ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

As Acting United States Attorney Joon H. Kim said, “This case should serve as a wake-up call to all companies--even the most sophisticated--that they too can be victims of phishing attacks by cyber criminals.” These words are only made more impactful by the fact that all the public knows about the two companies is that one of them is a “multinational online social media company” and the other a “multinational technology company.”

Rimasauskas is accused of orchestrating a phishing scheme that intended to sway his supposed victims into wiring large sums of money into accounts that he controlled in Latvia and Cyprus. According to the U.S. Department of Justice, this was accomplished by establishing a company in Latvia with the same name as a computer hardware manufacturer based in Asia, and telling the targeted companies that utilized the Asian computer manufacturer’s services that there were still balances to be paid. Once these funds were transferred, it seems that Rimasaukas would quickly disperse them into numerous other global bank accounts.

Due to his alleged use of these practices to defraud the two plaintiff companies, Rimasauskas faces a count of wire fraud potentially worth 20 years in prison, as well as three counts of money laundering, also worth a maximum of 20 years each, along with a single count of aggravated identity theft that carries a mandatory minimum sentence of two years in prison.

This story has two major takeaways: the first has to do with the victims of this scam. Although they are not named specifically, they are specified as multinational. This means that they are almost certainly very large companies, and the fact that they have elected to remain anonymous suggests that they are easily recognizable. Companies of that scale have the means and opportunity to protect their assets, but despite these companies most likely having these protections in place, Rimasauskas (or whomever was responsible) still managed to bypass them by exploiting the human element these companies had in place.

This only goes to show that every company, regardless of its size, is only as secure as its weakest security feature allows. When the company can be described as small or medium-sized, it becomes even more important to ensure that its defenses are universally held to high standards, especially when the human element is involved. To combat this, you must be sure that your staff knows the ways to ensure company security by heart. In essence, you have to be sure that your workforce isn’t any less security-oriented than the rest of your security is.

The second takeaway has to do with the methodology used to extract so many funds from the defrauded businesses. Hackers are human, after all, and as a result will more than likely take the easiest path to reach their goals. For every attacker that prefers to go after a few large, high-value targets, there are plenty that don’t mind having their ill-gotten gains coming in from many more, much smaller targets. If given the choice between figuring out how to work around a company’s cybersecurity or moving on to find an easier target, the hacker in question could very well move along and leave that company untouched.

However, if all the hacker has to do is write a few deceptive emails and set up a few bank accounts, they are much more likely to stay with that target, take what they can, and move on to another unfortunate company to do the same.

Therefore, the lesson here is that the basics of cybersecurity can’t be ignored in favor of just having enterprise-level security solutions in place. Very rarely are companies breached due to a highly advanced-effort, more often, it’s because there was an overlooked issue that the perpetrator took advantage of.

At ClearView IT, we know to look at the little details as well as the big picture. To talk about improvements to your IT, including its security, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 IT Support Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Remote Work Data Management Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Bandwidth Encryption Remote Blockchain App Virtualization Business Technology Spam Information WiFi Mobile Device Management Server Apple Information Technology Gmail History Employee/Employer Relationship Office Two-factor Authentication Office 365 Budget Cybercrime Data Security BDR Big Data Health Conferencing Analytics Wi-Fi Access Control Compliance Patch Management Cost Management Remote Monitoring Employer-Employee Relationship Help Desk Document Management Hacking Save Money IT Management Voice over Internet Protocol Training Remote Computing Hacker Vendor Vendor Management Hard Drive Augmented Reality Word IBM Search... Best Practice Website Project Management Legal Data loss Retail Alert Data storage Hiring/Firing Outlook Mobile Office Password Managed Services Money Applications BYOD Customer Service Unified Threat Management Computing Firewall Vulnerabilities Monitoring Mobile Computing iPhone Healthcare Education Paperless Office Cortana Marketing Antivirus Running Cable Content Filtering Twitter Maintenance Law Enforcement End of Support Storage Router Windows 11 Printer Websites The Internet of Things YouTube Mobility Meetings Travel User Virtual Reality Google Maps Laptop Remote Workers Social Engineering Scam Cryptocurrency Black Market Data Breach Windows 7 Free Resource Cleaning VPN Chrome Robot How To Social Update Sports SaaS DDoS Multi-factor Authentication Images 101 Taxes Presentation Integration Display Disaster Specifications IT Consultant Chromebook Drones Automobile Saving Time Employees Customer Relationship Management Lithium-ion battery Physical Security Co-Managed IT Avoiding Downtime How To Computers Entertainment Bitcoin Holidays Microchip Telephone Processors Flexibility Start Menu Cooperation Downloads Computer Care Video Conferencing Hack Identity Theft Excel Virtual Machines Notifications Vulnerability Unified Communications Computer Repair Software as a Service Data Protection HIPAA Professional Services Google Docs Bluetooth Wireless Technology Distributed Denial of Service eWaste Virtual Assistant Office Tips Memory Private Cloud Managed Services Provider Downtime Safety Virtual Private Network Processor Virtual Desktop Politics Tech Terms Current Events Settings Experience Machine Learning Managed IT Digital PowerPoint Solutions Administration Solid State Drive Access Smart Devices Books Language Workplace Strategies Proxy Server Society Time Management Emails Public Cloud Fake News Remote Working Computing Infrastructure AI Phone System Trend Micro Service Level Agreement Management Visible Light Communication Spyware Device security Digital Security Cameras Electronic Health Records Reading Transportation Monitors Audit Competition Wasting Time Windows 8 Wireless Headphones File Sharing Recovery Microsoft Excel Business Cards eCommerce Tech Modem Redundancy Going Green Displays Error Advertising Cache LiFi Videos Surveillance Relocation Entrepreneur Application Computer Accessories Managing Costs Work/Life Balance Smart Technology Bookmark Tech Support Unified Threat Management Workers Documents Piracy Business Intelligence Term SSID Download Printing HTML Media CCTV Development Employer/Employee Relationships In Internet of Things Virtual Machine Browsers Touchscreen Nanotechnology Securty Software License Reviews Computer Malfunction Domains Optimization Hacks Google Play Network Congestion Emergency Upload Writing Social Network Vendor Mangement 2FA Reliable Computing Teamwork Data Storage Hypervisor Supply Chain Data Analysis Screen Reader Samsung Uninterrupted Power Supply Mobile Technology Shopping Webcam Security Cameras Medical IT Trends SQL Server Customer Resource management Business Mangement Devices Paperless Troubleshooting Scalability PCI DSS Administrator Public Speaking Licensing Text Messaging Workplace Fileless Malware Proactive IT Tablets Tip of the week Streaming Media Company Culture Gig Economy Humor Bring Your Own Device Gamification Azure Google Calendar Telephone System Regulations Business Communications Supercomputer Internet Service Provider Keyboard Regulations Compliance Hard Drives Managed IT Service Scams Directions Music Virus Backup and Disaster Recovery Desktop Motion Sickness Memes intranet Content Comparison Electronic Medical Records Google Drive Accountants Human Resources Wireless Business Owner Net Neutrality Shortcut Financial Data Botnet Heating/Cooling Environment Cables Database Corporate Profile Windows XP Risk Management IT Rental Service Social Networking Micrsooft Knowledge Flash Television Health IT Telephony Equifax Google Apps Employer Employee Relationship Hard Drive Disposal Telework Telephone Systems Point of Sale Business Growth Tactics Cabling Username Tablet Smartwatch G Suite Communitications Microsoft 365 Mouse Shortcuts VoIP Startup Tracking Inbound Marketing Freedom of Information Procurement email scam FinTech Banking Navigation Google Wallet Addiction Mobile Security CES Web Server IT Assessment Messenger Deep Learning Value SharePoint Be Proactive User Tip Legislation Digital Payment Staffing News Supply Chain Management Electronic Payment Organization IP Address Cyber security Business Metrics Evernote Hosted Solution Network Management Worker

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?