Artwork

Daily Security Review에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Daily Security Review 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

AI-Generated Phishing and Deepfakes Supercharge Social Engineering Attacks

1:01:18
 
공유
 

Manage episode 506826425 series 3645080
Daily Security Review에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Daily Security Review 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help desks, smishing, and polished impersonation. These campaigns pair urgency, intimidation, and empathy ploys with modern twists like deepfake audio/video and LLM-written lures that mirror a target’s tone, role, and business context. Once a foothold is gained, operators ride legitimate tools (PowerShell, RDP, admin consoles), blend into normal traffic, and quietly harvest high-value data.

Meanwhile, ransomware has evolved from smash-and-grab encryption to multi-stage extortion. The Ransomware-as-a-Service (RaaS) and broader Cybercrime-as-a-Service (CaaS) markets have slashed barriers to entry: core developers lease turnkey kits, affiliates handle intrusion and extortion, and specialists sell initial access, phishing kits, or data leak hosting. Tactics now include data theft before encryption, countdown leak sites, direct calls to victims and their customers, public shaming, and even leveraging mandatory incident-reporting laws to increase pressure. Technical tradecraft has kept pace: dual-strain deployments, remote/hybrid encryption, uncommon languages to dodge signatures, and “living off the land” to evade EDR.

A headline development is the consolidation of high-impact crews into the “Scattered LAPSUS$ Hunters”—an identity-centric operation that perfects the art of help-desk social engineering, MFA fatigue, SIM swapping, and OAuth consent abuse to capture credentials and session tokens. Post-compromise, they move fast: disabling EDR, exfiltrating from SharePoint, code repos, and cloud data lakes (think Snowflake and Amazon S3), even abusing backup tooling for stealthy transfers. The result is a repeatable pipeline from initial phone call to full enterprise data theft. Despite a public “going dark” message, analysts expect quiet continuity or rebranding.

Layered atop financially motivated crews are state-sponsored operators from China, Russia, and Iran, who blend espionage, IP theft, and influence ops with social engineering to seed access in critical sectors. They pivot through edge devices (VPNs, firewalls), route traffic via compromised domestic infrastructure to avoid scrutiny, and exploit the global vendor concentration of cloud and SaaS providers—turning a single supplier weakness into systemic risk.

What actually works against all this? Start with people. Targeted, scenario-based security awareness (vishing drills, help-desk playbooks, deepfake recognition) remains the highest-ROI control. Pair it with strong identity security: phishing-resistant MFA (FIDO2/WebAuthn), tight help-desk identity proofing, session management and token binding, rapid disablement paths, and least-privilege by default. Architect for failure with Zero Trust and segmentation, harden edge devices, and close the loop with intelligence-led hunting for RMM misuse, unusual admin activity, and data-exfil patterns. Finally, rehearse extortion-resilient incident response: legal, comms, and executive teams need scripts for leak-site deadlines, customer notifications, and negotiation decisions—before attackers make the first call.

Bottom line: social engineering is the reliable front door, ransomware is the business model, AI is the force multiplier, and consolidated, identity-focused crews are the operators. Defenders that invest equally in human, identity, and architectural controls will be the ones to break the kill chain.

#SocialEngineering #Phishing #Vishing #Smishing #Deepfakes #Ransomware #RaaS #CaaS #MFABypass #SIMSwapping #OAuthAbuse #LivingOffTheLand #DataExfiltration #DoubleExtortion #SupplyChainAttack #CriticalInfrastructure #ZeroTrust #SecurityAwareness #ThreatIntelligence #IncidentResponse #ScatteredLAPSUSHunters #China #Russia #Iran #LLM #AIEnabledAttacks #HelpDeskFraud #EDREvasion #BackupAbuse #VendorConcentration

  continue reading

368 에피소드

Artwork
icon공유
 
Manage episode 506826425 series 3645080
Daily Security Review에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Daily Security Review 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help desks, smishing, and polished impersonation. These campaigns pair urgency, intimidation, and empathy ploys with modern twists like deepfake audio/video and LLM-written lures that mirror a target’s tone, role, and business context. Once a foothold is gained, operators ride legitimate tools (PowerShell, RDP, admin consoles), blend into normal traffic, and quietly harvest high-value data.

Meanwhile, ransomware has evolved from smash-and-grab encryption to multi-stage extortion. The Ransomware-as-a-Service (RaaS) and broader Cybercrime-as-a-Service (CaaS) markets have slashed barriers to entry: core developers lease turnkey kits, affiliates handle intrusion and extortion, and specialists sell initial access, phishing kits, or data leak hosting. Tactics now include data theft before encryption, countdown leak sites, direct calls to victims and their customers, public shaming, and even leveraging mandatory incident-reporting laws to increase pressure. Technical tradecraft has kept pace: dual-strain deployments, remote/hybrid encryption, uncommon languages to dodge signatures, and “living off the land” to evade EDR.

A headline development is the consolidation of high-impact crews into the “Scattered LAPSUS$ Hunters”—an identity-centric operation that perfects the art of help-desk social engineering, MFA fatigue, SIM swapping, and OAuth consent abuse to capture credentials and session tokens. Post-compromise, they move fast: disabling EDR, exfiltrating from SharePoint, code repos, and cloud data lakes (think Snowflake and Amazon S3), even abusing backup tooling for stealthy transfers. The result is a repeatable pipeline from initial phone call to full enterprise data theft. Despite a public “going dark” message, analysts expect quiet continuity or rebranding.

Layered atop financially motivated crews are state-sponsored operators from China, Russia, and Iran, who blend espionage, IP theft, and influence ops with social engineering to seed access in critical sectors. They pivot through edge devices (VPNs, firewalls), route traffic via compromised domestic infrastructure to avoid scrutiny, and exploit the global vendor concentration of cloud and SaaS providers—turning a single supplier weakness into systemic risk.

What actually works against all this? Start with people. Targeted, scenario-based security awareness (vishing drills, help-desk playbooks, deepfake recognition) remains the highest-ROI control. Pair it with strong identity security: phishing-resistant MFA (FIDO2/WebAuthn), tight help-desk identity proofing, session management and token binding, rapid disablement paths, and least-privilege by default. Architect for failure with Zero Trust and segmentation, harden edge devices, and close the loop with intelligence-led hunting for RMM misuse, unusual admin activity, and data-exfil patterns. Finally, rehearse extortion-resilient incident response: legal, comms, and executive teams need scripts for leak-site deadlines, customer notifications, and negotiation decisions—before attackers make the first call.

Bottom line: social engineering is the reliable front door, ransomware is the business model, AI is the force multiplier, and consolidated, identity-focused crews are the operators. Defenders that invest equally in human, identity, and architectural controls will be the ones to break the kill chain.

#SocialEngineering #Phishing #Vishing #Smishing #Deepfakes #Ransomware #RaaS #CaaS #MFABypass #SIMSwapping #OAuthAbuse #LivingOffTheLand #DataExfiltration #DoubleExtortion #SupplyChainAttack #CriticalInfrastructure #ZeroTrust #SecurityAwareness #ThreatIntelligence #IncidentResponse #ScatteredLAPSUSHunters #China #Russia #Iran #LLM #AIEnabledAttacks #HelpDeskFraud #EDREvasion #BackupAbuse #VendorConcentration

  continue reading

368 에피소드

Wszystkie odcinki

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생