi Retail Passwords Two-factor Authentication Data Security Windows 10 Money Computer Hardware Repair Settings Telephone Systems IT Company Miscellaneous Robot Productivity VoIP Server Management Information Technology End of Support Uninterrupted Power Supply BDR Government Flexibility Bandwidth Website Virtual Desktop Solid State Drive YouTube Search Digital Payment Office Business Technology Paperless Office Monitors Tablet Help Desk Administration Managed IT Services Google Drive Computer Support The Internet of Things Network Congestion Virtual Reality I.T. Company Computer Networking Services Microsoft Virtual Server Hosting in Tampa and Florida Maintenance Wireless Mobile Computing HIPAA Computing communications IBM Scam Employer-Employee Relationship Outlook Licensing Vulnerability Laptop Unified Communications Business Application Mobile Security Net Neutrality Customer Service Document Management Managed IT Outsourcing Training Office Tips Virtual Private Network LiFi Data loss Business Continuity Services Alert User Error Budget IT Consulting Virtualization Mouse Apps Computer Network Services IT Companies in Florida IT Support Helpdesk Remote Computing Saving Money Augmented Reality Mobility Recovery IT Management Service Infrastructure Presentation Redundancy Cryptocurrency VPN Health Care IT Services Alerts Spyware Humor Proactive IT Fun Comparison Hacks Server Hosting in Tampa IT Tech Support Data Warehousing Backups Health Bitcoin Password Business IT Solutions Identities Computers Downtime Cooperation Hacker Data Breach Specifications Current Events Hacking Statistics Technology Consulting Firms Halloween Microsoft Excel Hard Disk Drive Legal IT Support Companies in Tampa Information Technology Consulting Windows 8 Full Service IT Application Display Staff How To Professional Service Technology Laws Black Friday Going Green Bluetooth Server Hosting Compliance Managed it Services in Tampa Education Scary Stories Blockchain Domains Travel IT Support and Solutions IT Consulting Services Unified Threat Management Computer Care Best Practice Alt Codes Users Operations Firefox IT Managed Service Provider Cyber Monday Printing Hard Drives History Regulations Business Growth Managed Service Providers Server Hosting in Florida Sports Permissions Public Speaking Lenovo IT Managed Service in Tampa Spam Safety Printer Heating/Cooling Typing Marketing Wearable Technology Assessment Cortana Google Maps Shortcut Disaster Programming Tech Company in Tampa Tampa IT Services Fraud Google Docs Superfish Help Desk Support in Tampa Healthcare IT Access Control Politics Careers Consultation Consulting Services Knowledge Software as a Service Patch Management Gadgets Tech Support Outsourced Computer Support Buisness Internet Exlporer Corporate Profile Help Desk Support Storage Wi-Fi SharePoint Jobs IT Service in Tampa IT Technicians Quick Tips Service IT Experience Technology Tips Google Wallet Automobile Trending WannaCry Business Continuity Service Providers Networking Dark Data Downloads Computer Repair Co-managed IT Mirgation Time Management IT Solutions for Small Business Smart Technology Software Tips Drones Undo Samsung CIO Hotspot IT Vendor Management in Tampa Multi-Factor Security Top IT Outsourcing Company User File Sharing Data Technology Intranet Network Management Microsoft Affiliate Program Distributed Denial of Service Competition Mail Merge Sync Managed Services in Floirda Network Support in Florida Language USB VoIP IT Consulting Service Techology Google Calendar Avoiding Downtime Files Writing Touchscreen Microsoft Business Solutions Break Fix Cabling Address Mobile Device Managment IT Company in Tampa Digital Signature Deep Learning Computing Infrastructure Digital Disaster Resistance Legislation Social Servers Websites Social Engineering Dark Web Save Time Managed Service in Florida Taxes Crowdsourcing Congratulations Supercomputer Botnet Running Cable G Suite Emoji Black Market CrashOverride IT Budget Machine Learning Managed Servers Saving Time Emergency Cleaning Work/Life Balance IP Address Relocation Law Enforcement Mobile Office Hiring/Firing Private Cloud Motion Sickness Staffing Gadget Personal Information Refrigeration Error How To Meetings GPS Cost Management Public Cloud Upgrades Twitter Webcam Tracking Telephony Virus Update 3D Printing Processors Point of Sale Business Appplications 5G Electronic Medical Records Administrator Chromebook Web Server Identity Theft Unsupported Software Notifications Physical Security Lithium-ion Battery Cameras I.T. Managament Mobile Data CCTV Thank You Cybercrime IT Consultant

Latest Blog Entry

It’s no secret that a business owner has more than enough to deal with, regardless of that business’ size.Whether the business has 10 employees or 100, the business owner has to deal with the stress of managing the minutiae of everyday operations, along with any other issues...

Latest News

SEG Awarded Small Business of the Year Award!

Symmetric Engineering Group was awarded the Upper Tampa Bay Chamber Small Business of the Year Award for their understanding technical service and support throughout the Tampa Bay area

Read more ...

Account Login