We are seeing a significant increase in the number of cyber-attacks being reported with Viridor in two key areas: 

  • Phishing to Data harvest:  phishing emails or SMS text asking direct or through links to malicious web sites, for sensitive details such as log in credentials, or company information, which is then used for hacking or ransomware attacks.  
  • Ransomware: malicious software downloaded from links in malicious emails, attachments, web sites or external media, that then encrypts company data, stopping access to it, with a key that is made available only if the company pays a ransom.  


While the Viridor network currently has no identified compromises, it is attacked daily, relying on its security controls and just as importantly its employees to safeguard against one of those attacks getting through, especially from new variants of the attacks. We thankfully get many employees correctly following the guidelines to report actual phishing emails to us.  

It is not just the Viridor core network we must be vigilant with; currently we are dealing with 2 Viridor suppliers who have contacted us as they have actual ransomware breaches. One of those companies has had to rebuild its entire IT landscape and use data from a backup, weeks out of date rather than pay the huge ransom showing how significant the impact can beSo far, those breaches look under control and have not affected Viridor data or services.  


We stop most of the phishing emails and malicious software at our boundaries using good security controls, but some are so clever or so new they can get through to employees. If one of our suppliers is breached an email from them could look at first glance to be legitimate but on close looks is maliciousThis is where we rely on you to follow some good practice guidelines.  


Check all emails or SMS text you receive for the following tell-tale signs: 

  • Is it from an outside source that you have not dealt with before? 
  • It is from someone you have dealt with but is not expected or fails other checks below 
  • Does it ask you to confirm log in credentials or personal/company information by reply or by logging in to a website?  
  • Does it ask you to update your password when you were not expecting it to? 
  • Does the company name, website link, website and/or email address look odd, is spelt wrong or company logo look wrong?  
  • Is it poorly written, vague in address or subject wide of the mark? 
  • Is there an unexpected or suspicious attachment? 
  • Is the message designed to make you panic or react fast without checking validity? 

Alongside these checks, please ensure you use a good quality password on your account and keep it private to you. Do not use external media or files that you cannot vouch for.  


IF IN DOUBT LEAVE IT ALONE AND REPORT IT VIA THE PHISHING BUTTON IN OUTLOOK OR BY REPORTING IT TO THE IT SERVICE DESK.  

IF YOU HAVE GONE BEYOND THE INITIAL LOOK AND ARE CONCENRED REPORT IT IMMEDIATELY TO THE IT SERVICE DESK AND/OR RING THE INFORMATION SECURITY OFFICER ON 01823772314. 


Remember, it is important that we identify and treat these potential attacks quickly to minimise impact.   


An example of an actual phishing attack email on Viridor: 

 


It is addressed to an actual user such as jbloggs@viridor.co.uk.  

  • Note it shows clearly as an External Email so should heighten your need to check. 
  • Note it says Viridor Help-Dept and then devteam@insideout.com  
  • Viridor has a Service Desk not a Help-Dept and the email is then @indieout.com from external. All emails from your Service Desk would be internal. As is this notice.  
  • You would only get instructions to update from your internal teams.  
  • The link when hovered over is not a Viridor link.  


All of these should alert you to this being suspicious and get you to alert the IT Service Desk and/or report it via the phishing button in Outlook.