Training

Cyber persuasion techniques

by Mark Rowe

Cybercriminals use persuasion techniques to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money or valuable data. That is according to a new report from Intel Security and endorsed by the European Cybercrime Centre at Europol, that goes into the latest persuasion techniques.

The report comes days after more than 100 banks worldwide are said to have been hit with malware which inflicted an estimated $1 billion in damage. Bank computers and networks were breached by targeted phishing attacks, showing the report authors suggest inherent weakness in the “human firewall” and the need to educate employees about the top persuasion techniques in use in the digital world.

Raj Samani, EMEA CTO at Intel Security and advisor at Europol’s European Cybercrime Centre, said: “The most common theme we see when investigating data breaches today, is the use of social engineering to coerce the user into an action which facilitates malware infection.”

Paul Gillen, Head of Operations at the European Cybercrime Centre at Europol said: “Cybercriminals today do not necessarily require substantial technical knowledge to achieve their objectives. Some well-known malicious tools are delivered using spear-phishing emails and rely on psychological manipulation to infect victims’ computers. The targeted victims are persuaded to open allegedly legitimate and alluring email attachments or to click on a link in the body of the email that appeared to come from trusted sources.”

McAfee Labs identified a rise in the use of malicious URLs with more than 30 million suspect URLs identified towards the end of 2014. The increase is attributed to the use of new short URLs, which often hide malicious websites, and a sharp increase in phishing URLs. These URLs are often ‘spoofed’ to hide the true destination of the link and are frequently used by cybercriminals in phishing emails to trick employees. With an estimated 18pc of users targeted by a phishing email falling victim and clicking on malicious link, the increased use of these tactics is cause for concern, according to the report.

Some 500 researchers at McAfee Labs point to the fact that two-thirds of all global email is now spam that aims to extort information and money from the recipient. Samani added: “Today, cybercriminals have become expert at exploiting the subconscious of a trusted employee, often using many of the ‘selling’ tactics we see in everyday life. Businesses must adapt and employ the right mix of controls for ‘People, Process and Technology’ to mitigate their risk.”

Intel Security’s ‘Hacking the Human OS’ report lists ‘Six Levers of Influence’ in the digital world:

1. Reciprocation: When people are provided with something, they tend to feel obligated and repay the favour

2. Scarcity: People tend to comply when they believe something is in short supply eg. a ‘spoof’ email claiming to be from your bank asking the user to comply with a request or else have their account disabled within 24 hours

3. Consistency: Once targets have promised to do something, they usually stick to their promises because people do not wish to appear untrustworthy or unreliable. For example, a hacker posing as a company’s IT team could have an employee agree to abide by all security processes, and then ask him / her to perform a suspicious task supposedly in line with security requirements

4. Liking: Targets are more likely to comply when the social engineer is someone they like. A hacker could use charm via the phone or online to ‘win over’ an unsuspecting victim

5. Authority: People tend to comply when a request comes from a figure of authority. This could be a targeted email to the finance team that might appear to come from the CEO or President; and

6. Social Validation: People tend to comply when others are doing the same thing. For example, a phishing email might look as if it’s sent to a group of employees, which makes an employee believe that it must be ok, if other colleagues also received the request.

Related News

  • Training

    Officer training afternoon

    by Mark Rowe

    Mercury Training Services, with Skills for Security (SfS) and JobCentre Plus, is offering funded security training for new entrants into the industry…

  • Training

    Police recruiting leaders

    by Mark Rowe

    The College of Policing has launched two new recruitment programmes to bring people with what the college terms more diverse backgrounds and…

  • Training

    IED demo zone

    by Mark Rowe

    The threat from Improvised Explosive Devices (IEDs) remains potent, whether on the battlefield, in public transport and within urban areas, according to…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing