On May 14, the FBI marked a sobering milestone: the receipt of its six millionth digital crime complaint. It took just 14 months for the FBI’s Internet Crime Complaint Center (IC3) to reach its new threshold. Digital crime complaints are on the rise, and we have some ideas as to why. Check out what these statistics mean, where social engineering fits in and how you can protect your business or agency from cyber attacks.

Social Engineering Leads the Pack

Short answer: it took off. The FBI found that digital crime complaints increased by about 70% between 2019 and 2020. Many of those complaints involved some form of social engineering. Phishing attacks, non-payment or non-delivery ploys and extortion scams were the most prevalent types of ruses, with romance and confidence schemes, investment fraud attempts and business email compromise (BEC) campaigns costing their victims the most. The last method of attack accounted for $1.8 billion over the course of 2020, according to the IC3.

The FBI wasn’t the only group that observed an increase in the number of attacks like this in recent years. In its 2021 Data Breach Investigations Report, for instance, Verizon Enterprise found that social engineering was the most common attack vector in data breaches observed in 2020 and the third most common attack vector for that year. The firm also observed that most attacks (85%) involved attempts to prey upon the human element in some way.

Solving Today’s Cyber Problems

The findings above are clear: most digital attacks today involve some form of social engineering. Threat actors know that human beings can make rash decisions when they’re afraid or in a rush. Those attackers misuse that fact to trick users into doing something they might not otherwise do, such as clicking on a link or visiting a sketchy website.

As such, those studies show the following takeaway: businesses and agencies need to put special attention on defending against social engineering attacks. It’s not enough for them to train their employees once a year. Social engineering factors into most attacks, after all. So, employees need to be familiar with social attacks year-round.

Preventing Social Engineering Attacks

You can begin by accepting the fact that everyone is at risk from social engineering techniques. We’re all human, so we’re all targets. Contractors, managers and even security researchers can make mistakes. An employee’s position does not determine whether they should learn about social engineering. But it does say something about the types of training from which they might benefit over others.

With that mindset, you can create a security awareness training program. Target their entire workforce with modules that concern email best practices and other common topics, for instance. At the same time, they can create or use other modules to raise awareness of certain threats depending on a learner’s department. Educate HR about W-2 payroll scams, for instance, and spend extra time with finance on awareness of BEC scams. Approaching training in this way will help organizations to equip employees with empowering, action-oriented items that they can take to stay safe in their daily jobs.

Awareness training can help prevent a social engineering attack, of course, but it’s not as helpful for detecting them. That’s where technical controls geared towards the user come in. As an example, you can leverage behavior analytics to help monitor user activity. Anything strange might be a sign that someone compromised one of their authorized user’s accounts. If that’s the case, they can proactively lock down the account and take steps to contain the scope of the successful attack.

A Complex Response to a Complex Threat

Social engineering techniques come in many forms. It’s only natural that the response must do the same thing. By combining several levels of security awareness training with technical controls, you can help harden your business or agency against some of the most common attack techniques used by malicious actors today.

More from Fraud Protection

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today