Contact Us

CSUN Information Technology


Monday to Friday, 8am to 5pm

Faculty Technology Center
(818) 677-3443

IT Help Center
(818) 677-1400

Information Security
(818) 677-6100

Universal Design Center
(818) 677-5898

Classroom Support
(818) 677-1500

Send email

Check our social media for changes and updates.

  

instagram icon Twitter  

Security Blog

Security Alert!


Southern California Wildfire-Themed Scams

Cyber criminals are currently exploiting the ongoing Southern California wildfires by using Southern California wildfire-themed lures for their phishing attempts and scams. Phishing can be conducted through emails, text messages, QR codes, phone calls, and voicemails. Threat actors move quickly to incorporate current fire based themes into the subject matter of their phishing emails, smishing text messages, and even crowdfunding or fundraising campaign scams on social media. 


If you have been impacted by the fires, you may likely need the support of local, state, and federal resources. Cybercriminals will masquerade as all three. They may impersonate property inspectors and building contractors or claim to be agencies offering state or federal aid. Some even offer to help replace identification cards, passports, or documents. They aim to steal your money and personal information. 

Use these tips against cybercriminals:


•    Know that federal and state workers do not ask for or accept money.
•    Use a licensed local contractor who has reliable references.
•    Only reveal personal information if you initiate contact with a government official.
•    Do not pay by wire transfer, gift card, cryptocurrency, or cash.

Even if you’re not personally affected by the fires, you may want to lend a hand. But, your generosity provides a perfect opportunity for scammers to exploit your good nature. Follow these tips to help keep your donation money from falling into the wrong hands:


•    Research the charity and the organization’s tax status – try using the Better Business Bureau Wise Giving Alliance.
•    Be suspicious of charities requesting cash donations, wire transfers, gift cards, or cryptocurrency.
•    Beware of direct emails from ‘victims’ and solicitors with heart-wrenching stories.
•    Contribute only by check or credit card to have a record of the donation.
 


Network-Connected Wrench Vulnerability

DATE(S) ISSUED:

1/11/24

SUBJECT: 

Vulnerability in a network-connected wrench having potential safety issues

OVERVIEW:

Security researchers from Nozomi have discovered 23 vulnerabilities in the Bosch Rexroth Handheld Nutrunner NXA015S-36V-B, a cordless wrench used in factories worldwide for precise torque applications. The device connects wirelessly to local networks, allowing engineers to tighten bolts accurately. Exploiting these vulnerabilities could enable hackers to install malware, potentially leading to the sabotage or disabling of the wrenches, causing safety and reliability issues. Bosch Rexroth has acknowledged the vulnerabilities and is working on a patch scheduled for release at the end of January 2024.

USERS AFFECTED:

  • Consumers
  • Factories
  • Organizations

RISK:

  • Safety Risks
  • Sabotage of Manufacturing Processes
  • Malware Installation
  • Operational Disruption
  • Data Security Concerns

REFERENCES:

 

arstechnica.com:

Hackers can infect network-connected wrenches to install ransomware


Critical  iOS fixes - Patch your Apple Devices Now (12/2/23)

DATE(S) ISSUED:

11/30/23

SUBJECT: 

iPhone Security Flaws

OVERVIEW:

Apple has released iOS 17.1.2, along with a warning to update now. iOS 17.1.2 fixes two iPhone security flaws—both of which are already being used in real-life attacks. There is also an update to MacOS and Safari for older Macs. Here is the link to the Apple Security Page.

USERS AFFECTED:

  • Any person who owns an Apple device(s)

RISK:

  • Any user clicking on the "malvertisements" or ads containing malware are subject to the installation of malware on their device

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Update Apple devices as soon as possible including iPhones, MacOS, and Safari for older Macs.

REFERENCES:

support.apple.com:

Apple security releases - Apple Support


Malicious Google Ads Installing Malware

DATE(S) ISSUED:

11/20/23

SUBJECT: 

Malicious Google Ads Trick WinSCP Users into Installing Malware

OVERVIEW:

Beware of a sophisticated cyber threat known as SEO#LURKER! Cybersecurity experts have uncovered a malicious scheme targeting users searching for WinSCP. Attackers manipulate search results and Google ads to lure unsuspecting individuals into downloading malware instead of legitimate software. These deceptive ads redirect to compromised websites, leading to a fake WinSCP site where a seemingly genuine installer hides malicious Python scripts. Victims, particularly in the U.S., are targeted through geoblocking. This tactic isn't new; similar attacks have targeted PyCharm users. 

USERS AFFECTED:

  • Users exposed to and clicking on lookalike WinSCP website, winccp[.]net.

RISK:

  • Any user clicking on the "malvertisements" or ads containing malware are subject to the installation of malware on their device

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Before clicking on an ad, confirm that it is legitimate
  • If you are unsure an ad is legitimate, search for the ads official website and continue from there
  • Report ad to google if it is suspicious

REFERENCES:

thehackernews.com:

https://thehackernews.com/2023/11/beware-malicious-google-ads-trick.html?m=1


Contact Us

CSUN Information Technology


Monday to Friday, 8am to 5pm

Faculty Technology Center
(818) 677-3443

IT Help Center
(818) 677-1400

Information Security
(818) 677-6100

Universal Design Center
(818) 677-5898

Classroom Support
(818) 677-1500

Send email

Check our social media for changes and updates.

  

instagram icon Twitter  
Scroll back to the top of the page