
Be Cyber Safe | Issue 209
February 21, 2025
In this issue of Be Cyber Safe
Here is what’s in this week’s Be Cyber Safe!
- Internet Scams: The Ultimate Guide to Protecting Yourself
- The Cyber Alert Level – GUARDED
- Lee Enterprises newspaper disruptions caused by ransomware attack
- Clop Ransomware lurks within the network, exploiting it for extended periods
- In Cyber Security Humor – Sensitive Data
- Commonwealth Sentinel expands our social media presence
In the next few weeks, we will unveil an exciting opportunity to empower your organization to improve cyber security through training. Look for more information shortly!
Have a great weekend and #BeCyberSafe!
Internet Scams: The Ultimate Guide to Protecting Yourself
There have been internet scams since the dawn of the World Wide Web. These scammers connect with their targets directly, press you to send money or private information and rely on your emotions—empathy, loneliness, sadness, greed, etc.
These cyber-threats range from simple to more targeted and complex, but there are a few recurring themes in prevalent internet schemes that you will likely encounter at some point if you haven’t already.
Most Common Internet Scams
Phishing scams attempt to trick you into revealing your personal information, such as passwords, credit card numbers, or Social Security numbers. Scammers often send emails or text messages that appear to be from legitimate companies, such as banks, credit card companies, or government agencies. They may also create fake websites that look like real websites.
Fake shopping websites sell counterfeit products or no products at all. They often have low prices and offer free shipping to attract customers. Once you place an order, you may receive a fake or no product at all, and your credit card information may also be stolen.
Romance scams trick people into falling in love with them and then steal their money. Scammers often create fake profiles on dating websites and social media platforms to gain their victims’ trust. Then, they’ll ask for information or money, such as to help them with a financial emergency or to pay for travel expenses. This is commonly referred to as catphishing..

On February 5, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in SimpleHelp and Google products. On January 30, the MS-ISAC released an advisory for multiple vulnerabilities in SimepleHelp RMM, the most severe of which could allow for arbitrary code execution.
Cyber Security News Worth Reading!
FROM BLEEPING COMPUTERS
Lee Enterprises newspaper disruptions caused by ransomware attack
Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group’s operations for over two weeks.
As a local news provider and one of the largest newspaper groups in the United States, Lee publishes 77 daily newspapers and 350 weekly and specialty publications across 26 states. Its newspapers have a daily circulation of over 1.2 million, and digital editions reach more than 44 million unique visitors.
In a Friday filing with the U.S. Securities and Exchange Commission (SEC), the media giant said the attack triggered a systems outage on February 3. “Preliminary investigations indicate that threat actors unlawfully accessed the Company’s network, encrypted critical applications, and exfiltrated certain files,” Lee said.

FROM CYBERSECURITY INSIDERS
Clop Ransomware lurks within the network, exploiting it for extended periods
In most cases, thieves disappear after successfully stealing money, goods, or valuable data. However, in the world of cybercrime, particularly with ransomware attacks, the scenario is quite different.
Unlike traditional theft where the criminal takes the stolen items and vanishes, ransomware attacks typically involve a two-step process: first, data is stolen, and then it is encrypted, making it inaccessible unless a ransom is paid. This method not only disrupts operations but also places intense pressure on victims, as the criminals often use the stolen data as leverage for further exploitation.
Cyber Security Humor
