A recent cyber-attack threatening all types of businesses occurred this month. Using Microsoft Teams and other malicious techniques, ransomware was deployed on the targeted networks to extract sensitive information for payment.
Using a technique called Email Bombing, attackers send through thousands of emails to employee inboxes within minutes. The goal is to create worry and panic within the company so the malicious actors can move in undetected. Once gaining the attention of the targeted business, they exploited Microsoft Teams' default setting, which allow users to interact with people outside the organisation. Then, posing as IT support personnel on Microsoft Teams, assistance is offered to resolve the email spam issue. Trusting the legitimacy of the IT support, employees began to grant remote access to their systems, allowing the attackers to plant ransomware freezing networks and extracting sensitive data for ransom demands.
While specific company names have not been confirmed, cybersecurity company Sophos has identified 15 incidents in the past three months, half of which happened in the past fortnight. Organizations have implemented measures to combat these types of attacks:
1. Block the Outsiders. Companies updated their Teams Settings to restrict/block outside communication. This tiny change can be the difference between attackers being spotted or a successful.
2. Train the Team. Employees received crash courses on spotting scams. These scams are easily noticeable but only if you know what to notice.
3. Eyes on the Prize. Ramp up monitoring to catch suspicious activity early, before hackers do damage. This is the ultimate win for cybersecurity mitigation techniques.
These are emerging as a significant challenge in cyberspace. Cybercriminals are using artificial intelligence to increase the sophistication and overall threat-level of their attacks.
These attacks can automate key aspects of an attack, craft convincing phishing schemes and even adapt in real-time to circumvent security measures. This means traditional defences may no longer work, calling for more intelligent and adaptable cybersecurity solutions.
This is increasingly becoming a 'go-to' tool for cybercriminals and the number of deep-fake tech attacks has risen by 550%.
Using new deep-fake tech to create realistic fake videos, images, or audio that mimics real people, often makes it difficult to distinguish from genuine content. This allows malicious individuals to ransom targets with fake content for money or reputational damage.
Impersonation Risk. Hackers are using platforms like Teams and Apple services to impersonate support and steal personal
information.