top of page
  • Writer's picturemeowdini

New Hacker Tactics in 2024: Unpaid Invoices Remain the Top Bait for Businesses

Cybercriminals are relying on open redirects, fake invoice bait, and Living-off-the-Land (LotL) techniques to bypass security systems, according to the HP Wolf Security Threat Insights quarterly report. The report provides real-world cyberattack analysis to help organizations understand the latest techniques hackers are using to evade detection and create breaches.

Why Unpaid Invoices Remain a Top Threat

The report highlights the continued effectiveness of phishing emails disguised as legitimate invoices. This tactic preys on a common pain point for many businesses: overdue payments.  Criminals often target specific companies or industries and tailor their emails to appear genuine.  These emails may contain malicious attachments or links that, when opened, can download malware or steal login credentials.


Beyond Fake Invoices: The Rise of Open Redirects and LotL

While fake invoices are a prevalent threat, the report also identifies two concerning trends:

  • Open Redirects: Hackers are manipulating legitimate advertising platforms to insert redirects within trusted websites. Users visiting these sites might be unknowingly directed to malicious ones designed to steal data or infect devices.The seamless integration makes it difficult for users to detect the switch.

  • Living-off-the-Land (LotL) Techniques: This tactic involves leveraging legitimate system tools and functionalities for malicious purposes. For instance,the report mentions how attackers abused the Windows Background Intelligent Transfer Service (BITS) to download malware undetected. Since BITS is a trusted service, security systems might not flag its activity.


Protecting Your Business from Evolving Threats

The report emphasizes a layered approach to cybersecurity. Here are some key steps businesses can take:

  • Security Awareness Training: Educate employees on identifying phishing attempts and suspicious emails. Training should cover how to verify email authenticity, avoid clicking on unknown links, and report suspicious activity.

  • Multi-Factor Authentication (MFA): Implementing MFA adds an extra layer of security beyond passwords. Even if a hacker steals login credentials, they'll still need a secondary verification code to gain access.

  • Endpoint Security Solutions: Invest in robust endpoint security solutions that can detect and block malware, phishing attempts, and other malicious activities.

  • Regular Security Audits and Updates: Conduct regular security audits to identify vulnerabilities in systems and applications. Ensure timely updates for operating systems, software, and firmware to patch security holes.



By staying informed about the latest hacking tactics and implementing appropriate safeguards, businesses can significantly reduce the risk of falling victim to cyberattacks.



The report likely covers a broader range of threats beyond what was discussed here. Consider searching for the full HP Wolf Security Threat Insights report for a more comprehensive analysis.

The rise of cloud computing introduces new attack vectors. Businesses should prioritize cloud security measures when migrating data and workloads to the cloud.

Social engineering tactics remain a significant threat. Phishing emails are just one example. Training employees to be vigilant against social engineering attempts is crucial.

By understanding the evolving threat landscape and taking proactive measures, businesses can build a strong defense against cyberattacks



Source: Gandul.ro



7 views0 comments

Comments


bottom of page