In order for businesses to avoid a cyberattack, it is important to understand the tactics cybercriminals are using, and what employees can do to stop them in their tracks. If a hacker wants to gain unauthorised access to an organisation’s network, there are many different tactics they could use.
Some of these include finding and exploiting unpatched vulnerabilities in a system or network, however, this takes more time and expertise than other methods. For cybercriminals, often the easiest and most effective way of targeting a business is to use social engineering methods to manipulate users into breaching security policies or giving away sensitive or personal information, such as usernames and passwords.
For a social engineering attack to work, the most important stage is the cybercriminal’s research of the target organisation and its employees. This research stage is made simple due to the prolific nature of social media and the employees use of social media platforms.
Stage One: Finding a target organisation
In the past, the prime targets for cyberattacks were large organisations as the payoff from a data breach or ransomware attack would be greater than that of a smaller business. However, now all businesses are at risk of a cyberattack.
For a cybercriminal, often targeting smaller businesses is more profitable as they typically have a weaker security posture, whilst still having access to a significant amount of customer data. Once a cybercriminal has decided on a target organisation, they will then begin to research the employees to formulate an attack.
Stage Two: Researching the employees
Once cybercriminals have found a target organisation, they are able to view all the employees on LinkedIn. Through their name, they can also find Facebook, Instagram, and Twitter accounts. These social networking platforms give details about hobbies, family members, and even locations employees frequent, through geo-tagged posts.
Having this wealth of information makes it easier to deceive the victim into revealing personal information and potentially gives answers to password recovery questions, such as ‘What is your mother’s maiden name?’. Unless the social media user has strong privacy settings on their social media accounts, all this information can be accessed without the victim’s knowledge, as they do not need to be followed or added as a friend request.
Stage Three: The attack
With this information, there are many attack vectors that may be effective for a cybercriminal to gain access to a secure business network, or to infect a business with ransomware (malicious software). One method may be to target the employee’s personal email address with a spear-phishing email relating to one of their hobbies or stores they frequent with a malicious link to reset their password on an online account.
If the victim resets their password by using their previous password, and that password is the same as their work account, this gives the hacker access to the attacked targets work account. From here it is simple to launch a ransomware attack or steal data.
Another method cybercriminals may use is a direct phishing attack on the victim’s work email. Through the prior research, cybercriminals may pose as one of the businesses’ vendors or customers in order to persuade the victim to click a malicious link giving the hacker access to a network or work account.
Once they have access to a work account, from the social media research the hacker can easily launch another spear-phishing attack from the victim’s email, targeting someone in the organisation with greater access to customer data.
Stage Four: The aftermath
Both a ransomware attack and data theft can be devastating for a business. A data breach has short-term consequences of potential fines and fees, along with the potential cost of a forensic investigation.
More worryingly, is the long-term consequence of eroding customer trust and a loss of reputation, which can be difficult to recover from.
A ransomware attack may be extremely costly if the ransom is paid out to decrypt the data. Sometimes it is possible to decrypt the data without paying the ransom, however, this often leads to significant downtime and the potential to lose data.
How to avoid a cyberattack
In the previous example of a fictitious cyberattack, there are three key takeaways for businesses trying to avoid an attack. Firstly, employees should be conscious about sharing personal information and personal data on social media. This is not to say that individuals should not post on social networking platforms, but they should restrict their privacy settings so only trusted friends and colleagues can view their information and posts.
Secondly, businesses should educate employees on how to spot phishing emails and general cyber security awareness. This education and security awareness may stop a cyber threat and cyberattack before it is too late. Finally, businesses should consider investing in a comprehensive cybersecurity solution that decreases the chance of a ransomware attack or data breach. If you want to find out more about how you can keep your business safe, get in contact with us today.