Bermuda Post

Friday, Apr 19, 2024

A ransomware attack can begin in surprisingly simple ways

A ransomware attack can begin in surprisingly simple ways

Hackers often look for cracks in an organization's human shield
Ransomware can sneak into an organization by simple deception.

Often referred to as social engineering, hackers often look for cracks in the human shield at organizations.

This lets the attackers in the door, allowing them to gain higher "privileges" – or a higher level of security access – in a computer network; the key to carrying out a ransomware attack.

"Social engineering attacks can be executed to escalate privilege and gain more sensitive information and access over a series of attacks," Alethe Denis, social engineering expert and consultant for Critical Insight, told Fox Business.

Most cyberattacks – about 70 percent – are related to email phishing, Denis said. Phishing emails – which appear to come from a trusted source – are a simple but effective form of social engineering.

A more sophisticated approach involves a "well-thought-out and formally planned attack that has one or more social engineering elements," Denis said, adding that this kind of ransomware attack might, for example, target the oil and gas sector.

This approach may employ the gathering of seemingly innocuous information via a phone call, email or text message.

"While some of us think that we would be able to defend against these things, all of us are actually very much susceptible to these types of attacks," Denis explains in a recent video on the topic.

Attackers can essentially turn somebody in an organization into an unwitting insider.

"[Attackers are] going to hedge bets on using helpful employees whose job function is to be helpful, perform customer service or otherwise be receptive to requests and handle requests – those types of roles within your company are going to be targeted," Denis says in the video.

Denis gives one example of a company issuing a press release about their most recent charitable-giving campaign in which they mention a specific charity and a specific dollar amount that the campaign raised.

"The attacker would be able to then learn the name of the charity, the amount of money that was raised through the campaign and incorporate these into their development of a solid phish [email]," she says in the video.

"They could use logos of the charity … to pose as a representative from the charity and then incentivize the company to … engage with the email based on the fact that they promise some kind of recognition. Either an award or some kind of collaborative marketing effort to bring attention to this campaign," Denis says in the video.

Social media is also a favorite target.

"Social media is a bad actor's best friend and houses an immense amount of data that can be leveraged against businesses," Denis told Fox Business.

The larger point is, once the attacker gets a foothold, ransomware unfolds over a series of attacks, "resulting in a series of smaller compromises and finally one larger compromise to a company's data or systems," Denis said.

Though the final attack is the one that makes the news, the first stages of an attack are part of "an onion with many layers and take thoughtful time and planning."
Newsletter

Related Articles

Bermuda Post
0:00
0:00
Close
Paper straws found to contain long-lasting and potentially toxic chemicals - study
FTX's Bankman-Fried headed for jail after judge revokes bail
Blackrock gets half a trillion dollar deal to rebuild Ukraine
Steve Jobs' Son Launches Venture Capital Firm With $200 Million For Cancer Treatments
Israel: Unprecedented Civil Disobedience Looms as IDF Reservists Protest Judiciary Reform
Google reshuffles Assistant unit, lays off some staffers, to 'supercharge' products with A.I.
End of Viagra? FDA approved a gel against erectile dysfunction
UK sanctions Russians judges over dual British national Kara-Murza's trial
US restricts visa-free travel for Hungarian passport holders because of security concerns
America's First New Nuclear Reactor in Nearly Seven Years Begins Operations
Southeast Asia moves closer to economic unity with new regional payments system
Political leader from South Africa, Julius Malema, led violent racist chants at a massive rally on Saturday
Today Hunter Biden’s best friend and business associate, Devon Archer, testified that Joe Biden met in Georgetown with Russian Moscow Mayor's Wife Yelena Baturina who later paid Hunter Biden $3.5 million in so called “consulting fees”
Singapore Carries Out First Execution of a Woman in Two Decades Amid Capital Punishment Debate
Spanish Citizenship Granted to Iranian chess player who removed hijab
US Senate Republican Mitch McConnell freezes up, leaves press conference
Speaker McCarthy says the United States House of Representatives is getting ready to impeach Joe Biden.
San Francisco car crash
This camera man is a genius
3D ad in front of Burj Khalifa
Next level gaming
Google testing journalism AI. We are doing it already 2 years, and without Google biased propoganda and manipulated censorship
Unlike illegal imigrants coming by boats - US Citizens Will Need Visa To Travel To Europe in 2024
Musk announces Twitter name and logo change to X.com
'I just lost it' Lowe’s worker fired after 13 years of employment for confronting thieves trying to steal $2K of merchandise
The politician and the journalist lost control and started fighting on live broadcast.
The future of sports
Unveiling the Black Hole: The Mysterious Fate of EU's Aid to Ukraine
Farewell to a Music Titan: Tony Bennett, Renowned Jazz and Pop Vocalist, Passes Away at 96
Alarming Behavior Among Florida's Sharks Raises Concerns Over Possible Cocaine Exposure
Transgender Exclusion in Miss Italy Stirs Controversy Amidst Changing Global Beauty Pageant Landscape
Joe Biden admitted, in his own words, that he delivered what he promised in exchange for the $10 million bribe he received from the Ukraine Oil Company.
TikTok Takes On Spotify And Apple, Launches Own Music Service
Global Trend: Using Anti-Fake News Laws as Censorship Tools - A Deep Dive into Tunisia's Scenario
Arresting Putin During South African Visit Would Equate to War Declaration, Asserts President Ramaphosa
Hacktivist Collective Anonymous Launches 'Project Disclosure' to Unearth Information on UFOs and ETIs
Typo sends millions of US military emails to Russian ally Mali
Server Arrested For Theft After Refusing To Pay A Table's $100 Restaurant Bill When They Dined & Dashed
The Changing Face of Europe: How Mass Migration is Reshaping the Political Landscape
China Urges EU to Clarify Strategic Partnership Amid Trade Tensions
Europe is boiling: Extreme Weather Conditions Prevail Across the Continent
The Last Pour: Anchor Brewing, America's Pioneer Craft Brewer, Closes After 127 Years
Democracy not: EU's Digital Commissioner Considers Shutting Down Social Media Platforms Amid Social Unrest
Sarah Silverman and Renowned Authors Lodge Copyright Infringement Case Against OpenAI and Meta
Italian Court's Controversial Ruling on Sexual Harassment Ignites Uproar
Why Do Tech Executives Support Kennedy Jr.?
The New York Times Announces Closure of its Sports Section in Favor of The Athletic
BBC Anchor Huw Edwards Hospitalized Amid Child Sex Abuse Allegations, Family Confirms
Florida Attorney General requests Meta CEO's testimony on company's platforms' alleged facilitation of illicit activities
The Distorted Mirror of actual approval ratings: Examining the True Threat to Democracy Beyond the Persona of Putin
×