Skip to content

Weapon of Mass Destruction – Voice AI-based Attack

Many people think that getting key personal information can be very hard, but it’s now becoming easier than ever.

Last week, I was reading how Elon Musk let go of thousands of people at Twitter using an AI-based bot that was trained to reproduce a message using the voice of famous people. I find it clownish but VERY dangerous.

This impersonation technology, used in the wrong hands, could lead to someone obtaining critical information about a business. It’s even better than phishing.

Even a combination of both (plus some threat intelligence) could be the perfect weapon to utilize in a malicious campaign.

Imagine this: you record the voice of any C-level position in a company – let’s say Procurement Manager. Train the bot to recognize the voice, and then we call the Finance Manager with it and ask him/her to transfer money to an external party, using a phishing mail which impersonates the Procurement Manager.

Bingo! It’s money in the bank.

In fact, it’s already happening.

There are even more terrible attacks that I won’t describe, but this will be a weapon of mass destruction.

Conclusion: cybersecurity offensive techniques are evolving very quickly and a black hat can do a lot of harm without the right company controls and processes.

My advice:

  1. Check everything twice.
  2. Have the correct processes in place in your company before moving a finger.
  3. Train your workforce, family and friends.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VRX
VRX is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

ESET launches psychometric test to uncover visionary thinkers across the world

BRATISLAVA, December 6th, 2022 ESET, a global leader in cybersecurity, today announces the launch of the Progress Personas psychometric test, developed in partnership with The Myers-Briggs Company, a pioneer in personality and professional development assessments. The test is designed for the curious and inquisitive, with the questionnaire allowing individuals to identify where they fit on the scale of visionary thinkers.

The Progress Personas test is designed to understand what makes people tick, innovate, and push society forward. After responding to a series of short questions, individuals will be provided with a bespoke report outlining the likely strengths and weaknesses of their forward-thinking personalities. The reports detail the specific innovative persona type they fall into, including The Changemaker, Flex Fury, Authentic Dynamo, Power Pro, Firestarter, Captain Conventional, Doctor Constant, The Chameleon, or The Inventor.

“We live in a changing world where we need to adapt and be resilient in order to progress. ESET believes that any inquiring mind has a role to play in contributing to progress that keeps the world turning,” comments Ignacio Sbampato, Chief Business Officer at ESET. “Everyone has different ways of being progress-minded. This psychometric test will highlight an individual’s forward-thinking persona and provide hints and tips to help reach their full potential. We’re excited to be partnering with a respected institution like The Myers-Briggs Company, to bring something insightful and fun to our global audience.”

“ESET places immense importance on the development of science and technology around the world. Whilst progress comes in many shapes and forms, it is important to protect it. ESET is proud to have been at the forefront of protecting progress for more than three decades,” adds Sbampato.

The psychometric test was developed in coordination with the company that publishes the famed Myers-Briggs Type Indicator® (MBTI®) assessment that reveals the differing psychological preferences in how people perceive the world and make decisions. The MBTI assessment indicates a person’s preference in four separate categories: Extraversion or Introversion, Sensing or Intuition, Thinking or Feeling, and Judging or Perceiving. The framework was developed in the 1940s by Katharine Cook Briggs and her daughter, Isabel Briggs Myers, who were inspired by Swiss psychiatrist Carl Jung’s book Psychological Types.

“The Progress Personas assessment has been developed to be a reliable measure of innovation style and resilience,” comments John Hackston, head of Thought Leadership at The Myers-Briggs Company. “By combining the scores of these two dimensions, the report gives people a unique insight into their individual style of achieving progress — their progress persona.”

The Progress Personas test follows ESET’s Heroes of Progress Awards which were announced in September, designed to shine a light on the visionary thinkers helping to make our planet a better place.

To take the free psychometric test, please visit: https://www.eset.com/int/progress-protected/heroes-of-progress/progress-persona-test/

To learn more about how ESET keeps progress protected, please visit: https://www.eset.com/hk/progress-protected/

 

To learn more about The Myers-Briggs Company, please visit: https://eu.themyersbriggs.com/

 




About ESET
ESET develops software solutions that deliver instant, comprehensive protection against evolving computer security threats. ESET pioneered and continues to lead the industry in proactive threat detection. ESET NOD32 Antivirus, its flagship product, consistently achieves the highest accolades in all types of comparative testing and is the foundational product that builds out the ESET product line to include ESET Smart Security. ESET Smart Security is an integrated antivirus, antispyware, antispam and personal firewall solution that combines accuracy, speed and an extremely small system footprint to create the most effective security solution in the industry. Both products have an extremely efficient code base that eliminates the unnecessary large size found in some solutions. This means faster scanning that doesn’t slow down computers or networks. Sold in more than 160 countries, ESET has worldwide production headquarters in Bratislava, SK and worldwide distribution headquarters in San Diego, U.S. ESET also has offices in Bristol, U.K.; Buenos Aires, AR; Prague, CZ; and is globally represented by an extensive partner network. For more information, visit our local office at https://eset.version-2.sg.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The Company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which includes Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities. For more information, please visit https://www.version-2.com.sg/ or call (65) 6296-4268.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Top 7 Types of Phishing Attacks and How to Prevent Them

Social engineering, in the context of information security, consists of practices performed by hackers to manipulate users to take actions that go against their interests, exploiting their vulnerability and lack of knowledge for their benefit.

One of the main types of social engineering is a phishing attack, which has been growing every day. According to the Verizon Data Breach Investigation 2022 report, 20% of data leaks in the surveyed period involved phishing.

These numbers warn us about the need of knowing the different types of phishing and how to avoid this threat – topics covered in this article. To facilitate your understanding, we divided our text into topics. They are as follows: 

  • What Is Phishing?
  • How Phishing Works
  • Top 7 Types of Phishing Attacks
  • Common Phishing Signs
  • Best Practices for Preventing Phishing Attacks
  • senhasegura GO Endpoint Manager: The Solution to Protect Against Phishing Attacks
  • About senhasegura
  • Conclusion

Enjoy the reading!

What Is Phishing?

Phishing is a very common type of social engineering in which hackers impersonate legitimate entities or trusted people to manipulate their victims and ask them to perform certain actions, such as providing sensitive information or clicking on malicious links.

Social engineering attacks such as phishing are present in almost all cybersecurity incidents and often involve other threats, such as network attacks, code injection, and malware. 

How Phishing Works

Typically, cybercriminals use means such as social media to gather data from their victims, such as names, roles, interests, and email addresses. 

Then, this information is used to create a false message on behalf of a trusted entity, such as banks, the victim’s workplace, or the victim’s university.

In the messages, the user is asked to download malicious attachments or click on links to malicious websites in order to collect confidential information, which may include usernames, passwords, and bank details.

Some attackers use inappropriate fonts, logos, and layouts in phishing emails, making it easier to identify them as such, but cybercriminals are increasingly getting better at this, making their messages look authentic.

Top 7 Types of Phishing Attacks

Here are the top 7 types of phishing used by cybercriminals to manipulate their victims:

Deceptive Phishing

Deceptive Phishing is the most common among types of phishing. In it, attackers impersonate a legitimate entity to access their victims’ personal data or login credentials, using messages with threats and a sense of urgency to manipulate them.

Here are some common techniques used in Deceptive Phishing:

  • Use of legitimate links in emails, including contact information of the organization they are impersonating;
  • Combination of malicious and non-malicious codes to cheat Exchange Online Protection (EOP). It is possible, for example, to replicate the CSS and JavaScript of a tech company’s login page to steal users’ account credentials;
  • Use of abbreviated URLs to deceive Secure Email Gateways (SEGs) and “time bombing” to redirect users to a phishing landing page;
  • Change of an HTML attribute in brand logos to prevent email filters from detecting the theft of the company’s symbols;
  • Emails with minimal content, often in image form, to avoid detection.

Spear Phishing

Spear Phishing is also among the types of phishing that use email, but this model is more targeted. In practice, hackers use open-source intelligence (OSINT) to gather publicly available company data. 

Then, they focus on specific users, using this information to make the victims believe the message is from someone within the organization, thus facilitating the accomplishment of their requests.

To identify Spear Phishing, one needs to be aware of unusual insider requests, shared drive links, and documents that require a user login ID and password.

Whaling

Whaling is also among the types of phishing that use OSINT. Known as Whale Phishing, Whale Fraud, or CEO Fraud, this type of attack consists of identifying the name of the organization’s CEO through social media or corporate website and sending a message posing as them and making requests to victims.

To identify this type of attack, one must pay attention to abnormal requests made by leaders who have never sent this type of message before, for example. Moreover, it is important to verify the message has not been sent to or via a personal email. 

Vishing

Vishing is voice phishing, which happens when a cybercriminal contacts their victims by phone to awaken their sense of urgency and make them respond to their requests.

To identify Vishing, it is valid to check if the phone number used is from an unusual or blocked location, if the time of the call coincides with a stressful event, such as a tax filing season, and if the personal data requested is unusual.

Smishing

Smishing is an evolution of Vishing, which is characterized by sending texts asking the user to take a certain action to change a delivery, such as clicking on a link that installs malware on their device.

One can spot it by going to the service website and checking the status of the delivery or by comparing the area code with their contact list.

Pharming

Pharming is among the most difficult types of phishing to identify. It consists of hijacking a Domain Name Server (DNS) and directing the user who enters the website address to a malicious domain.

To protect yourself against this type of attack, you need to look for websites that are HTTPS, not HTTP, and be aware of indications that the website is false, such as strange fonts, spelling errors, or incompatible colors.

Angler Phishing

Angler Phishing is a type of attack in which malicious users send notifications or messages in a social media app to convince their victims to perform certain actions.

In such cases, it is advisable to be careful about notifications that may have been added to a post with malicious links, direct messages from people who hardly use the app, and links to websites shared in direct messages.

Common Phishing Signs

Keeping an eye for signs is a way to protect yourself from the action of malicious attackers who use different types of phishing to manipulate their victims. The following are the main indications of this threat:

Emails Exploring a Sense of Urgency

Messages that stimulate immediate action through threats or another way of awakening a sense of urgency should be faced with suspicion. After all, in this context, the goal of hackers is to ensure their victims respond to their requests in a hurry, before they can even notice inconsistencies in the email received.

Inadequate Tone

An important feature of phishing is that messages can use inadequate language and tone. Therefore, if you receive a message from a friend with an overly formal tone, suspect.

Unusual Requests

Emails with unusual requests often consist of phishing attacks. In practice, the victim may receive a message asking them to perform an action normally performed by the IT department, for example.

Spelling and Grammar Mistakes

In general, organizations often set up spellchecking of their emails. Thus, it is important to pay attention to spelling and grammatical mistakes that may indicate a phishing attack.

Incompatible Web Addresses

Another way to detect phishing attacks is by comparing the sender’s address with previous communication, which may point to incompatibility.

To do this, simply hover over the link in an email before clicking on it to see its true destination.

Unexpected Requests

Often, cybercriminals use fake login pages associated with emails that appear to be legitimate. On these pages, they can request financial information, which should in no way be provided by users without them checking the website that allegedly sent the email.

Best Practices for Preventing Phishing Attacks

Here are some best practices to prevent different types of phishing:

Train Your Employees

Educating your employees is the first step you should take to prevent phishing attacks, after all, unprepared people are an easy target for malicious agents. Nevertheless, the training offered must go beyond the traditional approach and include recent and sophisticated threats.

Use Email Filters

Usually associated with spam, email filters go beyond this capability and indicate threats related to phishing attacks. In practice, using an email filter can prevent the user from receiving a large number of phishing emails.

Ensure Protection Against Malicious Websites

Knowing that organizations are filtering emails to prevent phishing, cybercriminals have been attacking website codes. 

So, you must install website alerts in browsers so that they point out possible risks to end users.

Limit Internet Access

Another way to reduce the risks associated with malicious websites is to create access control lists, which deny the connection to certain websites and applications to everyone who tries.

Require the Use of Multi-factor Authentication

One of the main goals of cybercriminals is to steal users’ credentials, a risk that can be reduced by using multi-factor authentication (MFA). 

In practice, this mechanism requires the user to use two or more items to authenticate themselves by combining something they know (such as a password), something they have (such as a token), and something associated with who they are (such as fingerprint or facial recognition).

Remove Fake Websites

You can count on solutions that monitor and eliminate counterfeit versions of your website. This way, you can prevent your employees and customers from clicking on malicious links.

Back Up Regularly

It is very common for phishing attacks to be associated with malware, including ransomware, which can impact the productivity of your business if you do not have a data backup program.

senhasegura GO Endpoint Manager: The Solution to Protect Against Phishing Attacks

One of the most effective solutions to prevent different types of phishing is senhasegura GO Endpoint Manager, which allows you to protect computers remotely connected to Windows and Linux endpoints. 

This tool:

  • Allows you to control lists of authorized, notified, and blocked actions for each user, reducing threats related to the installation of malicious software and privilege abuse;
  • Ensures compliance with regulations such as PCI, ISO, SOX, GDPR, and NIST;
  • Enables provisioning and revocation of access for privileged local users, without having to install any agent on the target device;
  • Records all requests for the use of administrative credentials in session logs; and
  • Allows the segregation of access to confidential information, isolating critical environments and correlating environments.

About senhasegura

senhasegura guarantees the digital sovereignty of organizations. This is because it acts by avoiding the traceability of actions and loss of information on devices, networks, servers, and databases.

Our services are also useful to bring our customers into compliance with audit criteria and strict standards such as PCI DSS, Sarbanes-Oxley, ISO 27001, and HIPAA.

Conclusion

In this article, you saw what phishing is, how this cyberattack works, what the different types of phishing are, and how to identify them. We have also shown the features of senhasegura GO Endpoint Manager and how it contributes to avoiding this threat.  

Do you need this solution in your company? Contact us.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×