波音游戏-波音娱乐城赌球打不开

Ways to Stay Safe from Accelerating Phishing Attacks and the Latest Deepfake Techniques

by Colin Yeung (OCIO)

 

Phishing Attacks and Deepfake Technique: A Growing Concern

In today's digital landscape, cyber threats continue to evolve, and it is crucial to stay vigilant and informed about the latest techniques used by cybercriminals. Two significant concerns in the realm of cybersecurity are phishing attacks and deepfake techniques. This article provides practical tips to address the growing threat of phishing attempts. 

deepfake-2.png

Phishing attacks remain a prevalent threat and aim to deceive individuals into revealing sensitive information or performing malicious actions, while deepfake techniques involve the use of manipulated audio and video to create convincing impersonations.

These attacks can occur through various channels, such as email (including business and personal email), Short Message Service (SMS), and mobile messaging applications (e.g. WhatsApp, WeChat). The primary goal of phishing is to trick individuals into divulging sensitive information, such as passwords, credit card details, or personal identification. Phishing attacks often employ social engineering tactics, preying on human vulnerabilities to create a false sense of trust and urgency.

The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), which is the centre for coordination of computer security incident response for local enterprises and Internet users, handled a total of 7,752 security incidents in 2023. Notably, phishing incidents constituted a significant portion, representing nearly half of all cases with a count of 3,752 (48%). This demonstrates a substantial increase, surpassing previous years and setting a five-year record, as it marks a 27% rise from 2022 [1].

The real-life examples below serve as a reminder of how cybercriminals can leverage social engineering tactics to manipulate individuals.  

  1. Deepfake Scams: The Arup Incident [2]
     
    deepfake

    One notable example of a deepfake scam is the Arup incident. UK multinational Arup has fallen victim to a sophisticated deepfake scam in which a digitally cloned version of its chief financial officer (CFO) was used to dupe an employee in its Hong Kong office into transferring HK$200 million to scammers. The hyper-realistic deepfake video, created using artificial intelligence, convinced the employee to make 15 transfers to five Hong Kong bank accounts. Arup confirmed that fake voices and images were used but clarified that its financial stability and business operations were not compromised, and none of its internal systems were breached. The scam, which was first revealed in February 2024, is described as one of the largest known deepfake scams and the first of its kind in Hong Kong. Investigations are ongoing, and no arrests have been made so far. Arup's global chief information officer highlighted the increasing threat of deepfake scams and hoped that this incident would raise awareness about the evolving techniques of bad actors.

  2. Impersonation Incident: Mimic University Professor

    Another notable example is that a cybercriminal employed a phishing technique to impersonate a university professor and deceive a student. This scam did not involve the use of deepfake technology but relied on traditional social engineering tactics and email spoofing (pretend to send from [professor name]@gmail.com). The attacker created an email address that closely resembled the professor's official email and sent a phishing email to the student, posing as the professor. The phishing email was carefully crafted to mimic the professor's communication style and contained urgent language, requesting the student's assistance in purchasing gift cards for official purposes and emphasising the need for immediate action. The email provided specific instructions on how to proceed in a continuous conversation with the victim. Unfortunately, the student, believing the email was legitimate, followed the instructions and purchased the gift cards, resulting in financial loss.  
     
  3. Phone-based Phishing: Direct Call to Targeted Person

    Another example of a fraudulent technique is phone-based phishing, also known as voice phishing or "vishing". For instance, the attacker directly called University staff and requested to provide sensitive information and perform certain actions such as opening email attachments. The attacker impersonated a trusted entity, such as a vendor or a tech support agent, and convinced the targeted staff to open an email attachment or click on a malicious link from the attacker. This phishing method has been on the rise, with phone numbers used for fraud accounting for over 20% of fraud-related assets identified by the Anti-Phishing Working Group in the first quarter of 2024. The increasing prevalence of vishing highlights the need for individuals to remain vigilant and exercise caution when receiving unexpected phone or video calls [3].

Tips to Protect Yourself from Phishing Attacks and Deepfake Techniques

  1. Develop an aware mindset:  Be aware of unsolicited messages, unexpected requests, and urgent demands for personal information.
  2. Verify the sender's identity: Before responding to any request, verify the sender's identity using alternative means of communication. For example, contact the person directly through a known phone number or meet in person if feasible. 
  3. Think before clicking or sharing information: Avoid clicking on links or downloading attachments from unsolicited messages. Hover over links to preview the URL and ensure it matches the expected destination. 
  4. Stay informed and educate yourself: Regularly update your knowledge about the latest phishing techniques and deepfake technology, such as reading this article.
  5. Activate multi-factor authentication (MFA) for your accounts: Enable MFA whenever possible, especially for sensitive accounts such as email, banking, and social media. 
  6. Keep your software up to date: Regularly update your operating system, applications, and security software. Software updates often include security patches that address known vulnerabilities that cybercriminals may exploit.

Conclusion

In conclusion, building security awareness serves as our last line of defence in the ever-evolving landscape of cyber threats. While technological advancements have provided us with numerous conveniences, they have also opened avenues for malicious actors to exploit our weaknesses. Remember, our last line of defence lies in our ability to stay informed, remain vigilant, and report suspicious activities. By staying one step ahead and building security awareness, we can safeguard our personal information, financial well-being, and overall online safety. 

Reference:

[1] https://www.hkcert.org/press-centre/hkcert-releases-annual-information-security-outlook-and-forecast-next-level-phishing-attacks-difficult-to-distinguish-hackers-exploit-ai-for-crimes-could-become-a-new-normal
[2] https://www.dezeen.com/2024/05/17/arup-victim-deepfake-video-scam/
[3] https://docs.apwg.org/reports/apwg_trends_report_q1_2024.pdf

大玩家娱乐城开户| 澳门百家乐官网心| 百家乐赌场代理| 大众百家乐官网娱乐城| 温州市百家乐官网鞋业| 百家乐官网现金平台排名| 即时比分直播| 百家乐推饼| 百家乐盛大娱乐城城| 沙龙百家乐破解| 易赢百家乐软件| 百家乐官网线路图分析| 玩百家乐官网输了| 678百家乐官网博彩娱乐平台 | 大发888备用网| 巴黎人百家乐的玩法技巧和规则 | 六合彩图库大全| 娱乐城百利宫娱乐| 英皇国际| 卡宾娱乐| 太湖县| 太阳城百家乐官网杀猪吗| 百家乐官网筹码真伪| 大发888博彩娱乐城| 百家乐好不好| 百家乐网上真钱娱乐场开户注册| 百家乐vshow| 大发888娱乐城网页版lm0| 顶级赌场 官方直营网| 豪门娱乐网| 百家乐官网新台第二局| 百家乐官网公式论坛| 百家乐官网赌场代理| 百家乐下对子的概率| 金满堂百家乐的玩法技巧和规则| 网上百家乐娱乐平台| 大发888 894| 太阳城网址| 博彩百家乐官网软件| 百家乐官网博娱乐场开户注册 | e世博官方网站|