• Advertising
  • Disclaimer
  • Copy Right
  • Contact us
  • About us
WTM News
Web Hosting and Linux/Windows VPS in USA, UK and Germany
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
  • Home
  • entertainment
    • All
    • games
    • movies
    • music
    • sports
    '1899': The creators assure that they are already working on the next seasons and a possible ending

    ‘1899’: The creators assure that they are already working on the next seasons and a possible ending

    Las películas españolas que más esperamos en 2023

    Las películas españolas que más esperamos en 2023

    From 'Appointment in St. Louis' to 'Fifteen Days of Pleasure': 10 Great Christmas Musicals in Film History

    From ‘Appointment in St. Louis’ to ‘Fifteen Days of Pleasure’: 10 Great Christmas Musicals in Film History

    'Dreamland' review, by Jason Momoa on Netflix

    ‘Dreamland’ review, by Jason Momoa on Netflix

    Review, 'Kings vs. Santa': Family Christmas spirit with a thug twist

    Review, ‘Kings vs. Santa’: Family Christmas spirit with a thug twist

    release date, cast, synopsis

    release date, cast, synopsis

  • business
    • All
    • startups
    How to Buy Cryptocurrency

    How to Buy Cryptocurrency

    The first retail site in the Middle East

    The first retail site in the Middle East!

    Submit your projects to duty cope professional freelancers!

    Submit your projects to duty cope professional freelancers!

    bitumen 60/70

    Iran Bitumen

    Study Smart: Tips and Tricks to Ace the GED Test

    Study Smart: Tips and Tricks to Ace the GED Test

    Things to Remember When Taking the GED Math Test

    Things to Remember When Taking the GED Math Test

    DutyCope is the newest freelance platform

    Dutycope is the newest freelance platform

    What plans does NASA have to continue working with Russia?

    What plans does NASA have to continue working with Russia?

    Dutycope, the introduction of one of the best freelance sites

    Dutycope, the introduction of one of the best freelance sites

  • Technology
    • All
    • apps
    • gadget
    • mobile
    profesiones tecnológicas tecnología circular

    Circular technology: this is how it will evolve

    Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

    Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

    Roberto Lopez Familia Martínez

    Interview with Roberto López, Corporate CTO Familia Martínez

    Cloudera Data Platform One

    Cloudera Data Platform One, accessible data analytics

    Cloud services to solve complex IT problems

    SAP deploys the first public cloud project at Cepsa

    appian world data fabric

    Appian joins the Low-Code Data Fabric

    Trending Tags

  • lifestyle
    • All
    • foods
    • health
    • travel
    Body Contouring

    Common Types of Body Contouring Methods

    Cyruscrafts decorative handicrafts

    Iranian Decorative Handicrafts

    3 Days in Dubai – Where to Visit in Dubai

    3 Days in Dubai – Where to Visit in Dubai

    Ata Ghotbi and the road to success

    Ata Ghoutbi and the Road to Success

    5 ways to open frozen pipes without damaging the pipe

    5 ways to open frozen pipes without damaging the pipe

    Why is it better not to use toilet paper?

    Why is it better not to use toilet paper?

    Trending Tags

  • Review
    Review of the first part of the fifth season of the Money Heist series

    Review of the first part of the fifth season of the Money Heist series

    Introduction of Solar Ash game

    Introducing and reviewing the interesting game Solar Ash

    Review Huawei WATCH FIT smartwatch

    Review Huawei WATCH FIT smartwatch

  • Videos
No Result
View All Result
WTM News
No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos
Home Technology

The most imaginative phishing attacks

News writer by News writer
July 29, 2022
in Technology
7 0
A A
0
Gobierno e Ibex, desprotegidos frente a posibles ataques de phishing

The most imaginative phishing attacks

153
SHARES
235
VIEWS
Share on FacebookShare on Twitter

The most imaginative phishing attacks
is the headline of the news that the author of WTM News has collected this article. Stay tuned to WTM News to stay up to date with the latest news on this topic. We ask you to follow us on social networks.

Government and Ibex, unprotected against possible phishing attacks

Phishing attacks have increased exponentially in recent years. According to recent studies, phishing attempts, for example via email, accounted for nearly half of all emails sent in 2021.

From this perspective, the termphishing” has become tremendously popular. There isn’t a day that we don’t wake up to news about an attempt to phishing anonymous companies or citizens through increasingly imaginative mechanisms.

Phishing and social engineering

In phishing attacks, the phishing and social engineering they play a fundamental role. Not surprisingly, cybercriminals make use of false identities based on the human sensitivity and the needs that people they have at all times.

When the subject that concerned us was the tax return, the “messages from the Ministry of Finance” were the main focus of phishing attacks; When we were focused on the pandemic, messages related to health, in all its aspects —products, public bodies, security, etc.— were the ones that caught the attention of cybercriminals. Now that the war in Ukraine puts the lack of supplies or freedom of expression at risk, it is more than possible that cybercriminals pose as NGOs or even journalists.

Generic phishing techniques

The objective is always to get the victim to carry out some action that allows the cybercriminal to obtain some type of benefit, be it in the form of an economic transaction, access to information or control of computer systems.

Starting from this premise, the action of the victim becomes one of the key steps when a phishing attack achieves its objective. For this reason, the strategies used by cybercriminals make use of techniques that are increasingly more imaginative.

Below, we collect some of those techniques that have been, and are, used by criminals in phishing attacks. Is about ingenious, little-known techniqueswhich are sometimes particularized for sectors or groups of people but which share a common pattern in their way of acting.

Targeted searches

Users’ suspicion of links in emails has led cybercriminals to resort to alternative mechanisms to gain the trust of their victims.

Phishing techniques have been detected that make use of Google search recommendations that are directed at deliberately prepared websites that have previously achieved high suitability ratings using SEO positioning techniques.

Cybercriminals spend part of their time getting websites that act as bait to appear at the top of searches for certain terms, for example, from Google. In this way, when they subsequently make a recommendation to their victims about a certain concept or term, they will be directed to the destination specially prepared to act as a decoy.

Exclusive encrypted information for the recipient

The distrust of a victim is fought using precisely the concern for trust.

Phishing techniques have been detected that make use of Google search recommendations

From here, cybercriminals try to convince their victims with access to resources apparently encrypted and personalized for them. In this way, the recipients perceive a false sense of security. The cybercriminal invites them to use sensitive information, such as username and password, as a decryption mechanism. The confusion between Concepts such as “encryption keys” and “information access keys” plays a fundamental role in the success of this type of technique.

The usual thing about these attacks is that, Through an email, the criminal convinces his victim, for example, that a file contains encrypted confidential information and that only he or she could decrypt by entering their username and password; something totally impossible to accomplish and that can be confused with public-private key cryptography management.

MFA for undefined uses

The use of double authentication mechanisms is increasingly widespread. The financial sector, for example, in compliance with European PSD2 regulations, uses it on a regular basis. But he’s not the only one. Increasingly, email accounts, access to commercial applications or even social networks implement double authentication mechanisms that reduce risk that password theft can lead to.

For this reason, cybercriminals resort to MiTM techniques through which they make the victims believe that an event has occurred for which they will be sent an authentication code that they must provide.

The reality is that said code does not correspond to the operation that the victim believes to executerather it serves the cybercriminal to access a service without the victim being aware of it.

There are many examples of the use of this type of technique. One of the most obvious is a message indicating that an email account or a bank account has been blocked. Next, the victim is asked to provide the verification code that will be sent to him as proof of identity for his unlocking. Immediately afterwards, the victim will receive a verification code, sent by the real service that the cybercriminal wants to access, and that the user will provide to the criminal if necessary. The end result is known to all.

Microsoft, medium and form

Another technique used by cybercriminals is based on Microsoft tools to confuse victims.

Perhaps the most representative example can be found in how cybercriminals invite download a file from OneDrive to the victim while at the same time presenting him with a custom-made form from Microsoft tools.

The fact that the Internet domains that appear in the form are the same as those provided by Microsoft, acting as a “security guarantee” against the victim. The objective is that the victim does not detect that they are not actually accessing a cloud storage service, but rather completing a form that will immediately be sent to the cybercriminal for exploitation.

And we could go on…

Sure, we could extend the list of phishing attack techniques as much as we wanted; but they will all have a common denominator: social engineering will play a predominant role during the process. In fact, it is a key element. An element that can only be combated through continuous awareness of the users themselves.

And it is that, now that the Artificial Intelligence techniques or the blockchain have acquired greater prominence, the field of action for cybercriminals is very likely to grow at exponential rates. concepts related to thedeepfakes” or the “ice phishing” will appear more and more in specialized media, highlighting new models of phishing attacks.

The conclusion in the face of this reality therefore seems obvious: we must remain constantly alert to this reality. It would be naive to think that, with these resources, cybercriminals will not be able to define new techniques, even more imaginative ones, with which they will try to continue deceiving us.

By Juanjo Galán, Business Strategy at All4Sec

Source: revistabyte.es

Tags: Attacksimaginativephishing
Previous Post

Silvina Batakis: The Minister of Economy of Argentina submits her resignation after 24 days in office

Next Post

Lizz Truss sees victory in the race to elect the Conservative who will govern the United Kingdom soon | International

News writer

News writer

I try to find the best news for you and publish it on WTM News. Follow my articles to become an up-to-date person!

Related Posts

profesiones tecnológicas tecnología circular
Technology

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology
Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Roberto Lopez Familia Martínez
Technology

Interview with Roberto López, Corporate CTO Familia Martínez

November 23, 2022
Cloudera Data Platform One
Technology

Cloudera Data Platform One, accessible data analytics

November 22, 2022
Cloud services to solve complex IT problems
Technology

SAP deploys the first public cloud project at Cepsa

November 22, 2022
appian world data fabric
Technology

Appian joins the Low-Code Data Fabric

November 22, 2022
Next Post
Lizz Truss sees victory in the race to elect the Conservative who will govern the United Kingdom soon |  International

Lizz Truss sees victory in the race to elect the Conservative who will govern the United Kingdom soon | International

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Tesla's new update notifies the driver of tire wear

Tesla’s new update notifies the driver of tire wear

December 16, 2021
'Stranger Things': Jamie Campbell Bower opens up about her secret role for the first time

‘Stranger Things’: Jamie Campbell Bower opens up about her secret role for the first time

May 31, 2022
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

July 24, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

July 25, 2021
Introduction of Solar Ash game

Introducing and reviewing the interesting game Solar Ash

0
Added the ability to check voice messages before sending to WhatsApp!

Added the ability to check voice messages before sending to WhatsApp!

0
Time Magazine introduced Elon Musk as the character of 2021!

Time Magazine introduced Elon Musk as the character of 2021!

0
Review of the first part of the fifth season of the Money Heist series

Review of the first part of the fifth season of the Money Heist series

0
At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Latest News

At least one dead and 19 injured by two explosions at bus stops in Jerusalem |  International

At least one dead and 19 injured by two explosions at bus stops in Jerusalem | International

November 23, 2022
profesiones tecnológicas tecnología circular

Circular technology: this is how it will evolve

November 23, 2022
Elon Musk's biographer: "For him, chaos is standard operating procedure" |  Technology

Elon Musk’s biographer: “For him, chaos is standard operating procedure” | Technology

November 23, 2022
Li Qiang, Xi Jinping's loyal lieutenant |  International

Li Qiang, Xi Jinping’s loyal lieutenant | International

November 23, 2022

Suggest application sites

Weltnachrichten

Nachrichten Star

Dutycope

Freelance sites

Bitrogen

News Pro

Arabic news

Buy sponsor post

WTM News

WTM News is a smart magazine that collects new and important technology news of the world for you from all over the web.
Our goal is to compile the best news so that you can more easily get the latest technology news in the world.

Follow us

News Categories

  • apps
  • business
  • entertainment
  • Environment
  • foods
  • gadget
  • games
  • health
  • lifestyle
  • mobile
  • movies
  • music
  • News
  • Other
  • Review
  • science
  • sports
  • startups
  • Technology
  • travel
  • Videos

Freelancer | Logo design | Hervess | Nachrichten Star | News Pro | Arabic news

Buy sponsor post

latest news

Review of the first part of the fifth season of the Money Heist series

The fifth season of Money Heist series

The points given are based solely on the personal taste of
Introduction of Solar Ash game

Solar Ash game

Score against the average score of this game on the site

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

No Result
View All Result
  • Home
  • entertainment
  • business
  • Technology
  • lifestyle
  • Review
  • Videos

WTM NEWS Magazine is just a portal for republishing news in various fields. All news will be placed on the site by mentioning the source. WTM NEWS has no legal responsibility for the accuracy of the news and articles and only reposts the news. © 2022 WTM NEWS

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist