Will you be a cybercriminal’s Valentine this year?
Valentine’s Day, a time to celebrate love for most but also a time for cybercriminals to prey on those who may be vulnerable to compromise. Valentine’s Day provides the platform to leverage one of the most powerful human emotions, love, but this time to orchestrate a bad outcome. At one time or another, we have all hoped that the day will bring a flurry of secret admirers or anonymous gestures of romance, be that through love letters, flowers or other gifts.
It’s at times like this when good judgment can wane and leave us exposed to being exploited.
Cybercrime’s affiliation with Valentine’s Day and the ‘love’ emotion isn’t new, romance scams have been around since the turn of the century. Back in May 2000, businesses globally saw the effects of one of the first large-scale email-borne malware, not so affectionately known as LoveBug.
LoveBug was a huge milestone in the industry, it was the first mass mailer worm of its size.
It sent an executable attachment to victims with the subject “Love letter for you”, containing the self-spreading computer virus which destroyed data once a machine was infected. The subject line, of course, piqued people’s interest with it also being sent from email addresses of contacts that they knew. LoveBug was the first of its kind, preying on our good-nature and positive expectations.
Fast-forward to today and attackers are still preying on our human frailties but have become more targeted in their approach.
According to ACCC ScamWatch website, Australians reported almost 4,000 dating and romance scams in 2019, with losses of more than $28.6 million, and these numbers will be just the tip of the iceberg. Around 37.5 percent of reports resulted in a loss, with an average loss of more than $19,000.
A research piece by Agari’s Cyber Intelligence Division found a group of individuals who targeted individuals engaging them via social media, text messages, and Google voice and encouraging the victim to share love messages, selfies and even photos with friends. The attackers even went as far as to send flowers to two victims.
These attackers are patient and play the long game with victims, building up trust and loyalty to the point where they can then start to play on their emotions for financial gain. Requesting access to their victim’s bank accounts, retirement accounts and even asking them to purchase prepaid debit cards. Once they’ve taken all money available, scammers will then move on to the next target, leaving the victim confused, heartbroken and broke.
The sad reality is that many victims have no idea they’ve been part of a scam, and in some cases, it has been almost nine years before an individual has been notified by external parties or law enforcement.
Across the ages, cybercriminals have stayed true to one thing; exploiting human nature. Whether that be via curiosity, vulnerability or fear, make sure you keep your guard up today just in case.
see our
Related resources
In today’s digital age, we all use a vast amount of information to conduct our business activities, sharing, and interacting with data across multiple devices and networks. As such confidentiality, integrity and availability are key. You only have to look at recent news headlines to realise that even organisations with comprehensive security strategies are still vulnerable to cybersecurity breaches. Vulnerabilities can lie within the technology being used, the cyber-awareness of its employees, and the sophistication of attacks.
There are images of extensive, verbose documents, complex definitions, and eye-watering Excel sheets when the term GRC is mentioned. For the past two decades, GRC has been central to core business processes across many organisations at both ends of the enterprise spectrum, as well as in the small-to-medium business space in recent times.
But the world has moved on; organisations are forced to embrace digital disruption and agility if they haven’t done so whole-heartedly. And this very disruption is positioning GRC to become less-than-ideal to solve the challenges that said disruption brings with it.
Phishing attacks have increased dramatically over the last few years, with the global pandemic escalating the situation further. Cybercriminals take advantage of insecurities and fear and play on human nature to trick and deceive. In fact, according to the OAIC, phishing attacks that involved compromised credentials accounted for 30% of all cyber incidents in the first half of 2021. And human error formed a major source of these breaches. Unfortunately, due to the clever social engineering tactics used by cybercriminals, technical filters alone aren’t sufficient to protect against phishing.
Mimecast recently released its State of Email Security Report for 2021. The fifth edition of its annual report used interviews with over twelve hundred of information technology and cybersecurity professionals across the globe to gather vital cybersecurity insights. The report offers an insight into the latest email threats along with advice on how to build cyber resilience and mitigate the risks of email-borne attacks.
Last month CrowdStrike released its 2020 Global Threat Report, reflecting on the past year’s cybercrime and the types of attacks and techniques criminals have been utilising. In this blog post, we take a look at the key trends from the report and what they mean to Australian businesses.
We're Here To Help