home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 329 of 2,445   
   Mike Powell to All   
   Cybercriminals cashing in   
   31 Jan 25 10:46:00   
   
   TZUTC: -0500   
   MSGID: 34.consprcy@1:2320/105 2c0227f8   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Cybercriminals cashing in on holiday sales rush   
      
   Date:   
   Fri, 31 Jan 2025 09:53:51 +0000   
      
   Description:   
   Attackers can now seamlessly impersonate colleagues, executives, and even   
   customers, making it harder for targets to identify a scam.   
      
   FULL STORY   
   ======================================================================   
      
   Cybercrime is a costly affair, with nearly 11.5 million stolen last Christmas   
   alone, according to the UK's National Cyber Security Centre. Thats 695 on   
   average per victim. With the festive season in full swing, the rush to snag   
   post-Black Friday bargains and buy Christmas gifts online has led to a sharp   
   rise in threat levels. For cybercriminals, this is the perfect opportunity to   
   deploy their latest techniques, targeting unsuspecting shoppers to steal    
   money and personal data.    
      
   UK Fraud Minister Lord Hanson issued a stark warning in November on the   
   dangers of holiday scams. However, the sheer volume of online interactions,   
   the sophistication of cyberattacks, and the increasing reliance on digital   
   shopping during the holiday season make it far more challenging to identify a   
   scam at first glance.   
      
   AI-Driven Phishing: More Deceptive Than Ever    
      
   Phishing has long been one of the most common forms of cybercrime, but the   
   emergence of AI has revolutionized the way these attacks are carried out.   
   Previously, phishing emails were easy to spot, often riddled with spelling   
   mistakes and strange phrasing. However, with AI, cybercriminals can now   
   analyze the communication styles of businesses, studying their marketing   
   emails and messages to replicate the tone, branding, and even the content of   
   legitimate communications.    
      
   Attackers can now seamlessly impersonate colleagues, executives, and even   
   customers, making it harder for targets to identify a scam. It has become   
   easierand cheaper than ever to undertake these targeted spear-phishing   
   attacks, which are much more likely to succeed.   
      
   AI and Human Behavior: Exploiting Vulnerabilities   
      
   AIs ability to analyze human behavior has also made it easier for   
   cybercriminals to exploit psychological triggers. By studying past   
   interactions and identifying patterns in behavior, attackers can craft   
   messages that play on an individuals emotions. For example, during the busy   
   holiday season, cybercriminals exploit the stress of missed package   
   deliveries. Imagine receiving a seemingly legitimate text from a courier   
   service, urging payment for redelivery. One victim, distracted and eager to   
   resolve the issue, entered card details on a convincing fake siteonly to   
   realize later the text came from an unknown mobile number, not the courier.   
   Its a reminder that vigilance cant take a holiday.    
      
   AI can also be used to time phishing emails or fake social media ads to   
   coincide with busy shopping periods such as Black Friday and Christmas sales.   
   Cybercriminals can also create fake websites offering massive discounts or   
   time-limited offers, hoping to lure in shoppers eager to make a purchase   
   quickly. Under pressure, people are more likely to fall for scams.    
      
   In the same way, AI can be used to create fake bank alerts or financial   
   notifications that play on a customers fear of fraud or account security   
   issues. These phishing attacks, which often contain urgent warnings or   
   threats, push the recipient into a state of panic, encouraging them to click   
   on a malicious link or provide sensitive details. It can also be very hard to   
   spot when the destination site or notifications look identical to the    
   official source.    
      
   In fact, while it may seem simple to check if a website is secure by looking   
   for the HTTPS prefix or a padlock icon, these are no longer foolproof   
   indicators of a secure site. Cybercriminals have become adept at creating    
   fake sites that look identical to trusted brands, making it easy for    
   consumers to be misled.   
      
   Deepfake Technology: Social Engineering with a New Face   
      
   Alongside phishing, AI is increasingly being used in social engineering   
   attacks, particularly through deepfake technology. Earlier last year, ARUP   
   lost $25 million to fraudsters after an employee was tricked into believing    
   he was carrying out the orders of his CFO. And everyday people arent immune   
   either. A kitchen fitter from Brighton was scammed for 76,000 because he   
   believed a deepfake advert purporting to be Martin Lewis, the money-saving   
   expert.    
      
   This method is highly effective because it bypasses traditional security   
   measures we rely on, such as email filters, multi-factor authentication, or   
   the sniff test, which means that something is awry. Deepfakes create a sense   
   of urgency and authority, making it easier to manipulate people into taking   
   actions they would otherwise refuse. And their realism, especially when   
   duplicate social media profiles are concerned, makes such scams harder to   
   detect, even for those with extensive training.   
      
   Protecting Against AI-Enhanced Threats   
      
   As the sophistication of AI-driven phishing and social engineering attacks   
   grows, it is essential for both businesses and consumers to adopt proactive   
   security measures. For individuals, vigilance is key. Avoid clicking on links   
   in unsolicited and junk emails, texts that claim to come from businesses or   
   government agencies, or even ads seen on social media platforms. Always   
   manually type in the URL of a website, rather than clicking on embedded    
   links, to ensure that you are visiting a legitimate site.    
      
   Multi-factor authentication should also be implemented wherever possible, as   
   it adds an additional layer of security beyond traditional login credentials.   
   Password managers can also help users create and store strong, unique   
   passwords for each account, reducing the risk of credential theft. Passkeys,   
   which rely on biometrics and device management, are the next level of   
   protection that is slowly being adopted.    
      
   For businesses, investing in advanced threat detection and response systems    
   is essential. These systems can identify and mitigate phishing and social   
   engineering attacks before they cause significant damage. Machine learning   
   algorithms within these systems can detect patterns of malicious activity    
   that traditional security measures might miss. Regular employee training is   
   also crucial, as the human element remains one of the most vulnerable points   
   of attack.    
      
   Moreover, businesses should work to ensure that their employees and customers   
   are aware of the risks posed by deepfakes and other forms of AI-driven social   
   engineering. Implementing robust verification processes, such as requiring   
   multiple confirmations for financial transactions, can also help reduce the   
   risk of falling victim to these kinds of scams. Ultimately, staying ahead of   
   evolving AI threats requires collective vigilance and a stronger commitment    
   to safeguarding personal information.    
      
    This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry   
   today. The views expressed here are those of the author and are not   
   necessarily those of TechRadarPro or Future plc. If you are interested in   
   contributing find out more here:   
   https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/cybercriminals-cashing-in-on-holiday-sales-rush   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca