Weekly Cyber AAG

Former Employee Arrested for Trying to Sell Company's Database for $4,000 
Comment: Employees come and go, and this latest incident stresses the importance of disabling former employees’ accounts that provide access to the company’s network and information. After separation or termination, employees familiar with the company’s network and its vulnerabilities may attempt to gain access to information that can be sold to the employer’s competitors, on the dark web, or used for other malicious purposes. 

Ethereum Scammers Make $5,000 in a Night by Impersonating Celebs on Twitter 
Comment: To help protect yourself from this and similar scams, ensure that social media accounts promoting giveaways are verified. Twitter displays a blue check mark next to account names to confirm authenticity. Additionally, do your research before sending money online and verify the giveaway is legitimate through an internet search. A simple search can confirm whether other people have left reviews or complaints claiming they have been victims of the scam. 

Would You Have Spotted This Skimmer? 
Comment: ATM and payment card terminals can become compromised in the blink of an eye with skimming devices. These devices are placed over the customer-facing card terminals to capture the personal identification number of accountholders and/or copy the data on the magnetic strip of a bank card, allowing thieves to clone the card and use it to make unauthorized purchases or to withdraw money from your account. The NJCCIC recommends checking your bank statements for unfamiliar transactions and encourages customers to use chip-based cards for all transactions. Additionally, cashiers and employees are advised to closely monitor any customer interaction with point-of-sale terminals. For more information, please see the NJCCIC threat analysis titled Payment Cards: Threat Remains High Despite Chip Card Transition.