Social engineering scams, one of the oldest tricks in the financial fraud book, still threaten financial institutions and other businesses through malware, ransomware and email attacks, per San Mateo, Calif.-based Agari.
Some 60% of more than 200 U.S. security leaders surveyed, by Agari and Information Security Media Group, know they either were or might have been social engineering victims during the past year, and 94% recognize social engineering, including spear phishing, as a significant business threat. In addition, 65% of those attacks involved employees' login credentials, and 17% concerned financial accounts.
The techniques cybercriminals are opting to choose right now should put finance departments on high alert. What makes these scams more dangerous is their development. "If you are thinking about the old social engineering attacks, like the Nigerian scams, those took a rather naïve person to believe it," Markus Jakobsson, author (Understanding Social Engineering Based Scams) and Agari's chief scientist, said. The enterprise facing attacks are very plausible because they are business email compromises disguised as everyday work activities such as processing invoices or acquisitions. "At work, it is your responsibility to take care of things that look like work."
Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.
Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
- Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.