CyberheistNews Vol 15 #06 | February eleventh, 2025
Phishing Up 76% – Deepfake Assaults Surge: Is Your Org the Subsequent Goal?
Practically half (46%) of companies noticed a rise in deepfakes and generative AI-related fraud final yr, a brand new report from AuthenticID has discovered.
Moreover, phishing makes an attempt elevated by 76% in 2024, and greater than 90% of cyberthreats had been pushed by social engineering.
The report additionally famous an increase in workplace-related fraud, together with worker impersonation and account takeover.
“Workforce and worker fraud is rising, as fraudsters are concentrating on numerous factors alongside the worker identification lifecycle,” the researchers write. “Fraud can happen at any level in an worker’s tenure, merging each exterior and inside threats.
“Dangerous actors can use a wealth of stolen PII, artificial identities, and AI expertise to persuade employers they seem to be a authentic, certified worker with a legitimate identification— and as soon as they’ve entry to your group’s programs, they will commit important fraud.
“With the median world loss as a consequence of worker fraud at $145,000 in 2024, making it the world’s most expensive kind of economic fraud, it is essential for organizations to make sure their workforce is who they are saying they’re.”
The report factors out that social engineering ways are rising much more refined as AI instruments enhance.
“Social engineering assaults aren’t new, however they’re coming into a brand new period: hyper-personalization,” the researchers write.”As AI instruments proceed to develop, it is more and more simpler for dangerous actors to hone in on plausible, life like human behaviors, feelings, and actions to not solely mimic genuine people, however to control victims’ habits.
“The power of attackers to impersonate authentic people, organizations and/or requests is getting higher, with numerous new ways to help them.”
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/protect-yourself-navigating-the-increase-in-deepfakes-and-phishing-scams
QR Codes Uncovered: From Comfort to Cybersecurity Nightmare
What appears to be like like an harmless QR code has change into a sinister weapon within the cybercriminal’s arsenal. A staggering 25% of all electronic mail phishing assaults now exploit QR codes. Why? As a result of unsuspecting customers scan first and ask questions later, creating an ideal storm of vulnerability that is sweeping by way of organizations worldwide.
Be a part of us for this eye-opening webinar the place Roger A. Grimes, Information-Pushed Protection Evangelist at KnowBe4, will peel again the layers of QR code assaults and arm you with the information to fortify your defenses.
You may uncover:
- The mechanics behind QR codes – and why they seem to be a hacker’s dream
- Actual-world examples of QR code phishing that would occur to YOU
- Battle-tested methods to protect your group from these pixel-powered threats
- The key weapon in your safety arsenal: how person coaching on cutting-edge threats can remodel your whole safety tradition
Do not let your group fall sufferer to a easy sq. of dots! Be a part of us for this important webinar and earn CPE credit score whereas studying to outsmart the QR quagmire.
Date/Time: TOMORROW, Wednesday, February 12 @ 2:00 PM (ET)
Cannot attend dwell? No worries — register now and you’ll obtain a hyperlink to view the presentation on-demand afterwards.
Save My Spot:
https://information.knowbe4.com/qr-codes-exposed?partnerref=CHN2
Make-Shift Model Impersonation: Abusing Trusted Domains with Open Redirects
A KnowBe4 Menace Lab publication
Authors: Daniel Netto, Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer
Government Abstract
Attackers exploit redirects that lack safeguarding mechanisms to borrow the area status of the redirect service, obfuscate the precise vacation spot and exploit belief in identified sources.
Whitelisting URLs, solely permitting a predefined set of URLs to be rewritten, is an efficient countermeasures in opposition to the vulnerability on the server aspect. Nevertheless, not each net service implements that countermeasure.
The KnowBe4 Menace Lab just lately noticed a marketing campaign that exploited this vulnerability, luring customers into clicking malicious hyperlinks, opening attachments or delivering JavaScript payloads. The marketing campaign is a well timed reminder that technical defenses alone aren’t sufficient to guard a corporation. Worker participation in recognizing and reporting fraudulent or malicious exercise is essential.
Attackers constantly develop new ways, methods and procedures to bypass electronic mail safety options and penetrate worker inboxes.
Properly-guarded organizations leverage open-source, machine and human intelligence to enhance the safety of their electronic mail gateways. Cyber resilient organizations additionally prepare their customers to withstand social engineering assaults by recognizing crimson flags and by exercising emotional intelligence and demanding considering.
[CONTINUED] at:
https://weblog.knowbe4.com/make-shift-brand-impersonation-abusing-trusted-domains-with-open-redirects
Stay Demo: AI-Pushed E mail Menace Detection and Automated Speedy Response
Subtle phishing assaults are bypassing conventional defenses, placing your customers at unprecedented danger. With 68% of knowledge breaches involving the human ingredient, you want a multilayered strategy that goes past SEGs. Remodel your staff from vulnerabilities into lively cybersecurity property whereas strengthening your electronic mail safety.
Be a part of us for a dwell demo showcasing how KnowBe4 Defend and PhishER work collectively. Get essentially the most sturdy protection in opposition to superior phishing assaults whereas streamlining your incident response course of.
See how KnowBe4 Defend and PhishER will help you:
- Detect and forestall superior phishing assaults, together with Enterprise E mail Compromise, earlier than they attain your customers’ inboxes.
- Quickly establish, reply to and remediate threats that bypass your different defenses.
- Cut back the burden in your IT and safety groups by way of clever automation.
- Constantly educate and have interaction your customers in safety greatest practices.
- Acquire complete visibility into email-based dangers and person habits distinctive to your group.
Faucet into the facility of proactive menace detection and environment friendly incident response to construct your most sturdy electronic mail safety infrastructure but.
Date/Time: Wednesday, February 19 @ 2:00 PM (ET)
Save My Spot:
https://information.knowbe4.com/phisher-defend-demo?partnerref=CHN
From Firewalls to Digital Properly-Being: A Complete-Faculty Method to On-line Security
By Anna Collard
Just lately, I began working with my youngsters’s college to boost their on-line security measures and develop a digital mindfulness course in collaboration with their digital literacy lead.
This expertise highlighted the truth that our faculties aren’t solely anticipated to offer secure locations of studying but in addition prolong that security into the digital areas.
Expertise opens doorways for studying, creativity, and connection, but it surely additionally presents dangers—starting from publicity to dangerous content material, problematic tech use to cyberbullying and on-line exploitation.
Faculties should acknowledge their function in safeguarding youngsters each offline and on-line. Throughout the analysis part I got here throughout the UK Division for Training (DfE) issued “Maintaining Kids Secure in Training 2024” statutory steerage. Whereas developed for UK faculties, it serves as a superb framework for any instructional establishment trying to set up governance and on-line security insurance policies.
[CONTINUED] at:
https://weblog.knowbe4.com/from-firewalls-to-digital-well-being-a-whole-school-approach-to-online-safety
Can You Be Spoofed?
Are you conscious that one of many first issues hackers try is whether or not or not they will spoof the e-mail tackle of somebody in your area?
That is how “CEO fraud” spear-phishing assaults are launched in your group. Such assaults are laborious to defend in opposition to, except your customers know what to search for.
Are your electronic mail servers susceptible to spoofing? KnowBe4 will help you discover out with our free Area Spoof Check. It is fast, straightforward and sometimes a stunning discovery.
Discover out now in case your electronic mail server is configured appropriately, many aren’t!
- This can be a easy, non-intrusive “cross/fail” take a look at
- We are going to ship a spoofed electronic mail “from you to you”
- If it makes it by way of into your inbox, you realize you’ve got an issue
- You may know inside 48 hours!
Attempt to Spoof Me!
https://information.knowbe4.com/domain-spoof-test-1-chn
Quotes of the Week
“Actuality is created by the thoughts – we are able to change our actuality by altering our thoughts.”
– Plato – Thinker (427-347 B.C.)
“We cannot resolve our issues with the identical degree of considering that created them.”
– Albert Einstein – Physicist (1879 – 1955)
You may learn CyberheistNews on-line at our Weblog
https://weblog.knowbe4.com/cyberheistnews-vol-15-06-organizations-observed-50-percent-increase-in-deepfakes-and-phishing-scams-in-2024
Safety Information
Pressing: Organizations Must Prep For AI-Powered Ransomware Assaults
The rise of agentic AI instruments will remodel the cybercrime panorama, in response to a brand new report from Malwarebytes. Agentic AI—which continues to be below improvement—is a step above the generative AI instruments which might be at present accessible to the general public, and can seemingly be extensively launched in 2025. Whereas these instruments could have many authentic makes use of, they will additionally allow cybercriminals to scale their assaults.
“Rising agentic AI fashions—which may cause, plan, and act autonomously—will additional revolutionize cybercriminal ways, making assaults extra scalable and environment friendly in 2025,” the researchers write.
“Simply as companies are starting to discover AI for productiveness and safety, cybercriminals are leveraging it to enhance phishing campaigns, evade detection, and fine-tune assaults. This marks a turning level: the arms race between AI-powered attackers and AI-enhanced cybersecurity instruments is quickly escalating, forcing companies to rethink conventional protection methods.”
Notably, agentic AI might allow attackers to automate big-game ransomware assaults, which at present require quite a lot of effort.
“Agentic AI might be used to scale up the quantity and pace of assaults,” Malwarebytes says. “Huge sport ransomware requires a variety of human labor. With the anticipated near-term advances in AI, we might quickly dwell in a world the place well-funded ransomware gangs use AI brokers to assault a number of targets on the identical time.
“Malicious AI brokers may also be tasked with looking for and compromising susceptible targets, working and fine-tuning malvertising campaigns, or figuring out one of the best methodology for breaching victims.”
The researchers add that 2024 was “the worst yr ever for giant sport ransomware,” with a 13% improve in these assaults in comparison with 2023.
New-school safety consciousness coaching can allow your staff to remain forward of evolving safety threats.
KnowBe4 allows your workforce to make smarter safety choices day-after-day. Over 70,000 organizations worldwide belief the KnowBe4 platform to strengthen their safety tradition and scale back human danger.
Malwarebytes has the story:
https://www.prnewswire.com/news-releases/agentic-ai-will-revolutionize-cybercrime-in-2025-according-to-malwarebytes-state-of-malware-report-302367020.html
Warning: Phishing Marketing campaign Targets Germany with New Malware
Researchers at Cisco Talos warn {that a} new phishing marketing campaign is concentrating on customers in Germany and Poland in an try and ship a number of strains of malware, together with a brand new backdoor dubbed “TorNet.” The phishing emails purport to be faux cash switch confirmations from monetary establishments or phony order receipts from manufacturing and logistics firms.
“The phishing emails are predominantly written in Polish and German, indicating the actor’s intent to primarily goal customers in these international locations,” the researchers write.
“We additionally discovered some phishing electronic mail samples from the identical marketing campaign written in English. We assess with medium confidence that the actor is financially motivated, based mostly on the phishing electronic mail themes and the filenames of the e-mail attachments.
“The phishing electronic mail has attachments with the file extension ‘.tgz’, indicating that the actor has used GZIP to compress the TAR archive of the malicious attachment file to disguise the precise malicious content material of the attachment and evade electronic mail detections.”
The brand new pressure of malware, which Talos calls “TorNet,” is put in by the PureCrypter loader after a person opens the attachment.
“When a person opens the compressed electronic mail attachment and manually unzips it and runs a .NET loader executable, it will definitely downloads encrypted PureCrypter malware from a compromised staging server,” the researchers write.
“The Loader decrypts the PureCrypter malware and runs it within the system reminiscence. In a couple of intrusions on this marketing campaign, we discovered that the PureCrypter malware drops and runs the TorNet backdoor.
“The TorNet backdoor establishes connection to the C2 server and in addition connects the sufferer machine to the TOR community. It has the capabilities to obtain and run arbitrary .NET assemblies within the sufferer machine’s reminiscence, downloaded from the C2 server, rising the assault floor for additional intrusions.”
New-school safety consciousness coaching may give your group a necessary layer of protection in opposition to phishing and different social engineering assaults.
Cisco Talos has the story:
https://weblog.talosintelligence.com/new-tornet-backdoor-campaign/
What KnowBe4 Prospects Say
“Hello Stu, yeah we’re very proud of the platform and the worth it has added to our crew as a complete. We’re within the strategy of renewing for an additional yr. It has been an incredible instrument in serving to us obtain our ISO 27001 certification.
I’m additionally very impressed with the persistence and professionalism Samantha H. & Nicole T. have prolonged to us right here. I’ve not been responsive in getting again to them. This isn’t from lack of need to extra so owing to being part of a startup transferring at mild pace.
We simply closed our Collection B, and It has been on all fingers on deck getting supplies collectively for VCs. With the excuse out of the way in which, each Samantha & Nicole have solely ever displayed courteousness within the face of what will need to have felt like being ignored! They’re a credit score to your crew! I sit up for our continued use of the product.”
– M.A., Infrastructure & Safety Lead
The ten Attention-grabbing Information Gadgets This Week
Cyberheist ‘Fave’ Hyperlinks