Cyber Crime Methods Are Evolving

The cybercrime landscape is changing fast as criminals alter their operating strategies, develop new tools and techniques and take advantage of changes in consumer and business behavior. 

Mobile telecoms are vulnerable to cybercriminals as its popularity as a banking and e-commerce channel grows and more services become available via mobile apps. Criminals are also learning to exploit the fast-growing Internet of Things (IoT) market  by exploiting poor password practices to hijack  IoT devices.  

In addition, industry standards and global regulations are driving a digital transformation, yet opening up new points of vulnerability that have the potential to be exploited.

These techniques are used everywhere; in the workplace, on the commute, at the coffee shop and even in our bedrooms, social media has become a key component of modern life. 

Shielded by anonymity and with plenty of scope to uncover valuable information and catch employees off-guard, social networks are increasingly invaluable tools for cyber criminals, and often the first place they will go to gather intelligence on a target organisation. According to RSA, social media may be the fastest-growing communication channel for cyber criminals. Over six months, it observed a 70% growth in the volume of visible fraud activity on social media. So how can businesses protect themselves from the growing threat?

Understanding the Risks

The best way to mitigate cyber security risk is to understand how social media can be misused and identify known and unknown vulnerabilities. With a better understanding of the threats, stakeholders at all levels of the organisation will be more alert and informed, making the business less susceptible to the growing threat from social media cyber-crime.

Who works where, who reports into whom, what language and expressions do individuals use in posts and emails – there is a lot that cyber criminals can learn from social media accounts.

From a phishing attack to social engineering, there are plenty of methods of exploiting day-to-day business activity and using employees as the access points for attacks on organisations. Whether that’s trying to infect a network with malware, steal credentials or gain access to the building. Social engineering, for example, is widely used. Many people will accept friend requests on social media from people they don’t know, particularly if they’re attractive in their photograph, meaning cyber criminals don’t even have to impersonate a real person to access information being shared, target others in their network and gather meaningful intelligence.

As well as creating new identities, cyber criminals may also impersonate real individuals who either do not use, or are rarely active on social media, to target known friends, associates or the organisations they work for.

It’s not just individual employees that are potential informants; the company may unwittingly betray itself online by sharing too much information. This could be images that allow attackers to identify access control systems, the location of CCTV cameras, or posts about the suppliers and vendors they use. Cyber criminals can find this out by identifying who the company likes and follows on social media and who likes and follows them back.

Creating a Security Culture

With so many avenues into the organisation through social media, security awareness is paramount. Any individual in any role can be exploited as a weak link in an organisation’s armour, making it more important than ever to build an organisation-wide, security-aware culture with a clear understanding and appreciation of social media cyber risks.

Ultimately, it is staff that are interacting with pages, posts and clicking on links who, if they are properly trained, will be aware of the threats and able to identify them, they will inevitably be less likely to unwittingly give away information or expose the business to attack.

User training should be structured and ongoing, providing a continuous stream of information about the latest threats, what to look out for, and best practices to employ. It should also include simulations on a regular basis to improve staff understanding of the different types of attacks and how convincing cyber criminals can be in a safe setting.

As well as highlighting social media-linked threats, phishing emails and a range of other threats, a best-practice approach will also build in other protection methods such as multi-factor authentication, password managers, keeping browsers up to date and only using reputable plug-ins.

More sophisticated organisations will also undertake red team assessments to catch the business off-guard. This is a full-attack simulation that focuses on attacking all areas of the organisation, both through physical and cyber measures, making it an extremely effective way to test and build resilience.

Acting the part of cybercriminals, security experts will attempt to breach networks and systems, employ social engineering tactics via email, social media and in person, and will also try to gain physical access to premises and devices to expose and highlight vulnerabilities. Red teaming may also be goal-led and focus on testing bring-your-own (BYO) devices to gain access to the corporate network.

In a recent exercise, employees were sent a message from someone posing as a member of the organisation’s IT team. The email stated that one of the employee’s social media posts had breached corporate guidelines and had to be taken down immediately.

The email contained a link to the offending post (which of course was not a link to the non-existent article by embedded malware) prompting an immediate and emotional reaction from employees who were nervous about what they had posted and clicked on the link.

Damage Limitation

While awareness building, risk assessments and audits will go a long way to prevent cyber security threats, organisations must assume that an attack will happen. It’s no longer a case of if but when and organisations should focus on building cyber security resilience so that they can mitigate risk by ensuring that the business knows how to respond to specific threats.

In today’s digital society, any interactions on social media may be seized upon and exploited by cyber criminals. As with all threats, forewarned is forearmed, making employee awareness a must.

By working with an accredited cyber security specialist to develop a robust training programme, businesses can mitigate the potentially damaging consequences to the organisation, its reputation, and its balance sheet.

RSA:      TechNative:       Telegraph

You Might Also Read: 

Why An Effective Security Culture Is Essential For Your Organisation:



 

« The Global Cyber Security Market Will Be Worth $280b By 2027
US Increases Pressure To Stop Huawei 5G In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

SecurityHQ

SecurityHQ

SecurityHQ (formerly known as Si Consult) is a Global Managed Security Service Provider (MSSP) that monitors networks 24/7, to ensure complete visibility and protection against your cyber threats.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.