April 23, 2018 By Douglas Bonderud 2 min read

Threat actors now prefer to exploit human vulnerabilities to launch cyberattacks, according to recent research.

A new Proofpoint report titled “The Human Factor 2018: People-Centered Threats Define the Landscape” noted that “cybercriminals have continued to increase their use of social engineering rather than automated exploits, scaling up people-centered threats and attacks that rely on human interaction” over the past year.

The study showed how cybercriminals can exploit human characteristics that are usually perceived as positive, such as curiosity and trust, by convincing employees to click malicious links, download and install malware, or move corporate funds.

What’s in a Name?

Attackers recognize the tendency of users to trust familiar brands. The Proofpoint report noted that most fraudulent emails mimic the style of popular services, such as Dropbox and DocuSign, to convince employees that links are legitimate.

It also revealed that “suspiciously registered domains” supposedly tied to large enterprises outnumber actual domains 20 to 1. As a result, “targets of phishing attacks are more likely to mistake typosquatted and suspicious domains for their legitimate counterparts.” Speed is a factor here: More than half of all clicks on malicious email links happened within an hour of inbox arrival, according to the report.

New Threats and Vulnerabilities

Although ransomware and banking Trojans comprised 82 percent of malicious emails last year, attackers are also exploring new vectors to exploit human vulnerabilities. For example, the report found that 25 percent of suspicious cloud login attempts were successful, and 60 percent of cloud users did not leverage a password policy or two-factor authentication (2FA).

In addition, approximately half of all cloud users installed third-party add-ons, just under 20 percent of which had access to files and emails. Proofpoint asserted that “no major cloud services avoided abuse,” reinforcing the notion that the human condition plays a critical role in compromise.

Social media threats also increased. The report noted that in 55 percent of social media compromises, attackers went after financial services data.

‘All You Have to Do Is Click’

Proofpoint put it simply: Phishing attacks that leverage social engineering work because “all you have to do is click.” While the report recommended improving employee training to help staff spot and avoid attacks, Kevin Epstein, vice president of Proofpoint, said that organizations must take steps to prevent these attacks from reaching email inboxes.

“Reducing initial exposure minimizes the chances that an organization will experience a confidential data breach, business disruption or direct financial loss,” Epstein said, as quoted by TechRepublic.

The authors of the report recommended automating various aspects of security to improve detection and response, deploying tools to improve cloud visibility, and implementing Domain-Based Message Authentication, Reporting and Conformance (DMARC) authentication to help avoid attacks.

More from

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

ICS CERT predictions for 2024: What you need to know

4 min read - As we work through the first quarter of 2024, various sectors are continuously adapting to increasingly complex cybersecurity threats. Sectors like healthcare, finance, energy and transportation are all regularly widening their digital infrastructure, resulting in larger attack surfaces and greater risk exposure.Kaspersky just released their ICS CERT Predictions for this year, outlining the key cybersecurity challenges industrial enterprises will face in the year ahead. The forecasts emphasize the persistent nature of ransomware threats, the increasing prevalence of cosmopolitical hacktivism, insights…

Can memory-safe programming languages kill 70% of security bugs?

3 min read - The Office of the National Cyber Director (ONCD) recently released a new report, “Back to the Building Blocks: A Path Toward Secure and Measurable Software." The report is one of the first major announcements from new ONCD director Harry Coker and makes a strong case for adopting memory-safe programming languages. This new focus stems from the goal of rebalancing the responsibility of cybersecurity and realigning incentives in favor of long-term cybersecurity investments. Memory-safe programming languages were also included as a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today