LUCY Anti-Malware App's New Release Prevents Social Hacking and Named Finalist for Innovation in Enterprise Security
The cybersecurity "Swiss army knife" simulates "smishing" attacks on mobile devices
SAN FRANCISCO, Jan. 26, 2016 /PRNewswire/ -- The newest update of the Swiss malware simulations app LUCY (version 2.8) now covers the complete range of attack techniques used in social hacking. This makes LUCY the first downloadable application worldwide which, in addition to phishing, malware and USB attacks, can also simulate "smishing" attacks on any mobile phone and on all continents. The new release coincides with LUCY being selected as a Finalist in the 2016 Info Security Products Guide's Global Excellence Awards for Innovation in Enterprise Security.
Photo - http://photos.prnewswire.com/prnh/20160125/325379
Photo - http://photos.prnewswire.com/prnh/20160125/325380
In addition, the app is now able to run simulations with harmless office macro viruses. By taking on the role of a professional hacker, companies can review their safety standards more precisely while raising awareness among their employees of the existing threats which they may encounter.
"Simple phishing is a thing of the past," says founder and CEO of LUCY, Oliver Muenchow. "Nowadays people are no longer falling for the fake e-mails that have been deluging companies for years. The modern hacker has turned to more treacherous methods. The focus is now on social hacking, which is the circulation of malware among co-workers, in the form of macro attacks, smishing and BadUSB. However, lately there's been such rampant development in the various attack techniques that even an in-house IT security department can't stay on top of them all."
"Putting the blame on a 'careless' user after data theft occurs doesn't really address the issue. With the newest update, LUCY 2.8, we are addressing both current and upcoming developments in the hacking world," Muenchow explains. "The warning which Microsoft released at the beginning of the year regarding malware installed through macros has already proven to be a serious one, which can be evidenced by the spread of these types of attacks."
LUCY gives companies the opportunity (either with or without direct participation of their employees) to step into a hacker's shoes and simulate all types of possible attacks. The app relentlessly exposes every weakness of the existing security system and demonstrates what damage would have been caused if there had been a real attack. LUCY is suitable for use by both IT experts and those without an IT background.
LUCY was developed by Muenchow and a team of Swiss IT experts. The app has been available online since January 2015 and is enjoying widespread popularity, especially in the US. Since its online debut, LUCY has been downloaded by more than 3,000 companies. The latest update concentrates mainly on phishing simulations. Now equipped with cutting-edge social hacking simulations, Muenchow is ready to launch LUCY 2.8 onto the global market.
Learn more at http://phishing-server.com.
Glossary
Phishing means to 'fish' for confidential data or passwords. The hacker sends the recipient a request to update their personal data, along with a link. The link is to a website which appears very similar to that of the recipient's bank. The hacker then collects the data which the phishing victim provided at the fraudulent bank website.
Smishing stands for SMS phishing and offers cyber criminals the perfect form of deception. Since the attacker can freely choose the number from which the SMS is sent, the victim can mistake the hacker's SMS for one from a trusted contact whose number is saved in their phone. It's an easy trap to fall into, especially when the victim receives an SMS seemingly from their boss or perhaps a friend, asking them to pull up a website.
Macro Attacks are malicious e-mail attachments which are camouflaged as normal Word files and other popular document formats. Once opened, they independently download data from a remote server which is controlled by the attacker. This process goes on unnoticed by the user. The hacker creates a backdoor on the computer's system, through which data can be accessed.
BadUSB refers to an attack involving manipulated firmware on the USB stick which presents itself as a non-existent device to the victim's computer. Once inserted into the USB port, the malware installs itself automatically, without any assistance from the user. It's often sufficient for hackers to bait victims by simply leaving USB sticks lying around in easily accessible areas in the workplace or on the ground. The curiosity of the stick's finder takes care of the rest.
About LUCY
LUCY helps companies identify potential weaknesses in their cybersecurity. The web-based solution can prevent cyberattacks and hacks before they happen. Easy to set up and use but with powerful reporting and customization features, LUCY is a necessity for any business looking to protect against malware, phishing and "drive-by" attacks. Learn more at http://phishing-server.com.
Media Contact: Oliver Muenchow, Email, 949-500-6422
SOURCE LUCY
Related Links
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?
Newsrooms &
Influencers
Digital Media
Outlets
Journalists
Opted In
Share this article