Are you susceptible to a 'social engineering' attack?

, Targeting the airline industry. The group, which is also called behind the cyber attack on several Las Vegas Casino in 2023, is asked to rely more on “social engineering” techniques for their attacks, a strategy was used to gain confidence with the victims.

“In a social engineering attack, an attacker uses human contact (social skills) to get information about an organization or its computer system,” of the Department of Homeland Security Cyber ​​security and infrastructure security agency (CISA) tells about these types of scams. Sisa says that the attackers can use the information as a reliable person who is working as a reliable person, or to get access to the victim’s company, Sisa says.

Specific examples of scattered spider’s social engineering strategy include “It helps to access employees or contractors,” or “Helps assure help desk services to add unauthorized added” [multi-factor identification] Equipment to compromise accounts, ” According to FBI.

But social engineering can take many forms – and can target everyday individuals instead of corporations.

“Typically, elderly are the most vulnerable to social engineering, but they are not only suffering,” John Young said, Cyber ​​Safety Specialist and Encryption Company’s COO Quantum Emotion America. “Lonley people fall prey to romance scams; people who want immediate satisfaction are insecure to get rich-rich tricks; and otherwise those who are afraid of disappearing can get by investment scams.”

These types of attacks are also incredibly common. Scammers often present emails and texts (aka fishing and smoching scam) or sometimes on the phone, perhaps as a bank or e-commerce company, and asks the victim to verify their personal information or account password.

Joseph SteinburgA cyber security expert and author of “Cybercity for Damies” says that these attacks take advantage of weakness in the human brain.

Steinberg told Nexstar, “We are not wired to experience hazards from far away.

“But people have a tendency to rely on technology compared to other people,” he said. “If I walk with you in the street, and I told you that your banker told me that you need to reset your password, you will never trust me. But if you get an email that looks like what it looks like [a bank]It may be different. ,

This is also difficult and difficult to separate social engineering attacks from legitimate negotiations. Artificial Intelligence has made it easy for hackers to gather information about goals and carry out attacks, as noted by cyber security teams in such organizations Crowdastright, IBM And Yale University.

AI can also make it possible for bad actors to create deepfec (ie, synthetic photos, videos or audio clips, which appear to be almost uninterrupted from authentic people) to trick the victims. Steinberg says that he has displayed this strategy on the phone, in which the scammers have used deepfeek audio to mimic the voice of the victim’s loved one, asking for money or sensitive information.

“Every time I saw it works,” he said. “AIS is good.”

CISA provides in many numbers Tips to prevent the possibility of becoming a victim Social engineering attacks, in which you limit the amount of personal information shared online, or contact a bank/company directly (using the phone number provided by the company’s official channels) after receiving a suspicious email or text, to verify its authenticity.

Now that the AI ​​is in the mixture, Steinberg also suggests to come up with a plan to verify the identity of his own family members – and most importantly, their children – if they get a suspicious call from a person who claims to be a loved one from a person.

“I … I am going to ask them some information that only my child will know,” Sayinberg said.

By understanding these devices, the possibility of suffering is minimal, if never ended completely.

“The most important thing is to internal the fact that you are a goal,” Stinberg said. “If you believe that people are trying to scam you, you just behave differently.”

Young also said that a suspicious mindset is helpful to adopt a particularly weaker population.

He said, “I teach old citizens volunteer classes for AARP, and when I explain that in the old days the scammers were known as Con artists, there is some clicks for them,” he said. “This is true; today’s scammers Con are just another name for artists who have been using persuasion and their social engineering skills since the beginning of the time.”

Source link

Please follow and like us:
Pin Share

Leave a Reply

Your email address will not be published. Required fields are marked *