Technology
How to Protect Your Business Assets and Revenue from Cybercriminals
Olamide Salami
Oct 31, 2023
In today's digital landscape, cybercrime has become a mounting concern for businesses. Staying vigilant is now more crucial than ever to shield against the increasing threats.
Annually, cybercriminals manage to siphon $6 trillion from the global economy, a sum that's three times the value of Africa's entire economy.
One of the most prevalent methods employed by cybercriminals today is through the art of social engineering, because at the end of the day computers don't hack you, people do.
Social engineering attacks are the primary cybersecurity threat to individuals and organisations in Africa today. According to data, 91% of cyberattacks on individuals and 52% of successful cyberattacks on organisations in Africa are social engineering attacks, which are mostly phishing attempts. In Q2 2023, African organisations experienced the highest average number of cyberattacks per week per organisation. This was a 23% increase in comparison to Q2 2022, which means that individuals and organisations are facing more cyber threats now than before.
Additionally, the 2023 phishing report by KnowBe4 reports that 33% of corporate employees in the African region are vulnerable to social engineering scams, most notably phishing attacks. This calls for introspection on the cybersecurity measures to secure our world from malicious actors. This post seeks to increase your cybersecurity awareness by helping you understand social engineering and how to shield your business from it.
What is Social Engineering?
Social engineering, also known as human hacking, refers to malicious actions carried out by hackers to manipulate, influence, and deceive unsuspecting individuals into releasing control of their systems or giving away sensitive information. These hackers manipulate their victims psychologically and exploit their human weaknesses to compromise their personal or organisation’s security. Some examples of this include phishing, CEO fraud, and spear phishing. Understanding social engineering and how it works is crucial to the overall cybersecurity awareness of your organisation. Both are in fact, two sides of the same coin.
A social engineering attack can happen in several steps, which start with investigating the potential victims to find out background information, like potential entry points for the attack. Then the perpetrators proceed to win the victim’s trust or provide them with a stimuli for them to take actions that will breach security and grant access to the perpetrators. Social engineering has proven to be a potent tool in the hands of hackers because it doesn’t require operating system and software vulnerabilities, but rather relies on human errors, which are less predictable and more difficult to identify.
How Social Engineering Attacks Work
The 4 stages in the image above are the main stages of a social engineering attack:
1. Investigation (Information Gathering)
This is the first phase of the attack, where the attackers identify their victims and gather the necessary information for a successful attack on them. It’s the phase in which attackers spend most time because it largely determines the success of their social engineering attack. With the right level of information about their potential victim, these hackers can determine the attack method, the target’s possible passwords, and likely responses, etc. They become familiar with the target before moving on to the next phase.
2. Hook (Establishing Relationship)
In this phase, the attackers engage the target and establish a relationship or rapport with them. This is also crucial to their work because the quality of this relationship will determine how much the target cooperates and helps the attackers achieve their goal. They tend to take control of the interaction and psychologically manipulate their targets by sharing stories, and family pictures, and connecting with them personally. Sometimes they do this physically or connect with their targets with fake profiles on social media platforms, dating sites, etc.
3. Play (Exploitation)
At this phase, the attacker actively infiltrates their victim with the information they’ve gathered in the first and second phases. Here they expand their foothold with the victim, attacking them saliently but actively, while maintaining the relationship from the previous phase and avoiding raising suspicion. Exploitation happens when targets divulge seemingly unimportant information to the attacker or grant access that is otherwise restricted because of trust. Some examples of exploitation are:
- Disclosing username and password
- Introducing the social engineer to other company colleagues
- Discussing organisation's trade secrets in conversation with a “friend”
- Opening a malicious email attachment
4. Exit (Execution)
This is the final stage of social engineering in which the attacker ends the process in a manner that doesn’t raise suspicion, mostly after achieving their goal. Most times, the victim doesn’t suspect anything when the attack ends. Instead, the attacker tries to make the victim feel good about their interactions, leaving room for future interactions. The attacker also covers their tracks by removing every trace of malware, or digital footprint. They make sure to leave no information behind, allowing them to remain anonymous after they’ve executed an attack.
What is Phishing?
Phishing refers to a fraudulent act in which the hacker poses as a reputable person or entity via email or other forms of communication to distribute malicious attachments and links to extract an organisation's information from the victim/employee. It is the most prominent social engineering method used to scam organisations in Africa. According to a Kaspersky report released in August 2022, it detected 10,722, 886 phishing attacks across three countries (Kenya, South Africa, and Nigeria) in Africa in Q2 2022. Kenya was the most affected with 5,098,534 phishing attacks, followed by South Africa with 4,578,216 phishing attacks, and Nigeria with 1,046,136 phishing attacks. When these attacks are successful, they often lead to ransomware attacks, identity theft, data breaches, credit card fraud, and massive financial losses for corporations.
These phishing scams work through email campaigns to create curiosity, fear, or a sense of urgency in the victims prodding them to reveal sensitive information, open malware-infested attachments, or click on malicious links. For instance, a targeted employee could receive an email that requires them to take immediate action, like changing passwords or providing account information. This email will include a link to a fake website that looks like the original version, making it hard for victims to suspect.