Story image

Malaysians urged to watch out for clickbait and 'fake news' as election season approaches

27 Mar 18

Quann Malaysia is warning Malaysians to be vigilant and watch for clickbait phishing links as the 14th Malaysian General Elections approach.

The security firm believes that there will be an increase in ‘fake news’ this year. This will result from clickbait phishing websites or emails with attachments that feature ‘exclusive’ or ‘shocking’ stories, used to bait users into providing personal information

Quann Malaysia general manager Ivan Wen says that when news sounds too good to be true, it is likely fake news.

“Once clicked, users are led to a phishing site that tricks victims into giving their personal data such as email addresses, identity card numbers, and even credit card information. These could compromise critical financial information. These phishing emails can also launch ransomware attacks that encrypt important information on the device. In a worst-case scenario, this can become a national threat.”

Wen says that the phishing links could automatically be shared with people’s contacts if attackers get access to a device, which means contacts may be put in harm’s way as well.

Quann says there have been two major country elections that spawned clickbait links and cybersecurity threats.

The first was the 2016 United States Election. According to Quann, a phishing campaign by a Russian intelligence agency was launched against a US company that was involved in developing election systems.

“Fake Google alert emails were send to employees which when clicked took them to a legitimate looking Google site where hackers were able to steal their data,” Quann states.

“Using information obtained in the attack, the hackers sent 122 phishing emails containing Microsoft Word document attachments to local government agencies offering ‘election related products and services’. These documents had been ‘trojanized’ with a Visual Basic script that once connected to the internet, downloaded an unknown payload to the device, to steal and access the victim’s information.”

 In 2017, threat actors also targeted several UK parliament MPs that compromised personal emails, Quann adds.

“Juicy news is hard to resist, but the possibility of losing your critical data, or worse, your money is not worth succumbing to curiosity conjured by the unbelievable clickbait news or offer titles,” Wen says.

Wen advises people to be wary of clickbait and take the following precautions:

  • Key in the address of a legitimate news site instead of directly clicking links sent to you. This avoids being tricked and misdirected to a fake website. 
  • Before clicking, hover your mouse pointer over the link to view the link address. Do not click website links that are unfamiliar, even if they came from someone you know. Their accounts could have been compromised. 
  • Install an anti-phishing toolbar and antivirus that run quick checks on sites you visit to ensure they are safe to visit 
  • Only access secure sites that begin with “https” with a closed lock icon near the address bar.
  • Regularly monitor your online accounts to ensure they have not been hacked. Use strong passwords and regularly change them.
  • Regularly update your browsers with the necessary security patches 
  • Beware of pop-up windows masquerading as legitimate extensions of a website. Often they are used to target users visiting a website that has been compromised.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).