Best Life Insider

Hackers are getting better at tricking people into handing over passwords — here's what to look out for, according to experts

black hat hackers

  • Phishing scams in which hackers pose as trusted figures to trick people into handing over passwords are getting increasingly sophisticated.
  • Security experts describe an arms race between services that weed out scammers and attackers developing new tricks and workarounds.
  • Phishing is on the rise, and costing over $57 million from more than 114,000 victims in the US last year, according to a recent FBI report.
  • Visit Business Insider's homepage for more stories.

Hackers don't break in, they log in.

That mantra, often repeated by security experts, represents a rule of thumb: The vast majority of breaches are the result of stolen passwords, not high-tech hacking tools.

These break-ins are on the rise. Phishing scams — in which attackers pose as a trustworthy party to trick people into handing over personal details or account information — were the most common type of internet crime last year, according to a recent FBI report. People lost more than $57.8 million in 2019 as the result of phishing, according to the report, with over 114,000 victims targeted in the US.

And as phishing becomes more profitable, hackers are becoming increasingly sophisticated in the methods they use to steal passwords, according to Tanmay Ganacharya, a principal director in Microsoft's Security Research team.

"Most of the attackers have now moved to phishing because it's easy. If I can convince you to give me your credentials, it's done. There's nothing more that I need," Ganacharya told Business Insider.

Ganacharya monitors phishing tactics in order to build machine-learning systems that root out scams for people using Microsoft services, including Windows, Outlook, and Azure, Microsoft's cloud computing service. This week, Microsoft announced that it will begin selling its threat-protection services for platforms including Linux, iOS, and Android.

Ganacharya spoke to Business Insider about the trends in phishing that his team has observed. Many of the tactics aren't new, but he said attackers are constantly finding new ways to work around defenses like Microsoft's threat protection. Here's what he described.

Hackers will start by targeting low-level employees, then "moving laterally" to compromise executives' accounts.

Hackers will begin by sending low-level employees emails that look trustworthy, but might include links directing them to a scam website that asks them to input their username and password. Once they have access to that employee's account, they can use it to send trustworthy-seeming emails to others in the company.

"You might get into a network through someone, like a sales associate. But then through that you can laterally move by sending phishing emails to, let's say, the admin of that candidate," Ganacharya said. "And then once you're able to compromise the admin, you can actually leverage that company's domain and send emails to the larger cargo."



Similarly, scammers string together phishing attacks by compromising small, vulnerable businesses and leveraging their trust with larger business partners they work with.

"Instead of the email coming from 'someone at gmail.com' or some random address, it actually comes from a business that they work with. In phishing it's all about gaining the trust of the email, the reader, so that they click on it. And if it is a credential thing that pops up, they just give their credentials," Ganacharya said.



The old-school tactic of "typosquatting" is also seeing a resurgence among hackers, according to Ganacharya.

"Typosquatting is big again," Ganacharya said.

In this phishing scheme, also known as URL hijacking, attackers buy domains that are slight misspelling of popular websites, like goggle.com or yuube.com. The tactic was a mainstay of the early days of the internet, but has recently seen a resurgence. 



"Spear phishers" put extensive effort into targeting a specific person, often creating multiple misleading pages to trick them.

Hackers will sometimes create fake social media pages or personal blogs for the persona they're using to target someone, intentionally adding their targets' friends in an effort to seem more trustworthy.



Fake credential pages are becoming more sophisticated.

Hackers will regularly make fake sites that mimic the login screens of trusted services, like email accounts. Ganacharya's team has built machine-learning systems that detect subtle differences in the appearances of the sites and flag them as fraudulent, but he said hackers are constantly building workarounds.

"If the attacker created a similar looking page [to a legitimate login screen], but then they were not able to match a font here and there or something is moved by one pixel, the machine learning models can pick that up," Ganacharya said.



A cottage industry of phishing-as-a-service is booming as scams become increasingly profitable.

Sophisticated hackers are now willing to sell their services to specific organizations, individuals, or nation-state entities who want to steal information from someone.

Some phishing-as-a-service providers offer networks of bots that proliferate fake websites, while others sell phishing toolkits to clients, according to Ganacharya.

"If you have the funding, you can go buy a phish kit or sign up for phishing as a service and they will build everything for you, and you just have to hope your payoff comes out higher than what you were paying the phishing-as-a-service company," Ganacharya said.



Visit dearJulius.com to get free premium content for all of your lifestyle needs.

COMMENTS



Name

Advice,97,Balance Work & Life,50,Be a Better Manager,33,Break Room,12,Business Skills,102,Career,1547,Career Advice,298,Career Choice,125,Career Growth,180,Career Paths,24,Career Problem,8,Education,84,Entrepreneurship,39,Featured,39,Features,152,Finance,4,Internship,8,Interview Skills,37,Job Search,47,Leadership,44,Marketing,10,Money & Career,21,Resume,11,Tools & Skills,16,Training,1,Work Environment,77,
ltr
item
Career - Best Life Insider: Hackers are getting better at tricking people into handing over passwords — here's what to look out for, according to experts
Hackers are getting better at tricking people into handing over passwords — here's what to look out for, according to experts
https://static1.businessinsider.com/image/5e5019e9fee23d39b66a3ac5-2400/img2828.jpg
Career - Best Life Insider
https://career-bestlifeinsider.blogspot.com/2020/02/hackers-are-getting-better-at-tricking.html
https://career-bestlifeinsider.blogspot.com/
https://career-bestlifeinsider.blogspot.com/
https://career-bestlifeinsider.blogspot.com/2020/02/hackers-are-getting-better-at-tricking.html
true
4349954968455113299
UTF-8
Loaded All Posts Not found any posts VIEW ALL Read More Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content