Cyber issues, by their very nature, are constantly evolving, challenging insurers to keep pace. Looking at the 2022 figures alone, cyberattacks have increased by an average of 40%, allowing threat actors to exploit weeks, days or even hours of attacks for rapid reconnaissance. increase.
In fact, the statistics are eye-catching and staggering. According to Zscaler, phishing attacks worldwide have increased by 29%, reaching a new record of 873.9 million attacks. This is in the face of continued remote work that leaves corporate and personal devices increasingly at risk, especially if users don’t have enterprise-level cybersecurity at home.
Cybersecurity vulnerabilities, coupled with increasingly connected personal devices, have provided attackers with many advantages. For example, according to TeleSign, 9 out of 10 of her consumers feel their online information is more secure, multi-factor authentication (MFA) helps attackers reverse her proxy tools and phishing service platforms. , mitigating the damage. effect. A new technique has been developed to steal authentication tokens and bypass MFA on his mainstream websites such as Facebook, Google, GoDaddy, and PayPal.
Then there are services such as EvilProxy. This allows a low-skilled attacker with no technical expertise to steal his otherwise well-protected account online. When the victim connects to the phishing page using Reverse-Her’s proxy, the attacker displays a legitimate login form, forwards the request, returns a response from the company’s Her website, and uses the session cookie to You can access your account. The difference between traditional phishing frameworks and EvilProxy is that the latter is much easier to deploy, with detailed instructional videos and tutorials, a user-friendly graphical interface, and a large selection of cloned phishing pages for popular Internet services. to provide.
Growing Phishing Scams – From Email to Call Centers
Recently, a new approach was developed in which call centers are used to deliver some of the most harmful Windows malware. It starts with a phishing email, but changes from there to new distribution methods. Uses telephone call centers to distribute malicious Excel documents that install malware.
Instead of attaching attachments to emails, BazarCall’s emails prompt users to call a phone number to cancel their subscription before being automatically charged. These call centers then direct users to a specially crafted website to download a “cancellation form” that installs the BazarCall malware.
All attacks begin with phishing emails aimed at corporate users, claiming that the recipient’s free trial period is about to expire. When the recipient calls the phone number provided, they will be greeted by a real representative. When asked for more information and how to cancel the subscription, the call center agent directs the user to her fake website, puts the victim on the phone, and the user downloads and executes malware on the victim’s computer. It guides you through the fake cancellation process.
The industrialization of various attack methods and the use of live operators are emerging trends in attacks against businesses and individuals. Unfortunately, despite concerted efforts by the cybersecurity community, these distribution methods have been very successful.
how to get help?
At BOXX, through our dedicated team of Hackbusters, we are dedicated to simplifying your cyber insurance journey. Hackbusters’ mission is to fight cybercrime through prediction, prevention and recovery. At its core, our model is designed to protect clients who run the Canadian economy and create value for their communities.
The Hackbusters journey begins by working with clients during onboarding to anticipate what the cyberthreat landscape might look like. This is done by obtaining key information about the client, its industry, his presence online, domain, and checking that information against DarkWeb databases. Each client is then given a unique score in categories hackbusters can monitor such as network security, DNS health, patching frequency, endpoint security, hacker chatter, leaked information, and social engineering exposure. .
Prevention is almost as important as prediction. Prevention begins when the client is onboarded. Our technology-driven platform ingests newly onboarded client data, automatically updates client scores, notifies hackbusters when a client is mentioned on the dark web, and notifies about the latest attack vectors to generate This means that the Hackbusters team is keeping your cyber security safe while you focus on building your business, helping your community, or enjoying your weekend.
In the event of a cyber event, BOXX Hackbusters is available 24/7 to provide professional service and support when you need it most. Working closely with nationally recognized privacy and security experts, our Hackbusters team is on our client’s side every step of the way.
We know that our clients are generally small to medium sized businesses or individuals running small businesses. In many cases, they never had cyber insurance or were unaware of it before they had cyber insurance. This means that most of the time they called first because they needed advice or help. That advice and assistance should not risk compromising their claims-free record. That is why Hackbusters provides each client with up to three hours of dedicated breach advice and privacy regulation assistance, ensuring that every situation is covered. Relax. In 2021 alone, this has resulted in 80% of reported cyber events being handled and mitigated within 3 hours of him and no formal claims being made. This means that our clients are refocusing on doing their best while we do our best.
Neal Jardine combines 10 years of commercial insurance coordination skills with a bachelor’s degree in computer science to become a leader in cyber risk management, cyber post-attack mitigation, and cyber claims management best practices.
He is an internationally recognized leader in responding to complex cyberattacks such as ransomware negotiations, privacy breaches and data loss. Neil has adjusted insured and uninsured losses resulting from more than 300 of his cyberattacks and breaches internationally including Asia, US, Canada and Europe. He is a distinguished expert who has introduced brokers, corporations and insurers to issues related to cyber insurance and cyber risk management, helping a wide range of industries to understand pre- and post-loss management and response to cyber events. doing.
From phishing emails to call centers…
Source link From phishing emails to call centers…