Conversation-Hijacking Attacks Make It Almost Impossible to Avoid Becoming a Victim

Closeup side profile portrait upset sad skeptical unhappy serious woman talking texting on phone displeased with conversation isolated city background. Negative human emotion face expression feelingAttackers target organizations to insert themselves into group email conversations as a way of ensuring the likelihood that one or more recipients are happy to unwittingly infect themselves.

So, you’re on a group email thread that’s been going back and forth with each recipient participating with commentary. At some point, one of the recipients naturally and contextually offers up a link or an attachment that will assist with the conversation’s topic. Would you click it?

Cybercriminals using this new technique are betting you will.

According to new research from security vendor Barracuda, attackers are taking a page from domain impersonation and deepfake voice attacks, and are now realizing the value of leveraging a compromised credential by simply looking through their email, finding a current email thread with several people on it, and inserting malware with a contextually-accurate reason. Remember, according to Microsoft, attackers spend about 146 days on your network before being detected; that’s enough time to find an opportunity to infect users.

It’s conniving and so evil you have to at least appreciate its brilliance.

It’s also a great indicator that users need to be taught to never trust any email – no matter who sends it. Users that participate in Security Awareness Training realize that even emails which appear to be from a trusted source still need to undergo some level of scrutiny. And in the case of conversation-hijacking attacks, the scrutiny is definitely necessary.

Request A Demo: Security Awareness Training

products-KB4SAT6-2-1New-school Security Awareness Training is critical to enabling you and your IT staff to connect with users and help them make the right security decisions all of the time. This isn't a one and done deal, continuous training and simulated phishing are both needed to mobilize users as your last line of defense. Request your one-on-one demo of KnowBe4's security awareness training and simulated phishing platform and see how easy it can be!

Request a Demo!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews