波音游戏-波音娱乐城赌球打不开

Ways to Stay Safe from Accelerating Phishing Attacks and the Latest Deepfake Techniques

by Colin Yeung (OCIO)

 

Phishing Attacks and Deepfake Technique: A Growing Concern

In today's digital landscape, cyber threats continue to evolve, and it is crucial to stay vigilant and informed about the latest techniques used by cybercriminals. Two significant concerns in the realm of cybersecurity are phishing attacks and deepfake techniques. This article provides practical tips to address the growing threat of phishing attempts. 

deepfake-2.png

Phishing attacks remain a prevalent threat and aim to deceive individuals into revealing sensitive information or performing malicious actions, while deepfake techniques involve the use of manipulated audio and video to create convincing impersonations.

These attacks can occur through various channels, such as email (including business and personal email), Short Message Service (SMS), and mobile messaging applications (e.g. WhatsApp, WeChat). The primary goal of phishing is to trick individuals into divulging sensitive information, such as passwords, credit card details, or personal identification. Phishing attacks often employ social engineering tactics, preying on human vulnerabilities to create a false sense of trust and urgency.

The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), which is the centre for coordination of computer security incident response for local enterprises and Internet users, handled a total of 7,752 security incidents in 2023. Notably, phishing incidents constituted a significant portion, representing nearly half of all cases with a count of 3,752 (48%). This demonstrates a substantial increase, surpassing previous years and setting a five-year record, as it marks a 27% rise from 2022 [1].

The real-life examples below serve as a reminder of how cybercriminals can leverage social engineering tactics to manipulate individuals.  

  1. Deepfake Scams: The Arup Incident [2]
     
    deepfake

    One notable example of a deepfake scam is the Arup incident. UK multinational Arup has fallen victim to a sophisticated deepfake scam in which a digitally cloned version of its chief financial officer (CFO) was used to dupe an employee in its Hong Kong office into transferring HK$200 million to scammers. The hyper-realistic deepfake video, created using artificial intelligence, convinced the employee to make 15 transfers to five Hong Kong bank accounts. Arup confirmed that fake voices and images were used but clarified that its financial stability and business operations were not compromised, and none of its internal systems were breached. The scam, which was first revealed in February 2024, is described as one of the largest known deepfake scams and the first of its kind in Hong Kong. Investigations are ongoing, and no arrests have been made so far. Arup's global chief information officer highlighted the increasing threat of deepfake scams and hoped that this incident would raise awareness about the evolving techniques of bad actors.

  2. Impersonation Incident: Mimic University Professor

    Another notable example is that a cybercriminal employed a phishing technique to impersonate a university professor and deceive a student. This scam did not involve the use of deepfake technology but relied on traditional social engineering tactics and email spoofing (pretend to send from [professor name]@gmail.com). The attacker created an email address that closely resembled the professor's official email and sent a phishing email to the student, posing as the professor. The phishing email was carefully crafted to mimic the professor's communication style and contained urgent language, requesting the student's assistance in purchasing gift cards for official purposes and emphasising the need for immediate action. The email provided specific instructions on how to proceed in a continuous conversation with the victim. Unfortunately, the student, believing the email was legitimate, followed the instructions and purchased the gift cards, resulting in financial loss.  
     
  3. Phone-based Phishing: Direct Call to Targeted Person

    Another example of a fraudulent technique is phone-based phishing, also known as voice phishing or "vishing". For instance, the attacker directly called University staff and requested to provide sensitive information and perform certain actions such as opening email attachments. The attacker impersonated a trusted entity, such as a vendor or a tech support agent, and convinced the targeted staff to open an email attachment or click on a malicious link from the attacker. This phishing method has been on the rise, with phone numbers used for fraud accounting for over 20% of fraud-related assets identified by the Anti-Phishing Working Group in the first quarter of 2024. The increasing prevalence of vishing highlights the need for individuals to remain vigilant and exercise caution when receiving unexpected phone or video calls [3].

Tips to Protect Yourself from Phishing Attacks and Deepfake Techniques

  1. Develop an aware mindset:  Be aware of unsolicited messages, unexpected requests, and urgent demands for personal information.
  2. Verify the sender's identity: Before responding to any request, verify the sender's identity using alternative means of communication. For example, contact the person directly through a known phone number or meet in person if feasible. 
  3. Think before clicking or sharing information: Avoid clicking on links or downloading attachments from unsolicited messages. Hover over links to preview the URL and ensure it matches the expected destination. 
  4. Stay informed and educate yourself: Regularly update your knowledge about the latest phishing techniques and deepfake technology, such as reading this article.
  5. Activate multi-factor authentication (MFA) for your accounts: Enable MFA whenever possible, especially for sensitive accounts such as email, banking, and social media. 
  6. Keep your software up to date: Regularly update your operating system, applications, and security software. Software updates often include security patches that address known vulnerabilities that cybercriminals may exploit.

Conclusion

In conclusion, building security awareness serves as our last line of defence in the ever-evolving landscape of cyber threats. While technological advancements have provided us with numerous conveniences, they have also opened avenues for malicious actors to exploit our weaknesses. Remember, our last line of defence lies in our ability to stay informed, remain vigilant, and report suspicious activities. By staying one step ahead and building security awareness, we can safeguard our personal information, financial well-being, and overall online safety. 

Reference:

[1] https://www.hkcert.org/press-centre/hkcert-releases-annual-information-security-outlook-and-forecast-next-level-phishing-attacks-difficult-to-distinguish-hackers-exploit-ai-for-crimes-could-become-a-new-normal
[2] https://www.dezeen.com/2024/05/17/arup-victim-deepfake-video-scam/
[3] https://docs.apwg.org/reports/apwg_trends_report_q1_2024.pdf

澳门顶级赌场金鹰娱乐| 大发在线扑克| 百家乐官网游戏解密| 哪家百家乐官网从哪而来| 大发888娱乐场下载英皇国际| 百家乐官网对冲套红利| 大发888真钱| 百家乐最新的投注方法| 信誉百家乐官网博彩网| 大发888国际娱乐城lm0| 投真钱百家乐官网必输吗| 大发888网页在线游戏| 百家乐游戏玩法规则| 太白县| 凤凰百家乐的玩法技巧和规则| 百家乐官网游戏群号| 大发888娱乐平台下| 百家乐概率下注法| 鹤峰县| 大发888娱乐城下载最新版| 百家乐游戏全讯网2| 菲律宾百家乐官网娱乐场| 一筒百家乐官网的玩法技巧和规则 | 星期8百家乐娱乐城| 24山风水 九运| 线上百家乐官网开户| 亚洲顶级赌场 网投领导者| 百家乐智能系统| 真钱百家乐公司哪个好| 网络百家乐官网证据| 百家乐官网翻天腾讯视频| 大发888娱乐城加盟| 百家乐诀| 百家乐软件稳赚| 百家乐策略| 百家乐官网怎么玩会| 百家乐官网龙虎台布多少钱 | 运城百家乐蓝盾| 百家乐玩法与规则| 百家乐视频计牌器| 做生意适合摆放龙龟吗|