Categories: US-Cert-Repository

CISA Warns of Hurricane-Related Scams


CISA urges users to remain on alert for malicious cyber activity following natural disasters, such as hurricanes, as attackers target disaster victims and concerned citizens by leveraging social engineering tactics, techniques, and procedures (TTPs).

Social engineering TTPs include phishing, in which threat actors pose as trustworthy persons/organizations—such as disaster-relief charities—to solicit personal information via email or malicious websites. CISA recommends exercising caution in handling emails with disaster-related subject lines, attachments, or hyperlinks. In addition, be wary of social media pleas and texts messages related to severe weather events.

CISA encourages users to review the following resources to avoid falling victim to malicious cyber activity:

  • Federal Trade Commission’s Staying Alert to Disaster-related Scams and Before Giving to a Charity,
  • Consumer Financial Protection Bureau’s Frauds and scams, and
  • CISA’s Using Caution with Email Attachments and Avoiding Social Engineering and Phishing Attacks.

 



Source link

admin

Share
Published by
admin

Recent Posts

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

3 days ago

CISA Releases Eight Industrial Control Systems Advisories

CISA released eight Industrial Control Systems (ICS) Advisories. These advisories provide timely information about current…

4 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

5 days ago

CISA Releases 10 Industrial Control Systems Advisories

CISA released 10 Industrial Control Systems (ICS) advisories. These advisories provide timely information about current…

6 days ago

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

7 days ago

This website uses cookies.