Stu Sjouwerman
2024-11-09 08:58:00
blog.knowbe4.com
The latest trend in cybercrime is that attackers don’t really focus on “hacking” in; they’re logging in.
We see this now in the wild, driven by organized criminal groups like Scattered Spider and BlackCat, who’ve re-emerged with a renewed focus on gaining access through legitimate means, often exploiting help desks and social engineering tactics.
Their strategies often rely on social engineering help desks into resetting credentials or bypassing multi-factor authentication (MFA), achieving access without breaking in. These attackers aim for the easiest route to your network, leveraging stolen credentials from info-stealers or posing as legitimate users to gain entry.
A recent case reported by ReliaQuest underscores this tactic. Scattered Spider used social engineering to trick a help desk, leading to a six-hour attack that ended in system encryption. The attackers even used Microsoft Teams to demand a ransom—showing a new level of boldness and ingenuity in modern cyberattacks.
As threat analyst Hayden Evans explains, “Attackers don’t hack in; they log in.” His advice is clear: organizations must enforce stringent help desk policies and ensure MFA configurations can withstand social engineering tricks.
To protect your network, work hard on improving employee training, monitoring for suspicious activity, and reinforcing help desk protocols. These measures build resilience against today’s advanced threat actors who bypass traditional security measures by simply logging in.
Support Techcratic
If you find value in Techcratic’s insights and articles, consider supporting us with Bitcoin. Your support helps me, as a solo operator, continue delivering high-quality content while managing all the technical aspects, from server maintenance to blog writing, future updates, and improvements. Support Innovation! Thank you.
Bitcoin Address:
bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge
Please verify this address before sending funds.
Bitcoin QR Code
Simply scan the QR code below to support Techcratic.
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.