Let's get started.
Choose your country to view contact details.
Call for Sales.
Or we'll call you.
Existing customers, sign in to your business account or explore other support options.
You will soon receive an email with a link to confirm your access, or follow the link below.
You may now close this message and continue to your article.
Social Engineering incidents have increased from the previous year largely due to the use of Pretexting, which is commonly used in BEC, almost doubling since last year. Compounding the frequency of these attacks, the median amount stolen from these attacks has also increased over the last couple of years to $50,000.
Phishing and Pretexting continue to dominate this pattern, thus ensuring that email remains one of the most common means of influencing individuals.
Frequency | 1,700 incidents, 928 with confirmed data disclosure | |
Threat actors | External (100%), Multiple (2%), Internal (1%), Partner (1%) (breaches) | |
Actor motives | Financial (89%), Espionage (11%) (breaches) | |
Data compromised | Credentials (76%), Internal (28%), Other (27%), Personal (26%) (breaches) |
Engineering is a beautiful combination of math and physics applied to a practical and meaningful end—or so we’re told. However, much to our parents’ disappointment, most of us are not engineers, but only an infinite collection of monkeys tied to typewriters. (Legend has it we will compose “Hamlet” by pure chance any day now. Watch your back, GPT-4.)
However, this section is about another, not-so-useful-to-society, form of engineer—the social engineer. This pattern focuses on tactics used by threat actors that leverage our innate helpful nature to manipulate and victimize us. These attackers use a combination of strategies to accomplish this: by creating a false sense of urgency for us to provide a reply or to perform an action, a fake petition from authority, or even hijacking existing communication threads to convince us to disclose sensitive data or take some other action on their behalf. Social engineering has come a long way from your basic Nigerian Prince scam to tactics that are much more difficult to detect. This increased sophistication explains why Social Engineering continues to rise and currently resides in our top three patterns (accounting for 17% of our Breaches and 10% of Incidents).
Compromise Accounts: T1586 |
Establish Accounts: T1585 |
External Remote Services: T1133 |
Internal Spearphishing: T1534 |
Phishing: T1566 |
Phishing for Information: T1598 |
Use Alternate Authentication Material: T1550 |
Valid Accounts: T1078 |
There is a common misconception when it comes to distinguishing phishing from the more complex forms of social engineering. Raise your hand if you haven’t received an email with a dubious attachment or a malicious link requesting that you update your password. Nobody? Yeah, that’s what we thought. This is phishing, and it makes up 44% of Social Engineering incidents. Now, who has received an email or a direct message on social media from a friend or family member who desperately needs money? Probably fewer of you. This is social engineering (pretexting specifically) and it takes more skill. The most convincing social engineers can get into your head and convince you that someone you love is in danger. They use information they have learned about you and your loved ones to trick you into believing the message is truly from someone you know, and they use this invented scenario to play on your emotions and create a sense of urgency. Figure 35 shows that Pretexting is now more prevalent than Phishing in Social Engineering incidents. However, when we look at confirmed breaches, Phishing is still on top.
One of the more complex social attacks is the BEC. In these pretexting attacks, actors leverage existing email threads and context to request that the recipient conduct a relatively routine task, such as updating a vendor’s bank account. However, the devil is in the details, and the new bank account belongs to the attacker, so all payments the victim makes to that account will make zero dents in what they owe that vendor. These types of attacks are often much harder to detect due to the groundwork laid by the threat actors prior to the attack. For example, they might have spun up a look-alike domain that closely resembles that of the requesting party and possibly even updated the signature block to include their number instead of the vendor they’re pretending to represent. These are just two of the numerous subtle changes that attackers can make in order to trick their marks—especially those who are constantly bombarded with similar legitimate requests. Perhaps this is one of the reasons BEC attacks have almost doubled across our entire incident dataset, as can be seen in Figure 36, and now represent more than 50% of incidents within this pattern.
Attack type doesn’t appear to have much of an effect on click/open rate. The median fail rates for attachment and link campaigns are 4% and 4.7% respectively, and the median click rate for data entry campaigns is 5.8% (though the data entry rate is 1.6%).
Because this pattern is largely based on human-targeted attacks, it makes sense that the very first action in this pattern will be some form of phishing or pretexting email (Figure 37). In fact, email alone makes up 98% of the vector for these incidents, with the occasional sprinkling of other communication methods, such as phone, social media or some internal messaging app that some folks might be Slacking off on (cough, cough).
What happens after that initial email is where things often diverge. There are two major routes that the attacks typically take. Most commonly, if the attackers are soliciting credentials and obtain them, then they will leverage those credentials to access the user’s inbox (found in 32% of incidents). The road less traveled is where—by simply using email communication—the attackers are able to spin a credible story (albeit fictitious) to convince someone to do their bidding. Persuading someone to change the bank account for the claimed recipient, for example, is found in 56% of incidents. Of course, a combination of tactics can also be used. The attackers may leverage their acquired access to a user’s inbox to look for an email chain they can hijack or search the victim’s address book to find people who can be targeted further. It’s not uncommon for attackers to add forwarding rules to make sure their activities stay undetected as long as possible, which is why …
When responding to social engineering attacks (and the same could be said of most attacks), rapid detection and response is key. The importance of timely detection is highlighted by the increasing median cost of BECs, as shown in Figure 38, which has risen steadily from 2018 and now hovers around the $50,000 mark. However, unlike the times we live in, this section isn’t all doom and gloom. Fortunately for the victims, law enforcement has developed a process by which they collaborate with banks to help recover money stolen from attacks such as BEC. More than 50% of victims were able to recover at least 82% of their stolen money. This illustrates the importance of ensuring that their employees feel comfortable reporting potential incidents to security, since their willingness to do so greatly improves the organization’s ability to respond. With this in mind, we encourage companies to step away from the “phishing exercises will continue until click rates improve” stance and adopt a more collaborative approach to security.
Much like Ransomware, which is the monetization of access to an organization’s network, BECs are just one of the many means criminals have of monetizing access to a user’s inbox and contacts.
There are a fair number of controls to consider when confronting this complex threat, and all of them have pros and cons. Due to the strong human element associated with this pattern, many of the controls pertain to helping users detect and report attacks as well as protecting their user accounts in the event that they fall victim to a phishing lure. Lastly, due to the importance of the role played by law enforcement in responding to BECs, it is key to have plans and contacts already in place.
Protect accounts Account Management [5] |
Access Control Management [6] |
Security awareness programs Security Awareness and Skills Training [14] |
Although not part of the CIS Controls, a special focus should be placed on BEC and processes associated with updating bank accounts. |
Managing incident response Incident Response Management [17] |
Choose your country to view contact details.
Existing customers, sign in to your business account or explore other support options.