Mrs. Christiana Kozakou, is the Head of Marketing at Odyssey Cybersecurity, where she leads and oversees strategic marketing efforts for Odyssey and ClearSkies brands around the globe. Her expertise lies in designing and coordinating 360-degree marketing campaigns and crafting effective marketing penetration strategies for exploring new markets. Mrs. Kozakou is a dynamic professional driven by her passion for unleashing potential in every endeavour, leading a team of creative marketers, working together towards one goal: to give voice to Odyssey and its people so the world can become a cyber safer place. Throughout her 10 years career, Mrs. Kozakou has served in key roles in Advertising, Business Development and Digital Marketing in International companies. A fervent believer in empowering women, she served as a dedicated volunteer for IWIB’s International Team, fostering growth and opportunities for aspiring leaders. Her educational background boasts a Master of Business Administration (MBA), Bachelor’s degrees in Marketing and Sociology.
Credential/Info Stealing Malware Families are targeting Cypriot Citizens
Threat Level Description
Threat Level: High – An attack is highly likely. Additional and sustainable protective security measures reflecting the broad nature of the threat combined with specific business and geographical vulnerabilities and judgments on acceptable risk.
Description
There are various indications suggesting that active malware campaigns are on the rise and targeting Cypriot citizens and organizations.
More specifically, these types of malware are credential/information stealers and have leaked in the DarkNet passwords of users associated with a number of Government portals and Financial institutions.
Two malware families seem to be more actively leveraged in these campaigns:
• Raccoon Stealer is a malware that gathers personal information including passwords, browser cookies and autofill data, as well as crypto wallet details. Additionally, Raccoon Stealer records system information such as IP addresses and geo-location data.
• RedLine Stealer was first seen around March 2020, a powerful data collection tool, capable of extracting login credentials from a wide range of sources, including web browsers, FTP clients, email apps, Steam, instant messaging clients, and VPNs
The leaked credentials are distributed in several DarkNet forums and, when accessed and used, can disclose sensitive information of the unaware users, such as financial status, tax information, personal information and more.
CVE(s)
Affected Systems
- Microsoft Windows
Recommendation(s)
Users should proceed and apply all security patches on their operating systems and software used.
Users should install antivirus protection on their systems and scan them periodically.
Vendors should provide and enforce MFA feature on portals that have sensitive/personal information.
Users should enable MFA on portals that provide this functionality.
Vendors should force users to change their passwords periodically by leveraging best practices for passwords.
Users should change their passwords periodically.