KazPost

Kazakhstan News
Tuesday, Apr 23, 2024

A ransomware attack can begin in surprisingly simple ways

A ransomware attack can begin in surprisingly simple ways

Hackers often look for cracks in an organization's human shield
Ransomware can sneak into an organization by simple deception.

Often referred to as social engineering, hackers often look for cracks in the human shield at organizations.

This lets the attackers in the door, allowing them to gain higher "privileges" – or a higher level of security access – in a computer network; the key to carrying out a ransomware attack.

"Social engineering attacks can be executed to escalate privilege and gain more sensitive information and access over a series of attacks," Alethe Denis, social engineering expert and consultant for Critical Insight, told Fox Business.

Most cyberattacks – about 70 percent – are related to email phishing, Denis said. Phishing emails – which appear to come from a trusted source – are a simple but effective form of social engineering.

A more sophisticated approach involves a "well-thought-out and formally planned attack that has one or more social engineering elements," Denis said, adding that this kind of ransomware attack might, for example, target the oil and gas sector.

This approach may employ the gathering of seemingly innocuous information via a phone call, email or text message.

"While some of us think that we would be able to defend against these things, all of us are actually very much susceptible to these types of attacks," Denis explains in a recent video on the topic.

Attackers can essentially turn somebody in an organization into an unwitting insider.

"[Attackers are] going to hedge bets on using helpful employees whose job function is to be helpful, perform customer service or otherwise be receptive to requests and handle requests – those types of roles within your company are going to be targeted," Denis says in the video.

Denis gives one example of a company issuing a press release about their most recent charitable-giving campaign in which they mention a specific charity and a specific dollar amount that the campaign raised.

"The attacker would be able to then learn the name of the charity, the amount of money that was raised through the campaign and incorporate these into their development of a solid phish [email]," she says in the video.

"They could use logos of the charity … to pose as a representative from the charity and then incentivize the company to … engage with the email based on the fact that they promise some kind of recognition. Either an award or some kind of collaborative marketing effort to bring attention to this campaign," Denis says in the video.

Social media is also a favorite target.

"Social media is a bad actor's best friend and houses an immense amount of data that can be leveraged against businesses," Denis told Fox Business.

The larger point is, once the attacker gets a foothold, ransomware unfolds over a series of attacks, "resulting in a series of smaller compromises and finally one larger compromise to a company's data or systems," Denis said.

Though the final attack is the one that makes the news, the first stages of an attack are part of "an onion with many layers and take thoughtful time and planning."
Newsletter

Related Articles

KazPost
0:00
0:00
Close
It's always the people with the dirty hands pointing their fingers
Paper straws found to contain long-lasting and potentially toxic chemicals - study
FTX's Bankman-Fried headed for jail after judge revokes bail
Blackrock gets half a trillion dollar deal to rebuild Ukraine
America's First New Nuclear Reactor in Nearly Seven Years Begins Operations
Southeast Asia moves closer to economic unity with new regional payments system
Today Hunter Biden’s best friend and business associate, Devon Archer, testified that Joe Biden met in Georgetown with Russian Moscow Mayor's Wife Yelena Baturina who later paid Hunter Biden $3.5 million in so called “consulting fees”
Singapore Carries Out First Execution of a Woman in Two Decades Amid Capital Punishment Debate
Google testing journalism AI. We are doing it already 2 years, and without Google biased propoganda and manipulated censorship
Unlike illegal imigrants coming by boats - US Citizens Will Need Visa To Travel To Europe in 2024
Musk announces Twitter name and logo change to X.com
The future of sports
Unveiling the Black Hole: The Mysterious Fate of EU's Aid to Ukraine
Farewell to a Music Titan: Tony Bennett, Renowned Jazz and Pop Vocalist, Passes Away at 96
Alarming Behavior Among Florida's Sharks Raises Concerns Over Possible Cocaine Exposure
Transgender Exclusion in Miss Italy Stirs Controversy Amidst Changing Global Beauty Pageant Landscape
TikTok Takes On Spotify And Apple, Launches Own Music Service
Global Trend: Using Anti-Fake News Laws as Censorship Tools - A Deep Dive into Tunisia's Scenario
Arresting Putin During South African Visit Would Equate to War Declaration, Asserts President Ramaphosa
Hacktivist Collective Anonymous Launches 'Project Disclosure' to Unearth Information on UFOs and ETIs
Typo sends millions of US military emails to Russian ally Mali
Server Arrested For Theft After Refusing To Pay A Table's $100 Restaurant Bill When They Dined & Dashed
The Changing Face of Europe: How Mass Migration is Reshaping the Political Landscape
China Urges EU to Clarify Strategic Partnership Amid Trade Tensions
Europe is boiling: Extreme Weather Conditions Prevail Across the Continent
The Last Pour: Anchor Brewing, America's Pioneer Craft Brewer, Closes After 127 Years
Democracy not: EU's Digital Commissioner Considers Shutting Down Social Media Platforms Amid Social Unrest
Sarah Silverman and Renowned Authors Lodge Copyright Infringement Case Against OpenAI and Meta
Why Do Tech Executives Support Kennedy Jr.?
The New York Times Announces Closure of its Sports Section in Favor of The Athletic
BBC Anchor Huw Edwards Hospitalized Amid Child Sex Abuse Allegations, Family Confirms
Florida Attorney General requests Meta CEO's testimony on company's platforms' alleged facilitation of illicit activities
The Distorted Mirror of actual approval ratings: Examining the True Threat to Democracy Beyond the Persona of Putin
40,000 child slaves in Congo are forced to work in cobalt mines so we can drive electric cars.
Historic Moment: Edgars Rinkevics, EU's First Openly Gay Head of State, Takes Office as Latvia's President
An Ominous Shift in Warfare: Western Powers Risk War Crimes and Violate International Norms with Cluster Bomb Supply to Ukraine
Bye bye democracy, human rights, freedom: French Cops Can Now Secretly Activate Phone Cameras, Microphones And GPS To Spy On Citizens
The Poor Man With Money, Mark Zuckerberg, Unveils Twitter Replica with Heavy-Handed Censorship: A New Low in Innovation?
The Double-Edged Sword of AI: AI is linked to layoffs in industry that created it
US Sanctions on China's Chip Industry Backfire, Prompting Self-Inflicted Blowback
Meta Copy Twitter with New App, Threads
The New French Revolution
BlackRock Bitcoin ETF Application Refiled, Naming Coinbase as ‘Surveillance-Sharing’ Partner
Corruption in the European Parliament - Business as usual
UK Crypto and Stablecoin Regulations Become Law as Royal Assent is Granted
Paris Suburb Grapples with Violence as Curfew Imposed: Saint-Denis Residents Express Dismay and Anger
A Delaware city wants to let businesses vote in its elections
Alef Aeronautics Achieves Historic Milestone with Flight Certification for World's First Flying Car
Google Blocked Access to Canadian News in Response to New Legislation
French Politicians Advocate for Pan-European Regulation on Social Media Influencers
×