Lucy 3.5 is out

Meet new Lucy 3.5! This version covers mainly internal updates not really visible to the user. Nevertheless we strongly recommend to update immediately to Version 3.5 because of the improved security. You can download VMware ESXi, VMware Workstation, VirtualBox images and Linux installer script on Lucy website, or use a pre-configured AMI on Amazon EC2 instance (search for “lucy” in Community AMIs when creating an instance). If you are using a commercial license, you can update the system through the “Update” section in Lucy. Please make sure you have no active campaigns running before updating Lucy!

Update notes:

  • New report variables
  • Paid sources for recipient search
  • Global benchmark stats
  • White labeling options
  • Security enhancements (AES256 encryption instead of the old AES128, password salt improvements)
  • Notification of expiring domains & VPS
  • LDAP improvements (multiple DC and SSL support)
LUCY Security and Palo Stacho Handelszeitung

Hot topic WannaCry: Significant response to LUCY in the Swiss business and Sunday press

Zürich-Thalwil, 20. Mai 2017 – The global WannaCry attack has put the issue of ransomware and malware countermeasures in the public focus. LUCY is now acknowledged in the leading media of the Swiss press as one of the pillars in the fight against cycled crime!

The economic crime now takes place in Cyberspace. This has now become clear to all. The most important point of defense as well as attack are the people, whether as an employee or private individual.

In the past, safety systems and large companies were the focus of attention. People were neglected and the SMEs were not yet interesting for the criminals. That has changed, even before WannaCry small companies have been increasingly blackmailed with Ransomware. In the meantime the ransom came down to about 600 USD / 400 EUR. This is a price the small companies can pay. Now the first background reports on the cybercrime wave 2017 were published in the Swiss press: The “Handelszeitung” on 18 May and  the “Schweiz am Wochenende” on 20 May 2017 published long articles and both newspapers address exactly the above topics. We are very pleased that employee awareness and phishing simulations will be publicly addressed to the benefit of the employees!

Of course, we recommend the following articles (in German):

 

Was ist LUCY ?

About: LUCY-Security is a Swiss company with customers in more than 50 countries. Its product LUCY Server allows companies to perform realistic cyber attack simulations. At the same time, customized awareness programs and incident alerting tools can be used to increase cyber security. For the first time, the LUCY server makes cyber prevention in the form of a standardized product affordable for all. Customers can now test and improve their IT security without special knowledge!

For more information please call Palo under +41 44 557 19 37 or write him a mail under palo (a t) lucysecurity (d ot) com. Thank you.

 

Results from the Customer Survey 2017

Key findings: 84% of the participants recommend LUCY Security and two-thirds of the respondents are willing to call themselves publicly as a reference customer! And more than 70% of the participants are interested in a user group.

For us, it is also interesting that almost half of the submitted suggestions for improvement are already available as LUCY features.

would-you-recommend-lucy-2017

 

In Feb / Mar 2017, clients of LUCY Security were asked to conduct a customer survey. The return rate was relatively high at 28.4%. The survey was conducted by the company itself on the basis of a short email questionnaire.

LUCY Security was not founded until 2015. The fact that such a young and still small cyber security product manufacturer gets so good grades after such a short time is evidence of the quality of the product and suggests that Swissness is also a not to be underestimated competitive factor.

Furthermore, the results are amazing, because the IT security industry is known for its secrecy. The high popularity rates for a public user group suggest a rethinking in the market that cyber crime can only be fight and confined together. Secrecy is detrimental to the security of the company on the Internet!

 

Phishing Incident Plugin for Outlook - LUCY Server

Our Phishing Incident Button is now available Everywhere!

LUCY Phishing Incident Plugin allows an easy and fast response to ongoing threats. Because it’s a highly beneficial feature for companies of all sizes we decided to make it available to ALL commercial editions of LUCY. Already for 350$ / Year you get an unlimited alert feature for your company!

Report scams with the phishing button from LUCY Security

Phishing Incident Plugin for MS-Outlook available everywhere

The plugin allows an immediate response to running cyber attacks. Because it’s such a powerful and valuable feature also for smaller companies we decided to make the functionality available to all commercial editions of LUCY Server. Already for 350 dollars you have the possibility to introduce a company-wide cyber alert-system in the enterprise. And without user limitations! Read more about our Phishing Button here.

 

More sophisticated functionality like the Threat Console or the “LUCY Risk Score” remain designated to the higher editions. If you want to discover more about these features read our post we have written for the launch of LUCY V3.4.

 

LUCY – We make cyberprevention and simulated Internet Attacks affordable and available to everybody!

The new version 3.4 is available and thus also a world novelty

We launched LUCY V 3.4: Cyber prevention as well as IT health checks affordable for everyone and the world-wide new integrated threat analysis of incoming e-mails using the LUCY Risk Score are the highlights of the current release.

Threat Analyser and Risk Score

The “Cisco 2017 Annual Cybersecurity Report“, which is highly regarded in the industry, puts it in a nutshell: “…In many cases, their securityteams can investigate only half the security alerts they receive on a given day.” This is where the Threat Analyzer provides a remedy and relieves the security team of routine work!

The newly introduced Threat Analyzer allows comprehensive threat management and risk analysis of e-mails who have been submitted by users using the Phishing Incident Plugin for MS-Outlook. The LUCY Risk Score calculated by the LUCY Server is a world-novelty. For the first time, internal databases and IT security rules are combined with external threat information. The world’s first multi-level analysis algorithm of the suspicious e-mails allows the calculation of a particularly meaningful key figure – the LUCY Risk Score. First, the header data of the message is inspected. This is followed by the investigation of the message body. Subsequently, the trustworthiness of the sender as well as of the dispatch route are checked and finally the internal security rules are applied. This results in a comprehensive KPI:

E-Mail Risk Score by LUCY

 

Phishing Incident Plugin for MS-Outlook available everywhere

The plugin allows an immediate response to running cyber attacks. Because it’s such a powerful and highly beneficial feature we decided to make the functionality available to all commercial editions of LUCY Server. Already for 350 dollars you have the possibility to introduce a company-wide cyber alert-system in the enterprise. And that without user limitations! Read more about our Phishing Button here.

Multi-language awareness page

Since LUCY V1.0 you have the possibility to run several language versions of the same scenario in a mock phishing campaign. Now you can do the same with your learning and training content. With that LUCY became the most multilingual solution in the market!

“Collected user data” available in reports

The data you collect during a campaign from the users is now available in the reports and the data can be exported as well for further analysis. Read more about statistical campaign data in our Wiki.

Even more new or improved Features in LUCY V 3.4 :

  • Letsencrypt autorenewal SSL
  • Campaign stats page improvement
  • Phishing Incident Plugin for MS-Outlook fixes & improvements  (completely new code)
  • New stats for portable & file-based attacks
  • Performance improvements in the frontend (Ajax settings)
  • Enable screenshots in the java plugin (dropper)
  • Other minor improvements and multiple bugfixes

Upgrade now to the ultimate Phishing Tool (and it’s even more ) ! Or download below:

Create and run a smishing attack in two minutes - LUCY screencast

Setup and Run a Smishing Attack in 2 Minutes – Educational Social Engineering with LUCY

A smishing attack is done easily with LUCY Server. Set up your educational social engineering campaigns and train your people.

Create and Run a Smishing Attack Simulations with LUCY Server. A Smishing Campaign is like a Phishing Campaign, but the distribution is done over SMS messages instead using email. With LUCY you can set up such a campaign as easy as a phishing simulation. This Video shows how it’s done. You need to have the mobile numbers from the recipients. Please take note that Smishing is unlawful in some countries! LUCY Security from Switzerland makes cyber prevention and IT-Security awareness affordable and available to everbody!

 

Educational Advanced Spear Phishing Simulation with the appropriate Malware

Advanced Spear Phishing Campaign and appropriate Malware [Video-Tutorial]

Suitable for reproduction: Build your own advanced Spear Phishing Simulation with the appropriate attached Malware with LUCY. A 30 minute video gives you the possibility to build up an advanced phishing and malware simulation almost off the cuff!

LUCY Founder Oliver explains how you can set up an advanced Educational Spear Phishing campaign and store it as an reusable template. Contents are:

  • Create a new attack template for your own purpose
  • Create a file-based or mixed advanced spear phishing scenario, using pre-defined templates.
  • Configure the phishing mails, so that thy contain personalized content
  • Configure and integrate harmless Trojans (Malware) into the file-based scenario
  • Set a default behavior of the Trojan (f.e. commands on the client to be executed or the listing of “Recent Documents” on the target computer)
  • Start, monitor and finalize the campaign
  • Reporting: Analyze the results of the Spear Phishing campaign
  • Useage of the scheduler with multiple scenarios (Q+A at the end)

You would like to reproduce/replay this educational phishing campaign? Just request a Demo System here:

 

What the public knows about cybersecurity quiz

Most Americans don’t know much about Cybersecurity – And you?

I did the quiz. My score was 9 out of 10. With this result I belong to the top 4% – It’s not only about strong passwords…
A new Pew Research Center survey titled “What the Public Knows about Cybersecurity” tallied responses from more than thousand American adults last year about their understanding of concepts important to online safety and privacy. It shows that Americans are not as good as recognising Phishing mails or determining if the web site where they are entering credit card information is encrypted. We assume that other countries would not perform better.
Pew - Study: What the public knows about Cybersecurity
Only 54% of US internet users are able to identify examples of phishing attacks. Phishing remains a favourite trick for infecting computers with malware and to gain access to the computer. Americans’ understanding of E-Mail and Wi-Fi encryption is also rather mixed. Less than half of internet users are able to correctly identify that the statement “all email is encrypted by default” is false.
Private browsing not really private – Only 4 out of 10 internet users are aware that internet service providers (ISPs) are able to see the sites their customers are visiting while utilizing the “private browsing” mode on their internet browsers. And one-third (33%) are aware that the letter “s” in a URL beginning with “https://” indicates that the traffic on that site is encrypted!
Other findings in the Pew survey:
  • 75 % of participants are able to identify the most secure password from a list of four options.
  • 52 % of people know that turning off the GPS function on smartphones does not prevent tracking. Mobile phones can be tracked via cell towers / Wi-Fi networks.
  • 10 % were able to identify one example of multi-factor authentication when presented with four images of online login screens.

LUCY Server makes Phishing Simulations and Cybersecurity education available and affordable to everybody. A free Community Edition can be downloaded from lucysecurity.com/download. Hunderts of customers trust LUCY!

Update immediately to LUCY V 3.3.3

Alert! Please install V 3.3.3! Your LUCY Server needs an immediate patch.

Dear Clients,

Please install LUCY version 3.3.3 as soon as possible! It should be available in Lucy upgrade section.

 

In the case the server has running campaigns:

If you have some campaigns running, that prevent you from upgrading and you are unable to access the campaign page, you will be unable to upgrade from the UI. In order to upgrade, you will need to stop campaigns manually. That could be done by connecting to Lucy over SSH and issuing the following command under the root account:

sudo -upostgres psql phishing -c 'update campaign_scenarios set status = 0 where status = 10'

 

After the command is done, you can safely upgrade to the newest version and start (do not click RESTART: ONLY click “START | REAL ATTACK” to resume the campaign without re-sending the mails) the campaigns you previously stopped again.

 

“Stop all” Feature will come with LUCY 3.5

In the last days, we got a lot of improvement requests for this functionality. We will implement it: Starting from Lucy 3.5 you can stop all campaigns before upgrading right on the update page.

 

Should you have problems:

If you experience any problems,

  1. please open an SSH connection for our support engineer and
  2. get in contact with us.

A big sorry for the inconvenience!

Best Regards,

Oliver Muenchow & Palo Stacho

LUCY Phishing GmbH

 

Edit Apr-06-2017, 3pm (CEST)

Reason: The patch adresses an internal issue with an encryption module that is used to obfuscate LUCY code. The encryption module stopped working. As a result code (e.g. PHP) cannot be decypted anymore and results to errors when accessing certain pages (500 internal server error). After the patch, the code can be interpreted again.

Cyber Insecurity: Administrations are not giving enough priority to the issue of cybersecurity and cybercrime today (2017), ie the wrong attitude.

The Best Remedy for Cyber Insecurity

The Ransomware explosion of 2016 has not only led to lot of  damage, but also to uncertainty and “cyber insecurity”. This is normal; in the case of new incidents, every person is initially unsure. As with all other uncertainties, experience, education, attitudes and practice also help with cyber insecurity!
Experience – In the case of an incident you are much better prepared when you experienced something similar in the past. Of course, nobody in the Security sector will rely solely on his experience, but experience is certainly the main remedy factor in cyber insecurity.
Education Matters – “Executives and managers responsible for cyber risk management realise that education of their employees has to be a feature of any credible security plan“. A Study named The Meaning of Security in the 21st Century of the Economist Intelligence Unit shows a strong increase in employee awareness training which is another key factor in making a Company or a Government safer.
Attitude – The correct ‘setting’ helps. Many executives believe that vulnerability is a weakness. We say: It depends! It can even be a strength. If, for example, you are hit by a Ransomware attack, but it does not cause any damage, because the hole is immediately stuffed and a current backup is played back, then a short breakdown can cost much less than the costs for a multiple redundant total protection. Of course, this does not apply to cases such as the theft of customer data etc. Here, vulnerability is an absolute no-go. But if you have the right attitude, it helps not only in cyber insecurity, but also in costs. And: You will never be able to protect everything completely.
The Economist Intelligence Unit Study reports  a weakness in attitude and perception among governments. Administrations are not giving enough priority to the issue of cybersecurity and cybercrime today (2017), ie the wrong attitude.
Cyber Insecurity: Administrations are not giving enough priority to the issue of cybersecurity and cybercrime today (2017), ie the wrong attitude.
 
Practice makes perfect. What else is there to say? Whoever does not practice has no experience, remains theorist and remains cyber insecure. That’s why we recommend LUCY-Server. You can start to practice right away: Simulate cyber attacks like Ransomware or a malware attack. Train your employees with phishing simulations and constantly check your network for weak points with LUCYs “LHFC”. And we nearly forgot – There’s a lot of educational CBT or eLeaning content out of the box!

All that helps against Cyber-Insecurity 🙂 – Give LUCY a try and ask for a Demo!