Firewall News

Top Menu

  • Home
  • Our Blog
  • Contact Us

Main Menu

  • Software Updates
  • Alerts & Bugs
  • Out of the Box
  • Home
  • Our Blog
  • Contact Us

Firewall News

Firewall News

  • Software Updates
    • WatchGuard logo

      TDR 6.0.0 is now integrated into WatchGuard Cloud

      04/01/2021
      0
    • Sophos Logo

      XG Firewall 17.5 MR14 Released

      30/07/2020
      0
    • Sophos Logo

      Sophos Firewall Manager SFM 17.1 MR4 Released

      27/07/2020
      0
    • Sophos Logo

      Sophos Enterprise console - Endpoint Security and Control v10.8.9 for Windows has ...

      16/07/2020
      0
    • Sophos Logo

      Sophos iView v3 MR-2 Released

      07/07/2020
      0
    • Sophos Logo

      SD-RED Firmware 3.0.002 Pattern Update

      06/07/2020
      0
    • Sophos Logo

      XG Firewall 17.5 MR13 Released

      06/07/2020
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for old firmware v17 and v17.1 for XG Firewall

      03/07/2020
      0
    • WatchGuard logo

      Fireware 12.5.4 Now Available

      01/07/2020
      0
  • Alerts & Bugs
    • Sophos Logo

      Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

      29/03/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Updates

      03/03/2022
      0
    • WatchGuard logo

      WatchGuard Support Alert

      23/02/2022
      0
    • Sophos Logo

      Sophos: Important Product Lifecycle Reminder

      03/02/2022
      0
    • Sophos Logo

      Sophos: Product Lifecycle Information: Extended Support for Windows 7 and Windows Server ...

      31/01/2022
      0
    • Sophos Logo

      End-of-Life (EoL) announcement for Sophos SSL VPN Client

      29/11/2021
      0
    • WatchGuard logo

      WatchGuard: macOS Monterey 12.0.1 Does Not Support the AuthPoint Logon App

      09/11/2021
      0
    • Sophos Logo

      Sophos UTM Manager (SUM) End of Distribution

      04/11/2021
      0
    • WatchGuard logo

      WatchGuard: End of Sale Notice: AP420

      01/11/2021
      0
  • Out of the Box
    • WatchGuard’s Firebox T80 Earns 5-Star Rating in SC Labs Review

      17/11/2020
      0
    • WatchGuard Wins Big in CRN 2020 Tech Innovator Awards

      16/11/2020
      0
    • Coronavirus scams: what to look for and how to stop them

      02/04/2020
      0
    • Dell SonicWALL TZ 300

      Out the Box - Dell SonicWALL TZ 300

      05/07/2016
      0
    • Dell SonicWALL TZ SOHO

      Out the Box - Dell SonicWALL TZ SOHO

      05/07/2016
      0
    • WatchGuard Firebox T50

      WatchGuard Firebox T50

      31/03/2016
      0
    • WatchGuard Firebox M200

      WatchGuard Firebox M200

      31/03/2016
      0
NewsTrendMicro
Home›News›Tokyo Olympics Leveraged in Cybercrime Attack

Tokyo Olympics Leveraged in Cybercrime Attack

By admin
26/07/2021
455
0
Share:

Just before the opening of the Tokyo Olympics, we confirmed an attack that directed users from a fake TV broadcast schedule page to browser notification spam.

*Updated on July 26 (Original release date July 19)

As of the 26th of July, a fake page that leads to a suspicious sports broadcasting site of the same type has been confirmed by web search. In addition to the browser notification spam, we have also confirmed a method of making users register their personal information such as email addresses on suspicious sites under the pretense of watching videos. It is believed that similar methods of leading people to suspicious sites will continue in the future. It is important to be aware of such schemes to avoid being deceived.

Figure 1: Example of a web page that directs you to a suspicious sports broadcast site confirmed as of July 26. The main text is inferred to be a copy of a news article etc.
Figure 1: Example of a web page that directs you to a suspicious sports broadcast site confirmed as of July 26. The main text is inferred to be a copy of a news article etc.
Figure 2: Example of a suspicious sports relay site to be guided
Figure 2: Example of a suspicious sports relay site to be guided
Figure 3: Another suspicious sports broadcast site example which encourages membership registration for viewing
Figure 3: Another suspicious sports broadcast site example which encourages membership registration for viewing

On July 19, just before the opening of the Tokyo Olympics, Trend Micro confirmed a case where a web page disguised as a TV broadcast schedule for the Tokyo Olympics was directing to a suspicious sports broadcast site. According to a Trend Micro survey on Thursday, this suspicious sports broadcast site was directed to so-called “browser notification spam”, which allows users to be notified of browsers and displays malicious advertisements.

Figure 4: Example of displaying a suspicious sports broadcast site
Figure 4: Example of displaying a suspicious sports broadcast site
Figure 5: Example of another site displayed when clicking on a link in a suspicious sports broadcasting site. Misleading users into believing that they are being authenticated and then clicking the "Allow" button in the browser notification
Figure 5: Example of another site displayed when clicking on a link in a suspicious sports broadcasting site. Misleading users into believing that they are being authenticated and then clicking the “Allow” button in the browser notification
Figure 6: Example of "browser notification spam" displayed when notifications are allowed. It is assumed that the purpose of this spam is to encourage affiliates to purchase security products by directing them to the purchase page.
Figure 6: Example of “browser notification spam” displayed when notifications are allowed. It is assumed that the purpose of this spam is to encourage affiliates to purchase security products by directing them to the purchase page.

In addition, we have confirmed that there are several fraudulent web pages disguised as TV broadcasting schedules related to the Tokyo Olympics, which appear to have been created to lead users to this suspicious site. From the wording used, it is presumed that these fake pages were created in order to appear in the search results when ordinary users search the web to check the impending TV broadcast of the Olympics. However, as of 12:00 a.m. on July 19, these pages were no longer displayed in Google search results, indicating that the cyber criminals’ plan has already been derailed.

Figure 7: Google search display of web pages that direct users to suspicious sports broadcast sites. All exist in the legitimate domain of a European musical instrument manufacturer and may have been installed by tampering
Figure 7: Google search display of web pages that direct users to suspicious sports broadcast sites. All exist in the legitimate domain of a European musical instrument manufacturer and may have been installed by tampering
Figure 8: Example of displaying a guidance page: Immediately transition to a suspicious sports relay site, so the display is only for a moment
Figure 8: Example of displaying a guidance page: Immediately transition to a suspicious sports relay site, so the display is only for a moment

In the past, whenever a global event such as the Olympics is held, there have been cybercriminals who try to take advantage of the buzz.

Threats to the Olympics
As we have reported in the past on various Olympic-related threats, the Olympics, like other large-scale sporting events, has become a target for cybercriminals to take advantage of. Compared to other threats that take advantage of global events, Olympic threats are not much different in terms of methods, but rather cybercriminals are using traditional tactics to take advantage of popular online searches and events related to the Olympics. It’s more like cybercriminals are taking advantage of traditional tactics. Past Olympic threats have used a variety of tactics, including the following:

  • Emails and messages containing Olympic-related topics that lead to malicious sites or attachments that can be opened
  • Using SEO poisoning, links to phishing sites and other malicious sites are displayed at the top of search results pages when searching for Olympic-related keywords. General users can easily believe that these sites are legitimate, and suffer damage such as having their personal information collected from the sites they visit, or being infected with malware.

If you are a fan of the Olympics and encounter one of these threats, you could suffer a great deal of damage without even realizing it. Malware can be created on a user’s computer by a defaced sports site, spam email messages can contain malicious links and attachments, and fake video streaming sites can prompt users to purchase fake security software. In other words, it’s not a good idea.

Another possible scam is to offer Olympic-related items that are not normally given away for free, and to lure users by claiming that they are available at a special discount. As a result, the user may suffer financial damage due to the fake purchase procedure, and the personal information entered may also be collected.

Olympic-related information can be obtained from official Olympic sites, sponsor sites, etc. Be careful not to click on Olympic-related links via e-mail, instant messenger (IM), or social media messages. It’s also important to note that cyber criminals will not be able to get to your SEO page. It is also important to note that cyber criminals use SEO poisoning tactics to display malicious links at the top of search results pages. These malicious links can lead users to malware infections or to specially crafted websites and web pages. An example of this is the case of the Vancouver 2010 Winter Olympics. In this case, a malicious link was displayed at the top of the search engine results page. The malicious link pretended to be a site to update Windows Media Player, but in fact, it contained a malware.

In the past Olympics, we have seen fake ticket sale sites and fraudulent sites that use free tickets as bait. However, the Tokyo Olympics will be held without spectators in many venues, so the same tactics will not work. Instead, the possibility of fake sites such as TV broadcasts and streaming Internet distribution will increase.

Here is a summary of other possible Olympic-related cybercrime tactics

  • During the Games: fake live streaming and videos, Twitter hashtag hijacking, scams using scandalous images of Olympic athletes and social networking accounts, fake apps, etc.
  • Post-closing: Scams that use the words and deeds of Olympic athletes as well as auctions of their personal belongings.

How to Avoid Being a Victim

Considering the possibility of advertisements and suspicious sites being included in web search results through methods such as SEO poisoning, it is safer to directly browse official sites that you have bookmarked in advance or news sites that you use on a regular basis. If you use search sites, you may be able to avoid suspicious sites by carefully checking the URLs of search results. If you want to watch the Olympics via the Internet, the first thing you should be aware of is that you should only watch the games streaming from the official sites or affiliated sites. For this year’s Tokyo Games, NHK+, gorin.jp, and TVer are the official streaming sites. Lesser-known streaming sites, especially those that claim to be “unrestricted video sites,” are likely to be traps set by cyber criminals, and you should be very careful when clicking on them. Inadvertently clicking on such sites may result in the infection of malware or the fraudulent acquisition of personal information.

Trend Micro’s Countermeasures

Countermeasures against fake websites: Trend Micro uses Web Reputation System (WRS) technology to block fraudulent sites such as fake sites and phishing sites that have been used to promote the Olympics. In addition, phishing e-mails that lead to unauthorized sites are filtered using E-Mail Reputation (ERS) technology.

Previous Article

Sophos: Important Product Lifecycle Reminder

Next Article

Trend Micro Remote Manager Systems Upgrade

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0

Related articles More from author

  • FortinetNews

    FortiGate 60F: The Top NGFW with SD-WAN Now Accelerated by a Purpose-Built Security Processor

    31/10/2019
    By admin
  • Sophos Logo
    NewsSophos

    Sophos – Email Impersonation Protection EAP Now Available

    14/10/2019
    By admin
  • Sophos labels
    News

    Defining the truth: how Sophos overcomes uncertain labels in machine learning

    30/08/2017
    By admin
  • XG-Firewall 17.1
    News

    Sophos – XG Firewall v17.1. Shine a light on the shadows in your IT security.

    11/06/2018
    By admin
  • NewsTrendMicro

    Partner content: Trend Micro launches ‘worry-free’ security platform as partners battle COVID-19 effects

    02/07/2020
    By admin
  • Sophos CRN Women Channel
    News

    CRN honours leadership and vision of Sophos women

    21/05/2018
    By admin

  • SonicWall APJ Partner Summit
    News

    SonicWall Announces Channel Partner Award Winners at APJ Partner Summit 2017

  • WatchGuard logo
    Alerts & BugsWatchGuard

    WatchGuard Support Alert

  • Sophos Logo
    Software UpdatesSophos

    New Sophos Central Management and Reporting for XG Firewall!

Timeline

  • 29/03/2022

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

  • 03/03/2022

    Sophos: Important Product Lifecycle Updates

  • 01/03/2022

    Shoring up your cybersecurity posture in light of ongoing crisis

  • 23/02/2022

    WatchGuard Support Alert

  • 03/02/2022

    Sophos: Important Product Lifecycle Reminder

Sponsored Links

Latest Comments

  • Paul Sillars
    on
    21/06/2016
    I received this in an email this morning, it was the first I heard about it ...

    Dell Software Group sold to help fund looming EMC deal

  • Paul Sillars
    on
    20/06/2016
    This is going to be an interesting one to watch. Especially after today's announcement that ...

    Ingram Micro gets distribution access to Dell’s security range in Australia

Find us on Facebook

Firewall.News Logo

This site serves more as a reference point for some of the major security vendor's updates and product/press releases

It will never be a definitive list, but it helps our customers keep up to date and also allows us to express our comment and observations as well.

About us

  • PO Box 451, North Lakes, Queensland, 4509, Australia
  • [email protected]
  • Recent

  • Popular

  • Comments

  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Sophos Logo

    Sophos: Important Product Lifecycle Updates

    By admin
    03/03/2022
  • Shoring up your cybersecurity posture in light of ongoing crisis

    By admin
    01/03/2022
  • WatchGuard logo

    WatchGuard Support Alert

    By admin
    23/02/2022
  • Dell SonicWALL Supermassive

    Ingram Micro gets distribution access to Dell’s security range in Australia

    By admin
    14/06/2016
  • Francisco Partners and Elliott Management to Acquire the Dell Software Group

    Dell Software Group sold to help fund looming EMC deal

    By admin
    21/06/2016
  • WatchGuard Firebox M500 – The Cure for HTTPS Performance Headaches

    By admin
    05/03/2015
  • Sophos Logo

    Advisory: Sophos Central Maintenance scheduled for Saturday, April 2nd, 2022

    By admin
    29/03/2022
  • Paul Sillars
    on
    21/06/2016

    Dell Software Group sold to help fund looming EMC deal

    I received this in ...
  • Paul Sillars
    on
    20/06/2016

    Ingram Micro gets distribution access to Dell’s security range in Australia

    This is going to ...

Follow Me

  • Contact
  • About Us
  • Home