Cloud SecurityHIGH

Cloud Security - Voice Phishing Trends Exposed by Google

REThe Register Security
Google Cloudvoice phishingMandiantcybercrimeShinyHunters
🎯

Basically, hackers are tricking people into giving them access to cloud systems using phone calls.

Quick Summary

Google's latest report reveals a rise in voice phishing as the leading tactic for cloud breaches. This trend poses serious risks to organizations, as attackers use social engineering to exploit vulnerabilities. Companies must enhance their defenses against these evolving threats to protect sensitive data.

What Happened

In a recent report by Google Cloud, it was revealed that voice phishing has surged to become the second most common method for cybercriminals to gain initial access to IT environments. This tactic is particularly effective in cloud environments, where attackers often use social engineering to manipulate IT help desk personnel. According to Jurgen Kutscher, VP of Mandiant Consulting, voice phishing accounted for 11% of attacks last year, making it the leading method for cloud breaches. This shift highlights a growing trend where interactive tactics are increasingly utilized by threat actors.

The report further indicates that traditional phishing emails are declining, now representing only 6% of intrusions. Instead, attackers are calling help desks to register devices for multi-factor authentication (MFA) or to reset passwords, exploiting the inherent helpfulness of IT staff. This new approach poses a significant challenge for organizations trying to secure their cloud infrastructures.

Who's Being Targeted

Organizations across various sectors are at risk, especially those with cloud-based infrastructures. The increasing sophistication of attacks means that even well-prepared IT departments can fall victim to these tactics. Cybercriminals, including groups like ShinyHunters and Scattered Lapsus$ Hunters, are leveraging voice phishing as a primary method to infiltrate corporate networks. The interactive nature of these attacks makes them more difficult to detect and prevent.

Moreover, the report highlights a worrying trend of ClickFix attacks, where users are tricked into executing malicious commands on their devices. This tactic adds another layer of risk, as it allows attackers to bypass traditional security measures and gain direct access to sensitive information.

Signs of Infection

Organizations should be vigilant for signs of voice phishing attacks. Indicators include unexpected calls from individuals claiming to be from IT support or requests for sensitive information related to account access. Employees should be trained to recognize these tactics and verify the identity of callers before providing any information. Additionally, organizations should monitor for unusual activity, such as unauthorized device registrations or password resets.

Another concerning sign is the extreme timelines of these attacks. The report notes that attackers can hand off access to other threat groups in under 30 seconds, leading to rapid ransomware infections. This quick transition emphasizes the need for organizations to respond swiftly to any suspicious activity.

How to Protect Yourself

To safeguard against these evolving threats, organizations must implement robust security measures. This includes training employees to recognize social engineering tactics and establishing verification protocols for IT support interactions. Regular security audits and incident response drills can also help prepare teams for potential breaches.

Furthermore, organizations should consider investing in advanced security solutions that can detect and respond to these types of attacks in real-time. By understanding the tactics employed by cybercriminals and staying informed about emerging threats, businesses can better defend their cloud environments against sophisticated attacks.

🔒 Pro insight: The rise of voice phishing highlights the need for rapid response capabilities in cloud security to counteract sophisticated social engineering tactics.

Original article from

The Register Security

Read Full Article

Related Pings

MEDIUMCloud Security

Cloudflare's Gen 13 Servers - Doubling Edge Compute Performance

Cloudflare has launched its Gen 13 servers, doubling compute performance by utilizing AMD's EPYC processors. This upgrade enhances edge computing capabilities, crucial for businesses relying on fast internet services. The new architecture promises improved performance and efficiency, allowing Cloudflare to meet growing demands.

Cloudflare Blog·
HIGHCloud Security

Cloud Security - Eight Attack Vectors in AWS Bedrock Explained

AWS Bedrock has eight critical attack vectors that could expose sensitive data. Organizations using this platform must understand these risks to secure their cloud environments effectively. Immediate action is essential to prevent potential exploitation.

The Hacker News·
MEDIUMCloud Security

Cloudflare's Gen 13 - Unveiling Powerful Server Design

Cloudflare launched its Gen 13 servers, featuring advanced AMD EPYC processors and 100 GbE networking. This upgrade enhances performance and efficiency, crucial for high-traffic demands. Stay informed to leverage these improvements for your business needs.

Cloudflare Blog·
HIGHCloud Security

Cloud Security - Arctic Wolf and Wiz Partner for Solutions

Arctic Wolf and Wiz have teamed up to enhance cloud security solutions. This partnership focuses on improving detection and response capabilities for organizations. As cloud threats increase, effective security measures are crucial to protect sensitive data. Together, they aim to streamline cloud security operations.

Arctic Wolf Blog·
MEDIUMCloud Security

Cloud Security - Kusari Partners with OpenSSF for Safety

Kusari has partnered with OpenSSF to enhance the security of open source software supply chains. This initiative helps developers manage risks and improve visibility. With rising threats, this collaboration is crucial for maintaining secure development practices.

OpenSSF Blog·
MEDIUMCloud Security

Android Sideloading - Google Introduces Advanced Flow Safety

Google's Advanced Flow enhances sideloading safety on Android. This update aims to protect users from scams and malware risks. Users will face new steps before installing unverified apps.

Malwarebytes Labs·