Trusted Relationships as the Emerging Cybersecurity Risk Factor

www.news4hackers.com-trusted-relationships-as-the-emerging-cybersecurity-risk-factor-trusted-relationships-as-the-emerging-cybersecurity-risk-factor

Phishing Tactics Evolve to Target Trust and Workflow

Attackers are increasingly abandoning traditional phishing exploits in favor of targeted, socially engineered attacks that prey on trusting relationships and habitual workflows.

According to recent research, over 58% of attacks fall under the category of phishing, which involves using tailored tactics to manipulate victims into divulging sensitive information.

File-Sharing Lures and Brand Impersonation

Phishing attacks often take various forms, including file-sharing lures and brand impersonation. File-sharing lures are typically directed towards industries and roles where document exchange is common, such as healthcare and finance. Brand impersonation, on the other hand, aligns with the complexity of the target’s software footprint.

  • File-sharing lures aim to blend into the victim’s normal workflow and tools.
  • Brand impersonation targets specific companies or individuals based on their online presence.

BEC and VEC Attacks Pose Significant Risks

In addition to phishing, business email compromise (BEC) and vendor compromise (VEC) attacks also pose significant risks. BEC attacks involve compromising an organization’s email system to trick employees into transferring funds or revealing sensitive information. VEC attacks, a subset of BEC, rely on compromising a vendor’s account to target their customers or suppliers.

  • BEC attacks often involve more attacker craftsmanship and are more likely to result in financial losses.
  • VEC attacks frequently involve invoice fraud and procurement-stage pretexts.

Effectiveness of Attacks Lies in Their Ability to Evade Detection

Research suggests that the effectiveness of these attacks lies in their ability to evade detection. Over 20% of phishing attacks use redirect chains to obscure the final malicious page from both users and security tools. Additionally, just over 10% of these attacks use link shorteners, with services like TinyURL and t.co dominating.

  • Redirect chains make it difficult for security tools to detect malicious activity.
  • Link shorteners obscure the URL of the malicious page.

Combating Evolving Threats with AI-Powered Solutions

To combat these evolving threats, researchers emphasize the importance of using artificial intelligence (AI) to analyze identity, context, and content. This allows for the creation of behavioral baselines for each employee and vendor in an organization’s cloud environment, making it possible to flag potential attacks before they occur.

Conclusion

The threat landscape is shifting towards more targeted, socially engineered attacks that prey on trusting relationships and habitual workflows. As these attacks become increasingly sophisticated, it is essential for organizations to adapt their defenses and leverage AI-powered solutions to stay ahead of the threat actors.



About Author

en_USEnglish