March #2 - A Warning About Windows Zero Day, March Madness Scams

Prev Next

In this alert, learn about social engineering scams tied to a zero-day vulnerability found within Windows devices and the NCAA March Madness basketball tournaments.

Nation State Actors Exploit Windows Zero-Day Vulnerability

Nation-state threat actors have actively exploited a zero-day vulnerability found within Windows devices, allowing bad actors to steal sensitive information and money.

For this vulnerability to be exploited, a malicious file is sent to a user. This file is a malicious shortcut, and if the user were to click on the file, it would allow cybercriminals to exploit this vulnerability.

Shortcut files can be malicious in nature, and can look like any typical application or website link you may encounter, and function similarly to malicious PDFs and other file types.

This vulnerability to target government agencies, financial institutions (particularly cryptocurrency platforms), telecommunication providers and military organizations.

This vulnerability has affected organizations all over the world. Microsoft has been made aware of this vulnerability, but as of the release of this alert, no patch has been issued by the tech company. This flaw may have been exploited since as far back as 2017.

What To Do About This?

Until a patch is released by Microsoft, the following is recommended:

  • Do not open files from an unknown source, as it could be the way cybercriminals are able to launch their attack

  • Continue to ensure your devices are up-to-date to ensure you are protected from other security vulnerabilities

In the event that Microsoft deploys a patch in the future, keep your eyes out for a follow-up alert from BlackCloak.

Cybercriminals Launch March Madness Focused Cyberscams

The NCAA March Madness basketball tournaments are underway.

Unfortunately, cybercriminals have been leveraging the occasion to conduct various cyber scams to trick unsuspecting people into turning over login credentials, personal information and money.

Examples of These Scams Include:

  • Cybercriminals setting up fake streaming websites designed to steal login credentials and download malware onto a device

  • Fake better apps that offer deals too good to be true. These apps are also designed to download malware and may result in cybercriminals stealing financial information

  • Malicious online advertisements promising guaranteed big gambling returns, particularly ads found on social media

  • Phishing emails and text messages offering betting deals, or fake invitations to create brackets

  • Scams involving selling fake tickets to March Madness games, often found on social media websites

How to Protect Yourself:

  • Be sure to only use legitimate betting apps when placing any bets during the tournament.

  • Only purchase tickets through authorized platforms. Do not purchase any tickets or merchandise on social media

  • Stream the games on official platforms

  • Remember, if a deal seems too good to be true, it probably is

  • Check the URL of any website you visit. Cybercriminals set up websites that look similar to legitimate webpages

  • Avoid any platform that asks you for login credentials or personal information to use their services, especially if they are unfamiliar websites

  • Keep your devices up-to-date and protect all of your accounts with multifactor authentication

If you have any additional questions, email us at [email protected] or schedule a Concierge Session via the BlackCloak app Support tab.

Here for you,

The BLACKCLOAK Team