<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Open Sans";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
p
{mso-style-priority:99;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
p.msonormal0, li.msonormal0, div.msonormal0
{mso-style-name:msonormal;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
p.readmsgbody, li.readmsgbody, div.readmsgbody
{mso-style-name:readmsgbody;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
p.externalclass, li.externalclass, div.externalclass
{mso-style-name:externalclass;
mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
font-size:12.0pt;
font-family:"Times New Roman",serif;}
span.EmailStyle22
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:697202435;
mso-list-template-ids:-490704772;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1
{mso-list-id:796265697;
mso-list-template-ids:1776986782;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2
{mso-list-id:1974363464;
mso-list-template-ids:1816447524;}
@list l2:level1
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l2:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l2:level3
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level4
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level5
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level6
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level7
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level8
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l2:level9
{mso-level-number-format:bullet;
mso-level-text:;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1027" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor="white" lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Good afternoon,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">I wanted to share the below information on a new Phishing attack that is reportedly difficult to spot.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Also, you can still purchase KnowBe4 Cyber Awareness Training for your district. Please contact us if you’re interested. There is no way to shortcut cyber security
awareness. If you don’t have repeated opportunities for staff to learn about the risks, it may only a matter of time before someone clicks on an emailed link or attachment that will ruin your day.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Thanks,<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Thor<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></p>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Thor Sage<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Executive Director<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Miami Valley Educational Computer Association<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">937-767-1468 x3101<o:p></o:p></span></p>
<p class="MsoNormal"><a href="http://www.mveca.org/"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D;text-decoration:none"><img border="0" width="174" height="64" id="Picture_x0020_1" src="cid:image001.jpg@01D35C88.98783A00" alt="http://www.mveca.org/images/logo.gif"></span></a><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">
</span><a href="https://www.linkedin.com/company-beta/3947840/"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D;text-decoration:none"><img border="0" width="32" height="32" id="_x0000_i1034" src="cid:image002.jpg@01D35C88.98783A00" alt="i"></span></a><a href="https://twitter.com/mvecarcog"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D;text-decoration:none"><img border="0" width="32" height="32" id="Picture_x0020_2" src="cid:image003.jpg@01D35C88.98783A00" alt="t"></span></a><a href="https://www.facebook.com/MVECA-707401659416692/"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D;text-decoration:none"><img border="0" width="32" height="32" id="Picture_x0020_3" src="cid:image004.jpg@01D35C88.98783A00" alt="f"></span></a><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><i><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D">Not-for-profit Technology Services for Education and Local Governments<o:p></o:p></span></i></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></p>
</div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1F497D"><o:p> </o:p></span></p>
<div>
<div style="border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif">From:</span></b><span style="font-size:11.0pt;font-family:"Calibri",sans-serif"> CyberheistNews [mailto:feedback@knowbe4.com]
<br>
<b>Sent:</b> Monday, November 13, 2017 10:33 AM<br>
<b>To:</b> Thor Sage <sage@mveca.org><br>
<b>Subject:</b> [ALERT] This Scary New Phishing Attack Is Very Hard to Detect<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="100%" style="width:100.0%">
<tbody>
<tr>
<td style="padding:0in 0in 0in 0in">
<p class="MsoNormal"><img border="0" width="1" height="1" id="_x0000_i1025" src="http://newsletter.knowbe4.com/a/1022/open/576/2101618/e7d88b54072fa5298131e8707a395418214a893f"><o:p></o:p></p>
</td>
</tr>
<tr>
<td style="padding:0in 0in 0in 0in">
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:600px;float:left">
<p class="MsoNormal" style="line-height:9.0pt"><span style="font-size:7.5pt;font-family:"Open Sans";color:#676767">[ALERT] This Scary New Phishing Attack Is Very Hard to Detect<br>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:200px;float:right">
<p class="MsoNormal" align="right" style="text-align:right;line-height:9.0pt"><span style="font-size:7.5pt;font-family:"Open Sans";color:#676767">Email not displaying?<br>
<a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/b0b95ee283cb9cc9fc41475b777a158c4a77b943/e7d88b54072fa5298131e8707a395418214a893f" target="_blank"><span style="color:#F16824;text-decoration:none">View Knowbe4 Blog</span></a></span><o:p></o:p></p>
</div>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal" align="center" style="text-align:center"><a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/044ac0b3da603dc543019ea4b8f92228baf8fbe8/e7d88b54072fa5298131e8707a395418214a893f" target="_blank"><span style="text-decoration:none"><img border="0" id="_x0000_i1026" src="http://cdn2.hubspot.net/hubfs/241394/CHN-LOGO-2017-1.png"></span></a><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<div class="MsoNormal" align="center" style="text-align:center">
<hr size="1" width="100%" align="center">
</div>
<p class="MsoNormal" align="center" style="text-align:center"><span style="font-size:10.5pt;font-family:"Open Sans";color:#676767">CyberheistNews Vol 7 #44 | Nov. 13th., 2017</span>
<o:p></o:p></p>
<div class="MsoNormal" align="center" style="text-align:center">
<hr size="1" width="100%" align="center">
</div>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">[ALERT] This Scary New Phishing Attack Is Very Hard to Detect</span><!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
<v:stroke joinstyle="miter" />
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0" />
<v:f eqn="sum @0 1 0" />
<v:f eqn="sum 0 0 @1" />
<v:f eqn="prod @2 1 2" />
<v:f eqn="prod @3 21600 pixelWidth" />
<v:f eqn="prod @3 21600 pixelHeight" />
<v:f eqn="sum @0 0 1" />
<v:f eqn="prod @6 1 2" />
<v:f eqn="prod @7 21600 pixelWidth" />
<v:f eqn="sum @8 21600 0" />
<v:f eqn="prod @7 21600 pixelHeight" />
<v:f eqn="sum @10 21600 0" />
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect" />
<o:lock v:ext="edit" aspectratio="t" />
</v:shapetype><v:shape id="_x0000_s1026" type="#_x0000_t75" alt="" style='position:absolute;margin-left:56.8pt;margin-top:0;width:108pt;height:108pt;z-index:251658240;mso-wrap-distance-left:0;mso-wrap-distance-top:0;mso-wrap-distance-right:0;mso-wrap-distance-bottom:0;mso-position-horizontal:right;mso-position-horizontal-relative:text;mso-position-vertical-relative:line' o:allowoverlap="f">
<v:imagedata src="http://cdn2.hubspot.net/hubfs/241394/CHN-STU-2017-1.png" />
<w:wrap type="square"/>
</v:shape><![endif]--><![if !vml]>
<img width="144" src="http://cdn2.hubspot.net/hubfs/241394/CHN-STU-2017-1.png" align="right" v:shapes="_x0000_s1026"><![endif]><span style="font-family:"Open Sans";color:#333333"><br>
<br>
You need to know about a new phishing attack vector reported by our friends at Barkly. It utilizes a new technique that's just plain nasty.<br>
<br>
This week, users at one of their customers began receiving emails from known contacts they had at another organization. In the screenshot below you can see that at least one of the emails appeared to be a reply to an existing email thread, where users at the
two organizations had been emailing back and forth.<br>
<br>
The new message was noticeably short — "Morning, please see attached and confirm" (you probably see where this is going) — but in the context of the email chain it was very convincing. The email appears to come from a person at a company the receiver has been
emailing with, and this message appears to be a reply to a legit email chain. Yikes. Here is a picture of how it looks:<br>
<br>
<img border="0" id="_x0000_i1029" src="https://blog.knowbe4.com/hubfs/ursnif-trojan-spear-phishing-email.png"><br>
<br>
The aim was to have the user open the Word attachment, and follow instructions to enable macros.<br>
<br>
<b>Technical background of the attack</b><br>
<br>
The user on the other end had been infected with a new variant of Ursnif, one of the most active and widespread banking Trojans in the world.<br>
<br>
Investigation showed that the Word doc the user downloaded contained a macro that, when activated, launched PowerShell script designed to download the Ursnif payload.<br>
<br>
Ursnif is a powerful trojan with a lot of features like stealing victim credentials in a variety of ways via man-in-the-browser attacks, keylogging, screenshot capture, etc.<br>
<br>
It looks like the evil masterminds behind Ursnif are now taking it one step further and use the compromised email accounts of its victims to spread the infection like a worm.<br>
<br>
<b>It's turning infected workstations into spam factories</b><br>
<br>
What makes this social engineering attack so tricky is that the email pictured above wasn't just coming from an organization the recipient knew and had been emailing with, it came as a reply to an existing email chain. That is a hard one for a user not to fall
for, they really need to be on their toes to catch this one.<br>
<br>
Ursnif isn't the only trojan we've seen hijacking victim email accounts. In July, we saw the Emotet trojan doing something similar.<br>
<br>
Now, compromised accounts have been a thing since email has been around, so getting a infected email from a trusted source is nothing new, but if this is becoming a larger trend it is even more important to mitigate before your own network starts spewing out
malicious attacks and your mail server gets on blacklists.<br>
<br>
<b>What You Can Do About It</b><br>
<br>
Here are some suggestions how to counter attacks like this using as many layers of your defense-in-depth as possible:
</span><o:p></o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style="font-family:"Open Sans";color:#333333">Disable MS Office macros network-wide if possible</span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style="font-family:"Open Sans";color:#333333">Check your firewall rules to make sure this type of attachment is at least flagged as potentially dangerous or quarantined</span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style="font-family:"Open Sans";color:#333333">Configure your email servers/filters to block attachments containing VBA/Macro code</span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style="font-family:"Open Sans";color:#333333">Configure the endpoint security software on the workstation to catch malicious attachments</span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style="font-family:"Open Sans";color:#333333">Install a (complimentary) Phish Alert button in Outlook, so users can simply click on that, delete the email and forward it to your Incident Response team:
<a href="https://info.knowbe4.com/phish-alert-chn">https://info.knowbe4.com/phish-alert-chn</a></span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l1 level1 lfo1">
<span style="font-family:"Open Sans";color:#333333">Step your users through new-school security awareness training and send them simulated phishing attacks with Word docs that have Macros, to inoculate them against attacks like this when (not if) your filters
do not catch them </span><o:p></o:p></li></ul>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">Spy vs. Spy? Wikileaks Says CIA Impersonated Kaspersky Lab</span><br>
<br>
<span style="font-family:"Open Sans";color:#333333">Wow, the plot thickens. Attribution indeed is a very murky business.<br>
<br>
According to Wikileaks, its analysis revealed that by using fake certificates, the CIA made it look like data was being exfiltrated by one of the impersonated entities – in this case Kaspersky Lab.<br>
<br>
“We have investigated the claims made in the Vault 8 report published on November 9 and can confirm the certificates in our name are fake,” Kaspersky Lab told SecurityWeek. “Our private keys, services and customers are all safe and unaffected.”<br>
<br>
The news that the CIA may have impersonated Kaspersky Lab in its operations has led some to believe that the U.S. may have actually used such tools to falsely pin cyberattacks on Russia. More at SecurityWeek:<br>
<a href="http://www.securityweek.com/wikileaks-says-cia-impersonated-kaspersky-lab">http://www.securityweek.com/wikileaks-says-cia-impersonated-kaspersky-lab</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">Google: Our Hunt for Hackers Reveals Phishing Is Far Deadlier Than Data Breaches</span><br>
<br>
<span style="font-family:"Open Sans";color:#333333">The study finds that victims of phishing are 400 times more likely to have their account hijacked than a random Google user, a figure that falls to 10 times for victims of a data breach. The difference is
due to the type of information that so-called phishing kits collect.<br>
<br>
Google has released the results of a year-long investigation into Gmail account hijacking, which finds that phishing is far riskier for users than data breaches.<br>
<br>
Hardly a week goes by without a new data breach being discovered, exposing victims to account hijacking if they used the same username and password on multiple online accounts.<br>
<br>
While data breaches are bad news for internet users, Google's study finds that phishing is a much more dangerous threat to its users in terms of account hijacking. More at the KnowBe4 blog:<br>
<a href="https://blog.knowbe4.com/google-our-hunt-for-hackers-reveals-phishing-is-far-deadlier-than-data-breaches">https://blog.knowbe4.com/google-our-hunt-for-hackers-reveals-phishing-is-far-deadlier-than-data-breaches</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">Don't Miss My Live Webinar: Phishing and Social Engineering in 2018</span><br>
<br>
<span style="font-family:"Open Sans";color:#333333">Here is your invite for this once-a-year Live Webinar: Phishing and Social Engineering in 2018: Is the Worst Yet to Come?<br>
<br>
Ransomware has tipped the 1 billion mark and damages are expected to be around 5 billion before the year is out. Use of ransomware has evolved throughout the year with a 600% rise in URL emails delivering malware in just Q3 2017. CEO fraud (aka Business Email
Compromise) has cost another 5 billion according to the FBI as of May 2017.<br>
<br>
<b>What's next and how can you protect your organization?</b><br>
<br>
Join CyberheistNews Editor-in-Chief and KnowBe4 CEO Stu Sjouwerman for this 30-minute webinar:<br>
<br>
“Phishing and Social Engineering in 2018: Is the Worst Yet to Come?” Stu will discuss some of the latest trends in cybercrime and give you an insider perspective on what to expect for 2018 and how to prepare for it.<br>
<br>
<b>Key topics covered in this webinar:</b> </span><o:p></o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo2">
<span style="font-family:"Open Sans";color:#333333">Understanding the current threat landscape</span><o:p></o:p></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo2">
<span style="font-family:"Open Sans";color:#333333">What scary new threats will be on the rise for 2018</span><o:p></o:p></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo2">
<span style="font-family:"Open Sans";color:#333333">Next innovations of ransomware, phishing and social engineering</span><o:p></o:p></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo2">
<span style="font-family:"Open Sans";color:#333333">What you can do to make your organization a harder target for cybercrime</span><o:p></o:p></li><li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo2">
<span style="font-family:"Open Sans";color:#333333">How to create your “human firewall”</span><o:p></o:p></li></ul>
<p class="MsoNormal"><b><span style="font-family:"Open Sans";color:#333333">Date/Time: Thursday, November 16th at 2:00 pm EST for 30 minutes</span></b><span style="font-family:"Open Sans";color:#333333"><br>
<br>
Register Now:<br>
<a href="https://attendee.gotowebinar.com/register/4082941158725766914?source=CHN">https://attendee.gotowebinar.com/register/4082941158725766914?source=CHN</a><br>
<br>
Let's stay safe out there. </span><o:p></o:p></p>
<p><span style="font-family:"Open Sans";color:#333333">Warm Regards,<br>
Stu Sjouwerman<br>
Founder and CEO<br>
KnowBe4, Inc.</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px;border-radius:6px">
<p class="MsoNormal" align="center" style="text-align:center;background:#676767">
<span style="font-size:18.0pt;font-family:"Open Sans";color:white;letter-spacing:4.5pt">Quotes of the Week</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal" align="center" style="text-align:center"><i><span style="font-family:"Open Sans";color:#333333">"To find yourself, think for yourself."</span></i><span style="font-family:"Open Sans";color:#333333"> - Socrates - Philosopher (469 - 399 BC)<br>
<br>
<i>"This above all; to thine own self be true."</i> - William Shakespeare (1564 - 1616)
</span><br>
<o:p></o:p></p>
<div class="MsoNormal" align="center" style="text-align:center">
<hr size="1" width="100%" align="center">
</div>
<p class="MsoNormal" align="center" style="text-align:center"><br>
<strong><span style="font-family:"Open Sans";color:#333333">Thanks for reading CyberheistNews</span></strong><span style="font-family:"Open Sans";color:#333333"><br>
But if you want to unsubscribe, you can do that <a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/486ae771c748e753c0a203927ab7bc2af91a1576/e7d88b54072fa5298131e8707a395418214a893f" target="_blank">
<span style="color:#F16824;text-decoration:none">right here</span></a><br>
<br>
<strong><span style="font-family:"Open Sans"">You can read CyberheistNews online at our Blog</span></strong><br>
<a href="https://blog.knowbe4.com/CHN-Vol-7-45-ALERT-This-Scary-New-Phishing-Attack-Is-Very-Hard-to-Detect">https://blog.knowbe4.com/CHN-Vol-7-45-ALERT-This-Scary-New-Phishing-Attack-Is-Very-Hard-to-Detect</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px;border-radius:6px">
<p class="MsoNormal" align="center" style="text-align:center;background:#676767">
<span style="font-size:18.0pt;font-family:"Open Sans";color:white;letter-spacing:4.5pt">Security News</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">Scam of the Week: "Cyber Monday Is Scammer Heaven"</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
The majority of consumers aware of online phishing scams, but still may fall victim this cyber Monday...<br>
<br>
DomainTools, a leader in domain name and DNS-based cyber threat intelligence, released the findings of their 2017 Cyber Monday Phishing Survey this week.<br>
<br>
The survey results highlighted that two in five U.S. consumers have fallen victim to an online phishing attack, despite the fact that 91 percent are aware of the existence of these spoofed websites or emails of trusted brands.<br>
<br>
As the holiday shopping season approaches, 92 percent of all consumers shop online and about half are planning to shop online on Cyber Monday, exposing an opportunity for malicious hackers to strike. DomainTools has illustrated its key findings in an InfoGraphic:<br>
<a href="https://blog.domaintools.com/2017/11/cyber-monday-deal-or-phishing-scam/">https://blog.domaintools.com/2017/11/cyber-monday-deal-or-phishing-scam/</a><br>
<br>
"Cyber Monday has grown in popularity year over year, and unfortunately, so has phishing and online counterfeiting. A range of techniques are used to trick shoppers into visiting a fake website or clicking on a malicious link.<br>
<br>
This can result in a shopper unintentionally sharing financial and personal information with these criminals or even downloading ransomware," said Tim Chen, CEO of DomainTools. "As shoppers search for Cyber Monday deals, it's important that they remember to
look closely at links and email addresses before clicking. If something seems too good to be true, it may instead be very fake and very bad."<br>
<br>
<i>I suggest you send this reminder to your users. You're welcome to copy/paste/edit</i><br>
<br>
"Cyber Monday Is Scammer Heaven"<br>
<br>
"It's Holiday Season for the bad guys too! But not the way you might think. They go into scam-overdrive mode. Black Friday and Cyber Monday are the busiest on-line shopping days and they are out to get rich with your money. So what to look out for?<br>
<br>
At the moment, there are too-good-to-be-true coupons that offer complimentary phones or tablets all over sites on the Internet. Don't fall for it. Make sure the offers are from a legitimate company. While we're at it...<br>
<br>
Watch out for alerts via email or text that you just received a package from FedEx, UPS or the US Mail, and then asks you for some personal information. Don't enter anything. Think Before You Click!<br>
<br>
So, especially now, the price of freedom is constant alertness and willingness to fight back. Remember to only use credit cards online, never debit cards. Be super-wary of bulk email with crazy good BUY NOW offers and anything that looks slightly "off". If
you think you might have been scammed, stay calm and call your credit card company, nix that card and get a new one.<br>
<br>
Happy Holidays!" </span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">[VIDEO] New Smart Groups Put Your Phishing, Training and Reporting on Autopilot</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
Automate the path your employees take to smarter security decisions. With KnowBe4's powerful new Smart Groups feature, you can use each employees’ behavior and user attributes to tailor phishing campaigns, training assignments, remedial learning and reporting.<br>
<br>
Create sophisticated, targeted workflows without the headache, and make sure every employee is a strong building block of your human firewall. You can see the intersection of the criteria you specify - whether you’re building simple phishing clickers remedial
training workflow or complex, multi-criteria location, behavior and timing-based workflow.<br>
<br>
Best of all, Smart Groups is a powerful ad-hoc, real-time query tool that you use to get detailed reporting for management, so you’ll always know how your security awareness program is working.<br>
<br>
The Incremental Phishing with Smart Groups video has been published in the Help Center. Here is the link to the 4-minute video:<br>
<a href="https://support.knowbe4.com/hc/en-us/articles/115014939508">https://support.knowbe4.com/hc/en-us/articles/115014939508</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">Don't Click That! How to Spot an Invoice Impersonation Attack That Pretends to Be From a Coworker</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
Finance workers are seeing a wave of phishing attacks that send victims a link to a fake invoice that appears to come from a trusted party, according to a new threat spotlight report from security firm Barracuda Networks.<br>
<br>
These emails don't usually appear to be out of the ordinary, and guide the recipient to click on a link to an invoice. The sender's name is carefully chosen by the attackers to be someone the recipient knows and trusts.<br>
<br>
If a victim clicks on the link, it typically begins downloading a doc. file for the supposed invoice. This is usually a malware download that could trigger ransomware, or steal the recipients' credentials from the browser. More at TechRepublic:<br>
<a href="https://www.techrepublic.com/article/dont-click-that-how-to-spot-an-invoice-impersonation-attack-that-pretends-to-be-from-a-coworker/">https://www.techrepublic.com/article/dont-click-that-how-to-spot-an-invoice-impersonation-attack-that-pretends-to-be-from-a-coworker/</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">How I Infiltrated a Fortune 500 Company With Social Engineering</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
Good article at DarkReading. "Getting into the company proved surprisingly easy during a contest. Find out how to make your company better prepared for real-world attacks.<br>
<br>
I infiltrated a Fortune 500 company with social engineering techniques (with authorization). Want to know how?<br>
<br>
Here's the background: This fall during a security exercise at DerbyCon VII, I won the Social Engineering Capture the Flag (SECTF) contest, in which we all utilized social engineering techniques to collect information that could be used to compromise a company.
It was a challenging competition against five top-notch competitors, and I am pleased to say I emerged victorious.<br>
<br>
Before the convention, we were each assigned a Fortune 500 company in the Louisville, Kentucky, area and given three weeks to compile a report about them using open source intelligence, or OSINT, which is a means of collecting information from public sources
such as search engines, company websites, and social media.<br>
<br>
At DerbyCon, we made live phone calls from a soundproof box in front of an audience to collect more information. The informational "flags" captured in the report and phone calls were then scored.<br>
<br>
<b>How I Did It</b><br>
<br>
For the sake of the security of my target company, I will not mention it by name, because I will discuss tactics, techniques, and descriptions of the findings. Interesting reading!:<br>
<a href="https://www.darkreading.com/endpoint/how-i-infiltrated-a-fortune-500-company-with-social-engineering/a/d-id/1330335">https://www.darkreading.com/endpoint/how-i-infiltrated-a-fortune-500-company-with-social-engineering/a/d-id/1330335</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">[FUN] Somebody Wrote an Email Bot to Waste Scammers' Time.</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
An entertaining and possibly useful tool which appears to be legit. Worth a minute of chuckles even if we don't use it. Have a look at the YouTube.<br>
<br>
Introducing Re:scam - an artificially intelligent email bot made to reply to scam emails. Re:scam wastes scammers time with a never-ending series of questions and anecdotes so that scammers have less time to pursue real people:<br>
<a href="https://youtu.be/jPajqAJWiNA">https://youtu.be/jPajqAJWiNA</a> </span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">October 2017: The Month in Ransomware</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
Ransomware activity didn’t skyrocket last month, but there was definitely a substantial increase compared to September.<br>
<br>
Perhaps the most serious wake-up call was the onset of BadRabbit, a Petya-like culprit going on a rampage in Eastern Europe. A likely successor of the Cerber ransomware dubbed Magniber started making the rounds via the Magnitude exploit kit. A Halloween-themed
Trick-or-Treat blackmail malware demonstrated that cybercriminals follow the traditions too – in their own way, though.<br>
<br>
Overall, 28 new strains emerged, 18 existing ones underwent updates, and only one complimentary decryptor was released. More at Tripwire:<br>
<a href="https://www.tripwire.com/state-of-security/featured/october-2017-the-month-in-ransomware/">https://www.tripwire.com/state-of-security/featured/october-2017-the-month-in-ransomware/</a><br>
<br>
<b>Also, Cryptojacking Craze: Malwarebytes Says It Blocks 8 Million Requests per Day</b><br>
<br>
The in-browser cryptojacking craze that has taken over the Internet is getting worse by the day and more and more sites are implementing such systems, intentionally or after getting hacked.<br>
<br>
Malwarebytes, one of the first major antivirus companies that have added support for blocking such scripts has recently released a report detailing statistics from the last month.<br>
<a href="https://go.malwarebytes.com/rs/805-USG-300/images/Drive-by_Mining_FINAL.pdf">https://go.malwarebytes.com/rs/805-USG-300/images/Drive-by_Mining_FINAL.pdf</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">NATO to Increase Cyber Weaponry to Combat Russia</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
NATO members agreed Wednesday to increase the use of cyber weaponry and tactics during military operations, with the alliance also upgrading other capabilities to combat a resurgent Russia.<br>
<br>
The changes are part of the alliance's biggest shakeup since the Cold War, with defense ministers backing the creation of two new command centers to help protect Europe.<br>
<br>
The revamp reflects the "changed security environment" of recent years, NATO chief Jens Stoltenberg said at a meeting of defence ministers in Brussels.<br>
<br>
The threat to the alliance's eastern flank has grown as a concern after Russia's annexation of Crimea in 2014.<br>
<br>
"We are now integrating cyber effects into NATO missions and operations to respond to a changed and new security environment where cyber is part of the threat picture we have to respond to," Stoltenberg said.<br>
<br>
"In any military conflict cyber will be an integral part and therefore we need to strengthen our cyber defences and our cyber capabilities," he added. More at:<br>
<a href="http://www.securityweek.com/nato-increase-cyber-weaponry-combat-russia">http://www.securityweek.com/nato-increase-cyber-weaponry-combat-russia</a><br>
<br>
Also: EU to Declare Cyber-Attacks “Act of War”. USA Likely to follow:<br>
<a href="https://blog.knowbe4.com/eu-to-declare-cyber-attacks-act-of-war.-usa-likely-to-follow">https://blog.knowbe4.com/eu-to-declare-cyber-attacks-act-of-war.-usa-likely-to-follow</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">Interesting News Items This Week</span><span style="font-family:"Open Sans";color:#333333"><br>
<br>
Cognitive Mindhacks: How Attackers Spread Disinformation Campaigns:<br>
<a href="https://www.darkreading.com/cloud/cognitive-mindhacks-how-attackers-spread-disinformation-campaigns/d/d-id/1330334">https://www.darkreading.com/cloud/cognitive-mindhacks-how-attackers-spread-disinformation-campaigns/d/d-id/1330334</a><br>
<br>
That massive data breach has cost Equifax nearly 90 million and a 25% reduction in share value:<br>
<a href="http://business.inquirer.net/240604/massive-data-breach-cost-equifax-nearly-90-million">http://business.inquirer.net/240604/massive-data-breach-cost-equifax-nearly-90-million</a><br>
<br>
Wikileaks Releases Source Code of CIA Cyber-Weapon:<br>
<a href="https://www.bleepingcomputer.com/news/government/wikileaks-releases-source-code-of-cia-cyber-weapon/">https://www.bleepingcomputer.com/news/government/wikileaks-releases-source-code-of-cia-cyber-weapon/</a><br>
<br>
The nasty future of ransomware: Four ways the nightmare is about to get even worse:<br>
<a href="http://www.zdnet.com/article/the-nasty-future-of-ransomware-four-ways-the-nightmare-is-about-to-get-even-worse/">http://www.zdnet.com/article/the-nasty-future-of-ransomware-four-ways-the-nightmare-is-about-to-get-even-worse/</a><br>
<br>
Data Breach Record Exposure Up 305% from 2016:<br>
<a href="https://www.darkreading.com/vulnerabilities---threats/data-breach-record-exposure-up-305--from-2016/d/d-id/1330359">https://www.darkreading.com/vulnerabilities---threats/data-breach-record-exposure-up-305--from-2016/d/d-id/1330359</a><br>
<br>
10 Mistakes End Users Make That Drive Security Managers Crazy:<br>
<a href="https://www.darkreading.com/endpoint/10-mistakes-end-users-make-that-drive-security-managers-crazy------/d/d-id/1330305">https://www.darkreading.com/endpoint/10-mistakes-end-users-make-that-drive-security-managers-crazy------/d/d-id/1330305</a><br>
<br>
12 Artificial Intelligence Terms You Need to Know:<br>
<a href="https://www.informationweek.com/big-data/ai-machine-learning/12-artificial-intelligence-terms-you-need-to-know/d/d-id/1330003">https://www.informationweek.com/big-data/ai-machine-learning/12-artificial-intelligence-terms-you-need-to-know/d/d-id/1330003</a><br>
<br>
Social Engineer Spills Tricks of the Trade:<br>
<a href="https://www.darkreading.com/endpoint/social-engineer-spills-tricks-of-the-trade-/d/d-id/1330315">https://www.darkreading.com/endpoint/social-engineer-spills-tricks-of-the-trade-/d/d-id/1330315</a><br>
<br>
Microsoft solution to mitigate the DDE exploit "turn it off". So if you use Dynamic Documents updating and you have to manually turn it off, here is how:<br>
<a href="https://technet.microsoft.com/en-us/library/security/4053440">https://technet.microsoft.com/en-us/library/security/4053440</a>
</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px;border-radius:6px">
<p class="MsoNormal" align="center" style="text-align:center;background:#676767">
<span style="font-size:18.0pt;font-family:"Open Sans";color:white;letter-spacing:4.5pt">Cyberheist 'Fave' Links</span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<p class="MsoNormal"><span style="font-size:18.0pt;font-family:"Open Sans";color:#F16622">This Week's Links We Like, Tips, Hints and Fun Stuff</span><span style="font-family:"Open Sans";color:#333333">
</span><o:p></o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3">
<span style="font-family:"Open Sans";color:#333333">217 skydivers jump simultaneously from 10 planes to break a world record with three stunning formations, falling towards the ground at 120 mph:<br>
<a href="http://www.flixxy.com/217-skydivers-break-world-record.htm?utm_source=4">http://www.flixxy.com/217-skydivers-break-world-record.htm?utm_source=4</a></span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3">
<span style="font-family:"Open Sans";color:#333333">Amazing parkour, martial arts, surfing, soccer, gymnastics, diving, BMX, rock climbing, jump rope, basketball and gymnastics:<br>
<a href="http://www.flixxy.com/people-are-awesome-best-of-the-week-39.htm?utm_source=4">http://www.flixxy.com/people-are-awesome-best-of-the-week-39.htm?utm_source=4</a></span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3">
<span style="font-family:"Open Sans";color:#333333">SquareTrade iPhone X Breakability video. This is pretty bad, you NEED a case:<br>
<a href="https://www.youtube.com/watch?v=T_OT1FQSWuU&feature=youtu.be">https://www.youtube.com/watch?v=T_OT1FQSWuU&feature=youtu.be</a></span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3">
<span style="font-family:"Open Sans";color:#333333">Lamborghini and MIT's Terzo Millennio is a self-healing future supercar:<br>
<a href="https://www.cnet.com/roadshow/news/lamborghini-mit-terzo-millennio-self-healing-supercar/#ftag=CAD590a51e">https://www.cnet.com/roadshow/news/lamborghini-mit-terzo-millennio-self-healing-supercar/#ftag=CAD590a51e</a></span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3">
<span style="font-family:"Open Sans";color:#333333">Star Wars Rogue One — A Phish Story. This one is cute, check it out:<br>
<a href="https://vimeo.com/195371513">https://vimeo.com/195371513</a></span><o:p></o:p></li></ul>
<p class="MsoNormal" style="margin-left:.5in"><o:p> </o:p></p>
<ul type="disc">
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l2 level1 lfo3">
<span style="font-family:"Open Sans";color:#333333">A Compilation of Robots Falling Down at the DARPA Robotics Challenge. Riot!:<br>
<a href="https://m.youtube.com/watch?v=g0TaYhjpOfo">https://m.youtube.com/watch?v=g0TaYhjpOfo</a>
</span><o:p></o:p></li></ul>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:800px">
<div class="MsoNormal" align="center" style="text-align:center">
<hr size="1" width="100%" align="center">
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:400px;float:left">
<p class="MsoNormal" style="line-height:9.0pt"><span style="font-size:7.5pt;font-family:"Open Sans";color:#676767">FOLLOW US ON:
<a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/12f6f18bb2280eb257fda0ee104ee0a8a9355394/e7d88b54072fa5298131e8707a395418214a893f" target="_blank">
<span style="color:#F16824;text-decoration:none">Twitter</span></a> | <a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/35c8d23f428e99808212e79c497c5c7904ccc19f/e7d88b54072fa5298131e8707a395418214a893f" target="_blank">
<span style="color:#F16824;text-decoration:none">LinkedIn</span></a> | <a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/665fd8e8468a0fa0d279b30bd4c7ba97f04517dd/e7d88b54072fa5298131e8707a395418214a893f" target="_blank">
<span style="color:#F16824;text-decoration:none">Google</span></a> | <a href="http://newsletter.knowbe4.com/a/1022/click/576/2101618/947165ed658284c668dbae4f407761b5796d0745/e7d88b54072fa5298131e8707a395418214a893f" target="_blank">
<span style="color:#F16824;text-decoration:none">YouTube</span></a></span><o:p></o:p></p>
</div>
<div style="margin-top:5.0pt;margin-bottom:5.0pt;max-width:400px;float:right">
<p class="MsoNormal" align="right" style="text-align:right;line-height:9.0pt"><span style="font-size:7.5pt;font-family:"Open Sans";color:#676767">Copyright © 2014-2017 KnowBe4, Inc. All rights reserved.</span><o:p></o:p></p>
</div>
</div>
</td>
</tr>
<tr>
<td style="padding:0in 0in 0in 0in">
<div>
<p class="MsoNormal" style="background:black"> <o:p></o:p></p>
</div>
<p class="MsoNormal"> <o:p></o:p></p>
<div>
<table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="100%" style="width:100.0%;display:table !important">
<tbody>
<tr style="display:table-row !important">
<td width="20%" style="width:20.0%;padding:0in 0in 0in 0in;display:table-cell !important">
<p class="MsoNormal"> <o:p></o:p></p>
</td>
<td style="padding:0in 0in 0in 0in;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;display:table-cell !important">
<p class="MsoNormal" align="center" style="text-align:center"><span style="font-size:8.0pt;font-family:"Arial",sans-serif;color:#666666">This email was sent to
<b><a href="mailto:sage@mveca.org">sage@mveca.org</a></b> by <b><a href="mailto:feedback@knowbe4.com">feedback@knowbe4.com</a></b><br>
<br>
33 N Garden Ave, Suite 1200 Clearwater, FL 33755 USA<br>
<o:p></o:p></span></p>
<div>
<p class="MsoNormal" align="center" style="text-align:center"><span style="font-size:8.0pt;font-family:"Arial",sans-serif;color:#666666"><a href="http://newsletter.knowbe4.com/a/1022/one_click_unsubscribe/576/2101618/e7d88b54072fa5298131e8707a395418214a893f"><span style="color:black;border:none windowtext 1.0pt;padding:0in">1-Click
Unsubscribe</span></a><o:p></o:p></span></p>
</div>
</td>
<td width="20%" style="width:20.0%;padding:0in 0in 0in 0in;-ms-text-size-adjust: 100%;-webkit-text-size-adjust: 100%;display:table-cell !important">
<p class="MsoNormal" align="right" style="text-align:right"><span style="font-size:8.0pt;font-family:"Arial",sans-serif;color:#666666"> <o:p></o:p></span></p>
</td>
</tr>
</tbody>
</table>
</div>
</td>
</tr>
</tbody>
</table>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>