CyberheistNews Vol 15 #28 | July fifteenth, 2025
[The $1B Question] Is Your Safety Workforce Prepared for AI Immediate Assaults?
In all probability not. So the query turns into: “Ought to your safety staff study immediate engineering?” The reply is certainly YES. This is why:
AI-powered assaults are evolving at scary velocity. Criminals are utilizing LLMs to craft good phishing emails, automate social engineering and scale assaults like by no means earlier than.
Your defenders want the identical weapons.
At KnowBe4, we’re seeing safety groups who perceive immediate engineering catch threats thrice sooner. They’re constructing AI brokers that analyze patterns people miss, and automating response workflows that used to take hours. They’re utilizing adaptive e-mail safety instruments with O365 that use AI to defend towards and quarantine probably the most subtle threats.
The way forward for cybersecurity is not nearly defending towards AI — it is about wielding it higher than the attackers. Begin easy: Have your staff take a immediate engineering course. Run an inside hackathon. Construct your first safety AI agent. The criminals have already got.
Ransomware Actuality Verify: Busting Cybersecurity Myths
Be part of us for an interesting and interactive webinar the place we put ransomware myths to the take a look at! This distinctive session combines the analytical method to probably the most persistent discussions surrounding ransomware assaults and YOU determine whether or not they maintain weight.
KnowBe4 cybersecurity consultants, Javvad Malik and Erich Kron, will go head-to-head to debate the information, presenting proof, real-world case research and knowledgeable opinions on controversial ransomware matters. Must you:
- Ever negotiate with ransomware teams?
- Prioritize prevention or restoration?
- Be required to reveal ransom funds?
- Face authorized penalties for making ransomware funds?
- Rent former black hat actors as consultants?
However here is the place it will get fascinating: YOU get the deciding vote! After every debate, you’ll vote on which argument was most compelling and possibly even stroll away from it excited about ransomware in a brand new gentle. Plus earn CPE credit score for attending!
Date/Time: TOMORROW, Wednesday, July 16 @ 2:00 PM (ET)
Cannot attend dwell? No worries — register now and you’ll obtain a hyperlink to view the presentation on-demand afterwards.
Save My Spot:
https://data.knowbe4.com/ransomware-webinar-2025?partnerref=CHN2
AI Assaults Are Coming in a Large Means Now!
By Roger Grimes
AI goes to permit higher, sooner and extra pervasive assaults. For a number of years, in case you attended certainly one of my displays involving AI, I’d let you know all about AI and AI threats…maybe even scare you a bit…after which let you know this, “AI assaults are coming, however how you’re prone to be attacked this 12 months does not contain AI. Will probably be the identical outdated assaults which have labored for many years.”
I at all times bought plenty of comforted smiles from these ending strains. However this 12 months is totally different. This 12 months, in case you are efficiently attacked, AI is prone to be concerned. Beginning now, AI is greater than prone to be concerned, and by subsequent 12 months…for positive…AI would be the essential method you’re attacked.
AI guarantees to resolve a lot of humanity’s long-standing issues (e.g., illnesses, site visitors administration, higher climate prediction, and so on.), enhance productiveness, and provides us many innovations and options that weren’t simply achievable. Sadly, AI will even enable cyberattackers to be higher at malicious hacking.
This text will talk about most of the methods AI will probably be utilized by attackers to “higher” assault us. I am not speaking about issues method, method sooner or later. I am speaking about enhancements taking place now that may change into forevermore the way in which issues are finished, beginning this 12 months and positively normalized by subsequent.
[CONTINUED] On the KnowBe4 weblog:
https://weblog.knowbe4.com/ai-attacks-are-coming-in-a-big-way-now
[Live Demo] Clever E mail Protection: Automate, Remediate, and Practice from One Platform
As cyberattackers proceed to outpace conventional defenses, it isn’t a query of if, however when subtle assaults will bypass your e-mail safety controls.
Phishing assaults are surging at an unprecedented 1,265% price since 2022, largely pushed by AI developments. Most regarding, 31% of IT groups take greater than 5 hours to answer reported safety points, leaving your group weak throughout these vital hours when threats stay energetic in your customers’ inboxes.
Throughout this demo, you may uncover how PhishER Plus might help take management again from rising AI phishing dangers by:
- Reworking your customers into energetic risk sensors with one-click reporting through the Phish Alert Button
- Accelerating response instances with AI-powered automation that reduces guide e-mail evaluate by 85-99%
- Offering complete risk intelligence from a community of 13+ million world customers and third-party integrations
- Eradicating threats routinely from all mailboxes with PhishRIP earlier than customers can work together with them
- Changing actual assaults into focused coaching alternatives with PhishFlip
Uncover how PhishER Plus combines AI and human intelligence to rework your customers from safety dangers into your most dear defenders.
Date/Time: Wednesday, July 23 @ 2:00 PM (ET)
Save My Spot:
https://data.knowbe4.com/phisher-demo-1?partnerref=CHN
Alert: Scattered Spider is Focusing on the Aviation Sector
The U.S. FBI and cybersecurity consultants are warning that the Scattered Spider extortion gang has shifted its focus to the aviation and transportation sectors, BleepingComputer stories.
The group spent the previous a number of months concentrating on firms within the retail and insurance coverage sectors, and has now hit a number of airways. Scattered Spider makes use of social engineering assaults to realize preliminary entry, then steals knowledge and/or deploys ransomware to extort their victims.
Palo Alto Networks’ Unit 42 says the group steadily targets organizations’ assist desks to trick IT employees into resetting passwords for them. Unit 42’s SVP of Consulting and Risk Intelligence Sam Rubin said, “Organizations must be on excessive alert for stylish and focused social engineering assaults and suspicious MFA reset requests.”
Likewise, Charles Carmakal, CTO at Google’s Mandiant, mentioned in a LinkedIn publish, “We suggest that the business instantly take steps to tighten up their assist desk id verification processes previous to including new cellphone numbers to worker/contractor accounts (which can be utilized by the risk actor to carry out self-service password resets), reset passwords, add units to MFA options, or present worker info (e.g. worker IDs) that could possibly be used for a subsequent social engineering assaults.”
Carmakal factors to Mandiant’s steerage on defending towards Scattered Spider, which notes that the group is “extraordinarily proficient at utilizing a number of types of social engineering to persuade customers into doing one thing that may enable them to realize entry.”
Mandiant says organizations ought to educate customers to be looking out for these techniques. New-school safety consciousness coaching provides your group a necessary layer of protection towards social engineering assaults. KnowBe4 empowers your workforce to make smarter safety selections daily. Over 70,000 orgs worldwide belief the KnowBe4 platform to strengthen their safety tradition and scale back human threat.
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/alert-scattered-spider-is-targeting-the-aviation-sector
Information Exfiltration Over E mail: Methods to Detect Intentional Exfiltration in Microsoft 365
Cybersecurity leaders have reported intentional rule-breaking because the main trigger of information loss and exfiltration of their group, but many wrestle to successfully detect or monitor this risk.
Obtain this information to study:
- Why staff exfiltrate knowledge over e-mail
- How people bypass inside safeguards to ship delicate info to private emails
- The restrictions of conventional DLP options in detecting exfiltration
Obtain Now:
https://data.knowbe4.com/ciso-strategy-guide-data-exfiltration-over-email-chn
Quotes of the Week
“Robust minds talk about concepts, common minds talk about occasions, weak minds talk about folks.”
– Socrates (469 – 399 BC)
“What you permit behind just isn’t what’s engraved in stone monuments, however what’s woven into the lives of others.”
– Pericles (495 – 429 BC)
You may learn CyberheistNews on-line at our Weblog
https://weblog.knowbe4.com/cyberheistnews-vol-15-28-the-1b-question-is-your-security-team-ready-for-ai-prompt-attacks
Safety Information
AI-Generated Summaries Mistakenly Recommend Phishing Websites
Researchers at Netcraft warn that AI-generated search engine summaries are suggesting phishing websites when customers ask them to search out reputable login pages. The researchers examined common AI fashions, asking them for the login pages of fifty main manufacturers, and located that the fashions supplied the unsuitable websites 34% of the time.
“In lots of instances, customers see AI-generated content material earlier than (or as an alternative of) conventional search outcomes—and infrequently with out even needing to log in,” the researchers clarify. “This shift marks a elementary change in how customers work together with the online.
“However it additionally introduces new dangers: when an AI mannequin hallucinates a phishing hyperlink or recommends a rip-off website, the error is offered with confidence and readability. The person is much extra prone to click on and comply with by means of. We have already seen troubling public examples, however our deeper investigation reveals that the difficulty is not confined to hypothetical or early-stage rollouts. It is systemic—and more and more exploitable.”
In at the very least one case, a mannequin advised a downright malicious web page that impersonated Wells Fargo’s login portal. “This wasn’t a delicate rip-off,” the researchers write. “The pretend web page used a convincing clone of the model. However the vital level is the way it surfaced: it wasn’t website positioning, it was AI.
“Perplexity advisable the hyperlink on to the person, bypassing conventional alerts like area authority or repute. This situation highlights a significant problem. AI-generated solutions usually strip away conventional indicators like verified domains or search snippets. Customers are skilled to belief the reply, and the attacker exploits the person if the reply is unsuitable.”
Netcraft notes that AI summaries provide risk actors a brand new avenue to get phishing hyperlinks in entrance of customers. “Phishers and cybercriminals are well-versed in conventional website positioning methods,” the researchers clarify. “However now they’re turning their consideration to AI-optimized content material, pages designed to rank not in Google’s algorithm, however in a chatbot’s language mannequin.”
Netcraft has the story:
https://www.netcraft.com/weblog/large-language-models-are-falling-for-phishing-scams
Crooks Use Callback Phishing to Bypass Safety Measures
Researchers at Cisco Talos warn of a surge in callback phishing assaults that use PDF recordsdata with cellphone numbers to trick victims into calling the scammers. The emails purport to return from well-known manufacturers, and use phony pressing eventualities to spur the sufferer into performing shortly.
Lots of the phishing lures inform customers of a giant unauthorized transaction on an account. “A good portion of e-mail threats with PDF payloads persuade victims to name adversary-controlled cellphone numbers, displaying one other common social engineering method: telephone-oriented assault supply (TOAD), often known as callback phishing,” the researchers write.
“Victims are instructed to name a particular quantity within the PDF to resolve a problem or verify a transaction. As soon as the sufferer calls, the attacker poses as a reputable consultant and makes an attempt to control them into disclosing confidential info or putting in malicious software program on their laptop.”
The researchers notice that callback phishing can usually bypass technical safety measures, because it depends on a sufferer reaching out to the scammer. The phishing emails and PDF recordsdata do not comprise any malicious hyperlinks or malware-laden attachments.
“Phishing usually includes sending emails or messages with malicious hyperlinks or attachments that direct the sufferer to a counterfeit web site,” Talos explains. “Callback phishing, nonetheless, doesn’t depend on pretend web sites or phishing hyperlinks. As an alternative, attackers use direct voice communication to use the sufferer’s belief in cellphone calls and the notion that cellphone communication is a safe strategy to work together with a corporation.
“Moreover, the dwell interplay throughout a cellphone name allows attackers to control the sufferer’s feelings and responses by using social engineering techniques. Callback phishing is, subsequently, a social engineering method moderately than a standard e-mail risk.”
Cisco Talos has the story:
https://weblog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/
The ten Fascinating Information Objects This Week
Cyberheist ‘Fave’ Hyperlinks
