Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Thousands of UK Enterprise Logins Found on Dark Web

Fake domains that are only slightly different from the domain of a legitimate company are often leveraged in attacks, and researchers at Anomali recently discovered that cybercriminals abused this technique to target companies in the Financial Times Stock Exchange 100 (FTSE 100).

Fake domains that are only slightly different from the domain of a legitimate company are often leveraged in attacks, and researchers at Anomali recently discovered that cybercriminals abused this technique to target companies in the Financial Times Stock Exchange 100 (FTSE 100).

Brand spoofing is not a novelty in the cybercriminal world, and it does not come as a surprise that FTSE 100 companies are targeted in such attacks. By creating dummy websites, cybercriminals trick users into supplying private data, and Anomali says that 81 companies in the FTSE 100 had potentially malicious domain registrations against them in the past three months.

According to the security company’s The FTSE 100: Targeted Brand Attacks and Mass Credential Exposures report, 527 malicious domain names were registered over the last three months, an average of 5 per company. The Financial Services industry was hit the most, at 376 domains, followed by Retail at 175, and Critical Infrastructure at 75.

The report also reveals that the largest number of these suspicious domains were registered using a Chinese address. Moreover, the second most were from the US, while the third most were from Panama, the researchers say.

These fake domains can be used as part of social engineering-based attacks where users are either tricked into entering their personal information or into clicking URLs that result in malware being installed on their computers, researchers explain.

More alarming, however, is the fact that security researchers also found 5,275 employee email and clear text password combinations from FTSE 100 companies available on the Dark Web, on paste sites, on hacking forums, or posted through accidental exposure. Moreover, the report reveals that the list includes not only companies with headquarters in the UK, but also any global subsidiary of those companies.

The Oil and Gas industry was hit the most by credential leaks, accounting for 20 percent, or 1,090, of the exposed accounts. Pharma, Consumer Goods, Telecoms, and Banking segments were also impacted.

According to the report, an average of 50 employees for each FTSE 100 company have had their credentials exposed. This was possible because employees visited non-work-related sites that have then been hacked by cyber attackers, Anomali says. Apparently, 40 corporate credentials across 23 companies were exposed in April, when a major UK-based football website had its database dumped on the Darkweb.

Advertisement. Scroll to continue reading.

“Employees need to be reminded of the dangers of surfing to these types of websites and logging in using corporate email addresses and passwords.  Companies should monitor for compromised employee credentials so they can force reset accounts and gather metrics about how often employees are using their work email addresses for access to non-work related websites,” Anomali notes.

Related: Hundreds Access Fake Bank Account Data “Leaked” to Dark Web

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.