Press release

Lucy Security Says Attackers Copied a Lucy Phishing Simulation Template as Part of Recent Phishing Attacks

0
Sponsored by Businesswire

Lucy Security (www.lucysecurity.com)
was alerted by a researcher at an IT Security vendor to hackers’ use of
a Lucy Security Simulated Phishing template in a recently-reported
security breach. Lucy’s software was not used as part of the attack.

After an extensive investigation by Lucy Security technical experts, it
was determined that Lucy’s Simulated Phishing software was not involved
in the breaches, but that the hackers instead copied some of Lucy’s
highly-regarded designs to use for unlawful purposes.

Lucy’s findings were shared with an independent Technical Intelligence
Analyst at a major threat intelligence vendor, who confirmed that Lucy
is correct in their analysis.

There was and is no breach of Lucy Security’s software or systems.

“There is no evidence that hackers used Lucy software, other than using
the template design, and our analysis demonstrates significant evidence
to the contrary,” said Colin Bastable, CEO of Lucy Security Inc. “Had
they used Lucy software, several tell-tale indicators would be apparent.
The hackers simply stole our design, which was created to be used as a
realistic training aid, but clearly we would prefer that it was not used
in this fashion.”

On April 15, KrebsOnSecurity broke
the news
that multiple sources were reporting a cybersecurity breach
at Wipro, a major trusted vendor of IT outsourcing for U.S. companies.
The story cited reports from multiple anonymous sources who said Wipro’s
trusted networks and systems were allegedly being used to launch
cyberattacks against the company’s customers.

“Lucy provides training scenarios with which legitimate users can expose
their co-workers and clients to realistic but simulated phishing and
social engineering attacks,” said Bastable. “In this instance bad actors
have downloaded and copied a simulated phishing template, as part of
their attack, using their own code and servers to deliver the attacks.”

Bastable added, “We have confirmed that they did not use Lucy software.
More than ever, it is apparent that we must train people to be on the
lookout for phishing attacks – more than 90 percent of successful
attacks originate with an email, and 97 percent of cyberattacks involve
some form of social engineering. These attacks were successful, because
the attackers invested a lot of time to make them so, but most people,
suitably trained and prepared, would have spotted that this was a
phishing attack.”

The alleged Wipro breach has been extensively reported on by media
outlets. As more organizations rely on third parties for outsourcing,
supply-chain management, consulting and production, so their cyber
security risks grow.

“I am grateful to the vendor for contacting us, and we are pleased to
confirm that our simulation software was not used to carry out real-life
attacks,” said Oliver Münchow, Lucy Security founder. “This breach
demonstrates the need for training; organizations can’t rely solely on
malware detection software or firewalls or hardware defenses.
Businesses, governments, and non-profits alike must incorporate their
employees into their cyberdefense plans, with regular and effective
training to spot and prevent phishing attacks.”

About Lucy Security

Lucy Security is the culmination of 20 years of experience supporting
companies in IT security. The Swiss financial industry is attacked by
cybercriminals daily and for this reason, Lucy Security started offering
penetration tests as early as 1998 to evaluate IT infrastructure and
recommend potential improvements.

As a product, Lucy Security evolved out of the understanding that a
technical solution alone can’t solve all security problems and that
employees and users are an important part of the company-wide security
policy.

For more details, go to www.lucysecurity.com.