Computer Sweden
Social manipulation – 7 exempel på nya trick som används idag Gamla metoder i nya paketeringar tar plats på listan över de vanligaste attackerna inom social manipulation. Här ger säkerhetsexperter exempel på verkliga fall.
Kopiera
Social manipulation har glada tider. Pandemi-panik, osäkerhet kring människors välfärd och oro över hälsan har gjort det enklare för kriminella att utnyttja människors rädslor.
Social manipulation är lika gammal som lögnen, det har bara fått ett nytt namn, och går helt enkelt ut på att digitalt attackera människor istället för datorsystem i syfte att få ut information eller trigga beteenden som leder till någon form av kompromettering av en organisations it-system.
minute read
Share this article:
The financially motivated cybercrime gang behind the Carbanak RAT is back with the Lizar malware, which can harvest all kinds of info from Windows machines.
The notorious FIN7 cybercrime gang, a financially motivated group, is spreading a backdoor called Lizar under the guise of being a Windows pen-testing tool for ethical hackers.
According to the BI.ZONE Cyber Threats Research Team, FIN7 is pretending to be a legitimate organization that hawks a security-analysis tool. They go to great lengths for verisimilitude, researchers said: “These groups hire employees who are not even aware that they are working with real malware or that their employer is a real criminal group.”
7 new social engineering tactics threat actors are using now arnnet.com.au - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from arnnet.com.au Daily Mail and Mail on Sunday newspapers.
Curaga / Cofotoisme / Getty Images
It’s been a boom time for social engineering. Pandemic panic, desperation as income concerns grew, and worry over health and wellness made it easier for criminals to tap into fear.
Social engineering, of course, means attacking the user rather than the computing system itself, trying to extract information or incite an action that will lead to compromise. It s as old as lying, with a new name for the computing age and that s a perfect metaphor for how social engineering tactics evolve. It s generally the same tricks wrapped up in new packaging and that s exactly what we are seeing,” said Perry Carpenter, chief evangelist and strategy officer at KnowBe4, a security awareness training company.
Google is seeing fresh threats from a North Korean government cyber group.
This comes after Google’s Threat Analysis Group in January documented a hacking campaign targeting cyber security researchers.
The hackers’ modus operandi is to build credibility by targeting legitimate researchers, according to Google.
As described by Google in January, the actors set up a research blog and multiple Twitter profiles to interact with researchers and used the profiles to post links to their blog and post videos of their claimed exploits. Exploit refers to code that takes advantage of a software or security flaw. Google is seeing fresh threats from a North Korean government cyber group..