Code Blue Cyber’s Post

View organization page for Code Blue Cyber, graphic

1,325 followers

social engineering behind the corner

View profile for Refael Franco, graphic

INCD- (former) Deputy DG. Code Blue founder & CEO

Social engineering Break news In the last cases, we noticed that the hackers used more social engineering than ever. Iran's activities and cybercrime gangs are using social engineering to penetrate our systems. Why has social engineering become so popular? Let me share some old and new key reasons why attackers succeed with this approach: We found that hackers used people's Trust and Confidence: hackers track social media activities and find hobbies, lifestyles, and Positions. Also, we found that Emotions like fear, greed, or recklessness can drive hasty actions. Desire to be helpful can be exploited, sham, and manipulated by bad guys. In cases we managed attackers pretended to be CEO, emailing employees to urgently transfer funds for a supposed business deal. In some cases a deepfake of a CFO was used to authorize a fraudulent transaction, highlighting the need for robust identity checks. In one of our latest cases, hackers impersonated legit vendors and sent emails asking for payment for a new bank account. This kind of hacker method became so popular:( What we can do before? Awareness, training, guidelines, and anti-deep fake technology can reduce the risk. Five things we can offer immediately in case of emergency: • IR investigation - Identify and Isolate the Incident: Quickly identify the scope of the breach, including which accounts and systems are compromised. Isolate affected systems to prevent further unauthorized access. • • Notify Financial Institutions: •Contact your bank and any financial institutions involved in the transaction as soon as possible to attempt to stop or reverse unauthorized transfers. • • Inform Law Enforcement: •Report the incident to local law enforcement and relevant authorities, such as the FBI’s Internet Crime Complaint Center (IC3) in the U.S. This can help with recovery efforts and potentially lead to apprehending the attackers. • • Internal Communication: Inform your internal team about the breach to stop any further actions that might exacerbate the situation, such as responding to additional phishing emails, finance activities, or procurement payments. • Review and Secure Accounts: Check and secure all potentially compromised accounts by changing passwords and reviewing recent activity for unauthorized actions Feel free to contact us to learn more about collaborating with us. #cyber #socialenggenering #cybersrcurity #IR Code Blue Cyber Code Blue by Dussmann

To view or add a comment, sign in

Explore topics