Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

AI-Generated Phishing and Deepfakes Supercharge Social Engineering Attacks

1:01:18
 
Share
 

Manage episode 506826425 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help desks, smishing, and polished impersonation. These campaigns pair urgency, intimidation, and empathy ploys with modern twists like deepfake audio/video and LLM-written lures that mirror a target’s tone, role, and business context. Once a foothold is gained, operators ride legitimate tools (PowerShell, RDP, admin consoles), blend into normal traffic, and quietly harvest high-value data.

Meanwhile, ransomware has evolved from smash-and-grab encryption to multi-stage extortion. The Ransomware-as-a-Service (RaaS) and broader Cybercrime-as-a-Service (CaaS) markets have slashed barriers to entry: core developers lease turnkey kits, affiliates handle intrusion and extortion, and specialists sell initial access, phishing kits, or data leak hosting. Tactics now include data theft before encryption, countdown leak sites, direct calls to victims and their customers, public shaming, and even leveraging mandatory incident-reporting laws to increase pressure. Technical tradecraft has kept pace: dual-strain deployments, remote/hybrid encryption, uncommon languages to dodge signatures, and “living off the land” to evade EDR.

A headline development is the consolidation of high-impact crews into the “Scattered LAPSUS$ Hunters”—an identity-centric operation that perfects the art of help-desk social engineering, MFA fatigue, SIM swapping, and OAuth consent abuse to capture credentials and session tokens. Post-compromise, they move fast: disabling EDR, exfiltrating from SharePoint, code repos, and cloud data lakes (think Snowflake and Amazon S3), even abusing backup tooling for stealthy transfers. The result is a repeatable pipeline from initial phone call to full enterprise data theft. Despite a public “going dark” message, analysts expect quiet continuity or rebranding.

Layered atop financially motivated crews are state-sponsored operators from China, Russia, and Iran, who blend espionage, IP theft, and influence ops with social engineering to seed access in critical sectors. They pivot through edge devices (VPNs, firewalls), route traffic via compromised domestic infrastructure to avoid scrutiny, and exploit the global vendor concentration of cloud and SaaS providers—turning a single supplier weakness into systemic risk.

What actually works against all this? Start with people. Targeted, scenario-based security awareness (vishing drills, help-desk playbooks, deepfake recognition) remains the highest-ROI control. Pair it with strong identity security: phishing-resistant MFA (FIDO2/WebAuthn), tight help-desk identity proofing, session management and token binding, rapid disablement paths, and least-privilege by default. Architect for failure with Zero Trust and segmentation, harden edge devices, and close the loop with intelligence-led hunting for RMM misuse, unusual admin activity, and data-exfil patterns. Finally, rehearse extortion-resilient incident response: legal, comms, and executive teams need scripts for leak-site deadlines, customer notifications, and negotiation decisions—before attackers make the first call.

Bottom line: social engineering is the reliable front door, ransomware is the business model, AI is the force multiplier, and consolidated, identity-focused crews are the operators. Defenders that invest equally in human, identity, and architectural controls will be the ones to break the kill chain.

#SocialEngineering #Phishing #Vishing #Smishing #Deepfakes #Ransomware #RaaS #CaaS #MFABypass #SIMSwapping #OAuthAbuse #LivingOffTheLand #DataExfiltration #DoubleExtortion #SupplyChainAttack #CriticalInfrastructure #ZeroTrust #SecurityAwareness #ThreatIntelligence #IncidentResponse #ScatteredLAPSUSHunters #China #Russia #Iran #LLM #AIEnabledAttacks #HelpDeskFraud #EDREvasion #BackupAbuse #VendorConcentration

  continue reading

343 episodes

Artwork
iconShare
 
Manage episode 506826425 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help desks, smishing, and polished impersonation. These campaigns pair urgency, intimidation, and empathy ploys with modern twists like deepfake audio/video and LLM-written lures that mirror a target’s tone, role, and business context. Once a foothold is gained, operators ride legitimate tools (PowerShell, RDP, admin consoles), blend into normal traffic, and quietly harvest high-value data.

Meanwhile, ransomware has evolved from smash-and-grab encryption to multi-stage extortion. The Ransomware-as-a-Service (RaaS) and broader Cybercrime-as-a-Service (CaaS) markets have slashed barriers to entry: core developers lease turnkey kits, affiliates handle intrusion and extortion, and specialists sell initial access, phishing kits, or data leak hosting. Tactics now include data theft before encryption, countdown leak sites, direct calls to victims and their customers, public shaming, and even leveraging mandatory incident-reporting laws to increase pressure. Technical tradecraft has kept pace: dual-strain deployments, remote/hybrid encryption, uncommon languages to dodge signatures, and “living off the land” to evade EDR.

A headline development is the consolidation of high-impact crews into the “Scattered LAPSUS$ Hunters”—an identity-centric operation that perfects the art of help-desk social engineering, MFA fatigue, SIM swapping, and OAuth consent abuse to capture credentials and session tokens. Post-compromise, they move fast: disabling EDR, exfiltrating from SharePoint, code repos, and cloud data lakes (think Snowflake and Amazon S3), even abusing backup tooling for stealthy transfers. The result is a repeatable pipeline from initial phone call to full enterprise data theft. Despite a public “going dark” message, analysts expect quiet continuity or rebranding.

Layered atop financially motivated crews are state-sponsored operators from China, Russia, and Iran, who blend espionage, IP theft, and influence ops with social engineering to seed access in critical sectors. They pivot through edge devices (VPNs, firewalls), route traffic via compromised domestic infrastructure to avoid scrutiny, and exploit the global vendor concentration of cloud and SaaS providers—turning a single supplier weakness into systemic risk.

What actually works against all this? Start with people. Targeted, scenario-based security awareness (vishing drills, help-desk playbooks, deepfake recognition) remains the highest-ROI control. Pair it with strong identity security: phishing-resistant MFA (FIDO2/WebAuthn), tight help-desk identity proofing, session management and token binding, rapid disablement paths, and least-privilege by default. Architect for failure with Zero Trust and segmentation, harden edge devices, and close the loop with intelligence-led hunting for RMM misuse, unusual admin activity, and data-exfil patterns. Finally, rehearse extortion-resilient incident response: legal, comms, and executive teams need scripts for leak-site deadlines, customer notifications, and negotiation decisions—before attackers make the first call.

Bottom line: social engineering is the reliable front door, ransomware is the business model, AI is the force multiplier, and consolidated, identity-focused crews are the operators. Defenders that invest equally in human, identity, and architectural controls will be the ones to break the kill chain.

#SocialEngineering #Phishing #Vishing #Smishing #Deepfakes #Ransomware #RaaS #CaaS #MFABypass #SIMSwapping #OAuthAbuse #LivingOffTheLand #DataExfiltration #DoubleExtortion #SupplyChainAttack #CriticalInfrastructure #ZeroTrust #SecurityAwareness #ThreatIntelligence #IncidentResponse #ScatteredLAPSUSHunters #China #Russia #Iran #LLM #AIEnabledAttacks #HelpDeskFraud #EDREvasion #BackupAbuse #VendorConcentration

  continue reading

343 episodes

Tutti gli episodi

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play