Published on July 1st, 2019 📆 | 6246 Views ⚑
0CyberheistNews Vol 9 #28 1.5 Billion Gmail Calendar Users Are the Target of a Crafty New Phishing Scam
Cybercriminals know that targeted social engineering attacks lead to the highest payoffs, so the frequency and sophistication of these attacks is guaranteed to increase, writes Jasmine Henry at IBM Security Intelligence. Henry lays out four rising social engineering attacks that organizations need to be aware of.
Business Email Compromise
The first type of attack is business email compromise (BEC, also known as CEO fraud), which involves compromising an email account or spoofing an email address to trick employees into transferring money or granting access to an attacker. Henry says that if an organization doesnât have proper security measures, these attacks âcan be both easy and highly rewarding for cybercriminals.â
Whaling
A variant of BEC is whaling, in which attackers impersonate an executive at an organization to gain maximum leverage when they make their demands. These attacks are less frequent since there are fewer potential targets, but they cause far more damage than most attacks.
Extortion Attempts
Extortion attempts are also growing more frequent. The vast majority of these attempts are pure scams, such as widespread sextortion campaigns. However, attackers do sometimes steal sensitive data and threaten to release it unless the victim pays a ransom. Henry points to a newer spin on this type of extortion in which criminals utilize crowdfunding to raise money before they release the information, allowing attackers to get paid even if the victim doesnât give in.
Pretexting
A fourth rising threat is pretexting, where an attacker poses as a trusted party and builds rapport with someone inside of an organization. Once theyâve gained an employeeâs trust, theyâll trick the target into doing something that compromises the organizationâs security.
Henry concludes that organizations need to take a new approach in order to fight these threats: âAlthough security awareness training remains a critical protection against the highest-volume forms of social engineering attacks, itâs time for organizations to look beyond basic user awareness,â she writes. âSome of todayâs most profitable attacks involve criminal methodologies that arenât visible to the bare eye. Inadvertent insiders are the weakest link in any organization, and itâs more important than ever to involve a comprehensive plan for cyber resilience, including simulation training and a strong resiliency plan.â
The damage caused by social engineering depends on the scenario and the organization. Any of these four types can cause massive damage to an organization's reputation, stock price or direct cash losses in the case of ransom paid due to a ransomware infection.
Gloss