Telegram, phishing and cyber insurance → we decipher

Back to page
Newsletter
Mélanie Lebrun
29/8/2024

Hello ️🌴🌊,

I'll see you again for the August edition of Récap'IT.

No doubt three-quarters of you are returning from vacation, and 😝 for those who are leaving (I'm jealous).
So, have a good start to the new school year, good luck to everyone, vacation is over 😭.

📅 Today's agenda:

Youzee and the JOPs
  • Telegram, Teledrama?
  • The lure of HR
  • The decline in cyber insurance
  • Among good people
  • The miscellaneous section
  • Cyberattacks of the month
  • News at Youzer

👉 Go !!

Before we start, I invite you to follow us 👉

👨🏼‍💻 Telegram, Teledrama?

If you've been following the Pavel Durov case from afar, here's a recap:

This gentleman is the founder and CEO of Telegram, a social network that is often controversial.

We're close, so we'll call him Pavel. Pavel was arrested on Saturday, August 24, 2024, at Le Bourget Airport near Paris, following a French arrest warrant. He was held in custody for several days, until Wednesday, August 28.

On August 28, Pavel was indicted for twelve organized crime offenses. These offenses include:

  • Complicity in administering an online platform to enable illegal transactions by an organized criminal group
  • Laundering of crimes or offenses committed by organized crime groups
  • Supply and importation of cryptographic equipment without prior declaration

Yes, let's remember that Pavel is no angel either; he hosts a large number of traffickers, mafia members, and pedophiles on his platform. Joy. He is mainly criticized for doing nothing about this and for having little or no moderation.

What is Telegram, basically? It is an app founded in 2013 and based in Dubai that aims to be the opposite of other messaging apps: it is encrypted and does not disclose any information, even for commercial purposes.

The slight problem with this story is that Pavel's supporters accuse France of hindering freedom of expression, which has resulted in a large number of attacks on French institutions.

Are you ready for the list?

DDoS attacks: confederationpaysanne[.]fr, ansm.sante[.]fr, aldo-carbone.ademe[.]fr, lavoixdunord[.]fr, service-public[.]fr, doctolib[.]fr, onu.delegfrance[.]org, isp.cnrs[.]fr, 3114[.]fr, sos-amitie[.]com, has-sante[.]fr, fibre.syane[.]fr, marseille[.]fr, the European Court of Human Rights, the Council of Europe, French customs, Corsica Ferries, sfr[.]fr, isp.cnrs[.]fr, mediasat-tv[.]fr, campusfrance[.]org/en, courdecassation[.]fr, paris.tribunal-administratif[.]fr, bonjourdefrance[.]com, univ-lehavre[.]fr, univ-ag[.]fr, utt[.]fr, cned[.]fr, auf[.]org, univ-montp3[.]fr, cfexcellence.fr/index[.]html, 2sinvest.fr/index[.]html, decliccom.fr/index[.]html, drim-immobilier.fr/index[.]html, lepetitpipetier.fr/index[.]html, cyber.gouv[.]fr, bpifrance[.]fr.

→ Sometimes websites only go down for a few minutes, but that's enough time for these small groups to make themselves known.

Replacement of the home page: Ryes town hall and a dozen others.

Receive the best IT news of the month.
Market trends, IT trends, cyberattacks in France... a summary of the news

Receive IT news

🚄 The lure of HR

Phishing emails related to human resources are the ones that attract the most clicks from employees.

Who has never been interested in an email with a subject line referring to pay, training, vacations, retirement, etc.?

Cybercriminals exploit the familiarity and trust that employees place in HR communications. They create messages that mimic pay notices, internal policy updates, or notifications about important changes in the company. These emails often appear urgent and legitimate, prompting employees to click without thinking.

Emails from HR are perceived as coming from reliable sources and directly affect personal or professional aspects that are important to employees, such as salary, benefits, or job security. This psychological manipulation results in a higher click-through rate than other types of phishing.

What weapons for businesses?

Training and awareness remain the most effective defenses.

Employees must be trained to recognize phishing attempts, even when they appear to come from internal departments such as HR. Phishing simulations are also useful tools for raising awareness.

Source: ITSocial

Phishing based on manipulation of HR emails

🤑 The decline in cyber insurance

Cyber insurance premiums are falling in both Europe and the United States. This trend can be explained by several factors:

  • Increased competition among insurers.
  • Improved cybersecurity for businesses.
  • Better risk management by insurers.

The cyber insurance market has experienced strong growth in recent years, due to a 13% increase in cyberattacks and stricter data protection regulations.

Despite this decline in premiums, experts expect the cyber insurance market to continue growing. Companies are increasingly aware of the risks associated with cyberattacks and are seeking to protect themselves financially.

This drop in premiums could encourage more companies to take out cyber insurance, thereby strengthening their resilience to cyber threats.

It should be noted that only 4% of organizations that pay the ransom are able to recover their data, and that on average 14% of data is irretrievable. The amount of ransom demanded also tends to increase.

Source: Insurance in Motion, ITSocial

Cost of cyberattacks

👀 Among good people

It's a parody account, so the news is fake. However, I recently read a testimonial from someone who travels in business class who said that in airport VIP lounges, people talk loudly about their projects, hold meetings with screens visible to everyone to show that they are important people, and even go to the bathroom with their screens open and unlocked.

So, yes, this information is false, but not entirely false.

humorous post about privacy

Would you like to receive our white paper on identity and access management?

We have been unable to confirm your request.
Your request for a white paper has been taken into account.

Mishmash

  • Last time, I talked to you about the technical and, above all, technological organization of the Olympic Games with the Bourget center. In a video by Patrick-Pierre Garcia from the PP World channel, we discover the Bourget site and hear explanations. In short, I highly recommend this video: JO 2024 les coulisses techniques(2024 Olympic Games: behind the scenes).

  • A study conducted by the University of Basel on interactive toys shows excessive collection of usage data, which concerns children! The Toniebox and Tiptoi collect a multitude of data that is transmitted to manufacturers even when the device is offline!
    The study also found excessive permissions, such as access to the location or microphone of the parent's smartphone.
    There are no certifications or labels that allow parents to know how safe the toy is for their child. As a mom, that sends a chill down my spine. Choose non-connected toys such as story or music boxes (and they'll save you on long car trips!).
    Source: SiecleDigital

☠️ Cyberattacks of the month

The Aix Marseille Provence Chamber of Commerce and Industry (CCI): the CCI suffered a cyberattack by Lockbit in May, and the data has just been leaked. More than 253 GB of data has been recovered.

Numerous DDoS attacks: as we have seen, many French websites are targeted by attacks and find themselves unavailable for anywhere from a few minutes to several hours.

Around forty museums, including major names such as the Louvre and the Grand Palais, are believed to have been victims of a cyberattack.

La Poste, Spotify, Ubisoft, diplomatie[.]gouv.fr, and an airport: targeted by DDoS attacks at the beginning of the month (JO period).

The University of Paris-Saclay: the university reported that it was under cyberattack and requested assistance from ANSSI.

RMN Grand Palais: once again, fell victim to a cyberattack with a ransom demand.

Octave: an IT service provider for many independent distributors (comic books, books) was severely affected, hindering order processing.

What's new at Youzer?

Securing the Youzer application.

As part of our ongoing commitment to data protection and user security, we have recently strengthened the security measures of our SaaS application. These enhancements are part of our overall strategy to maintain the highest security standards in an ever-changing digital environment.

We have implemented several additional layers of protection, drawing on industry best practices and cutting-edge cybersecurity technologies. These efforts are designed to ensure the confidentiality, integrity, and availability of our customers' data, while providing a smooth and secure user experience.

Although we cannot disclose specific details of our security measures for obvious reasons, our users can rest assured that protecting their information remains our top priority.

Meet here for a live demo :)

Youzer Dashboard

Thank you for reading me this far!

Any feedback, want to discuss a project?

I'm here for that 👋.

We've sent you the newsletter and you think it's great? Sign up here 👇

Sign me up for Récap'IT

Sharing this newsletter is what keeps it alive!

Linkedin Melanie Lebrun

Every month I send you my discoveries, my analysis on IT news.
I do a lot of monitoring and I share it all!

I'm Mélanie and I'm Youzer's marketing manager.

About me? I have an unquenchable thirst for learning! I'd rather read a book 100 times than watch a movie. I'm a fan of HP 🧙🏼.
I do running and collective sport roller (don't look for it, it's dangerous).