May 05 2024

68% Of Data Breach Occurs Due To Social Engineering Attacks

Category: social engineeringdisc7 @ 9:40 am

In the latest edition of Verizon’s Data Breach Investigations Report (DBIR) for 2024, a concerning trend has been highlighted, a significant 68% of data breaches are now occurring due to social engineering attacks.

This revelation underscores the increasing sophistication and prevalence of these tactics in the cyber threat landscape.

Social engineering exploits the human factor, manipulating individuals into breaking normal security procedures.

The DBIR’s findings suggest that despite advancements in technology, human vulnerabilities remain a critical weak point.

The report indicates that phishing, pretexting, and other forms of social engineering are not only prevalent but are also becoming more sophisticated.

Breakdown of breaches by attack type
Breakdown of breaches by attack type

Verizon’s 2024 DBIR has revised its methodology to provide clearer insights into breaches involving the human element.

It excludes cases of malicious privilege misuse to focus on incidents that could potentially be mitigated through improved security awareness and training.

The Role Of Ransomware And Extortion

The report also sheds light on the role of ransomware and extortion in the cybersecurity threat landscape.

Approximately one-third of all breaches involved these tactics, with pure extortion attacks marking a significant rise over the past year.

This shift indicates a strategic evolution among cybercriminals, who are increasingly leveraging ransomware and extortion to capitalize on their attacks.

Breakdown of breaches by attack type.
Breakdown of breaches by attack type.

The combination of ransomware and other forms of extortion has been particularly impactful, affecting 32% of breaches and being a top threat across 92% of industries surveyed.

This highlights the critical need for organizations to enhance their defensive strategies against these forms of cyberattacks.

Third-Party Vulnerabilities And Preventive Measures

An expanded concept of breaches involving third-party entities was introduced in this year’s report.

This includes incidents where partner infrastructure is compromised or where indirect software supply chain issues occur.

The report notes a 68% increase in such breaches, primarily fueled by zero-day exploits used in ransomware and extortion attacks.

                                            68% increase in such breaches
                                            68% increase in such breaches

This finding emphasizes the importance of diligent vendor selection and the need for organizations to prioritize security in their supply chains.

By choosing partners with robust security measures, companies can significantly mitigate the risk of being compromised through third-party vulnerabilities.

Verizon’s 2024 DBIR provides a stark reminder of the persistent and evolving threats in the digital world.

With a significant portion of breaches attributable to social engineering, the human element continues to be a critical battleground in cybersecurity.

Organizations must prioritize comprehensive security training and robust protocols to safeguard against these insidious attacks.

Meanwhile, the rise of ransomware and extortion, along with the vulnerabilities in third-party partnerships, calls for an urgent reassessment of current security strategies and vendor management practices.

Social Engineering: The Science of Human Hacking

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot

Tags: Social Engineering Attacks, Social Engineering: The Science of Human Hacking

Feb 02 2022

Massive social engineering waves have impacted banks in several countries

Category: social engineeringDISC @ 9:39 am

A massive social engineering campaign targeting banks has been delivered in the last two years in several countries.

A massive social engineering campaign has been delivered in the last two years in several countries, including Portugal, Spain, Brazil, Mexico, Chile, the UK, and France. According to Segurança Informática publication, the malicious waves have impacted banking organizations with the goal of stealing the users’ secrets, accessing the home banking portals, and also controlling all the operations on the fly via Command and Control (C2) servers geolocated in Brazil.

In short, criminal groups are targeting victims’ from different countries to collect their homebanking secrets and payment cards. The campaigns are carried out by using social engineering schemas, namely smishing, and spear-phishing through fake emails.

Criminals obtain lists of valid and tested phone numbers and emails from other malicious groups, and the process is performed on underground forums, Telegram channels or Discord chats.

social engineering

The spear-phishing campaigns try to lure victims with fake emails that impersonate the banking institutions. The emails are extremely similar to the originals, exception their content, mainly related to debts or lack of payments.

According to the analysis, the malicious campaign consists of a redirector system, capable of performing an initial screening to verify that the users’ requests are valid and expected. The system is equipped with a blacklisting mechanism and a logging feature that notifies criminals of new infections.

When the victim matches all the rules, several pathways are possible, with different landing-pages. Some of them only collect raw data, including the homebanking credentials, SMS tokens and bank codes. On the other hand, a well-structured C2 server can be used to orchestrate all the processes in real-time, simulating a flow extremely similar to the legitimate service.

As phishing and malware campaigns make headlines every day, monitoring these types of behaviors and IoCs is crucial to fighting this emerging segment, which  has grown in both volume and sophistication.

Additional details about the investigation can be found here:

Social Engineering: The Science of Human Hacking

Tags: social engineering, Social Engineering: The Science of Human Hacking