Page 160 - Cyber Defense eMagazine July 2024
P. 160

celebrities,  politicians,  or other public  figures,  that can  spread  misinformation,  damage  reputations,  or
            incite conflicts.

            In these instances,  expertise becomes crucial in swiftly identifying and mitigating the threat. Deepening
            your  understanding  of  the  imposters  and  deploying  effective  countermeasures  is  imperative  for
            maintaining a company’s integrity in the digital landscape. Recognizing fraud and responding effectively
            to deceitful  accounts  is critical in shielding  executives  from  harm and protecting  the  organization  from
            potential reputational and financial repercussions.

            As technology evolves and improves, detecting deepfakes will become increasingly difficult. But there is
            hope  on  the  horizon,  as  AI  can  also  be  used  for  good,  to  build  up  defensive  postures,  and  assist  in
            flagging  scams  before  they  become  problems.  Keep  reading  to  learn  more  about  outsmarting  the
            scammers.



            Unmasked: Recognizing scammers to stop being victimized

            The best way for executives to avoid becoming victims is to detect threats before they cause financial or
            data loss  and damage.  The  incident  mentioned  earlier  underscores  just how  simple and  easy it is for
            attackers  to  set  up  fake  profiles  on  multiple  channels,  including  LinkedIn,  Telegram,  WhatsApp,  and
            social media platforms, to establish legitimacy before contacting unsuspecting  employees or partners to
            carry out their scam.

            These impersonators  build detailed profiles using publicly available information, including real photos of
            individuals and personal details, even mimicking their unique speaking style and tone, all lending greater
            legitimacy. Therefore, protecting against fake accounts and social media impersonation requires a multi-
            faceted approach, beyond just enforcing unique passwords.

            The  first  step  in defending  against  impersonation  attacks  is  recognizing  a fraudulent  profile.  Through
            close  examination,  impersonation  accounts  can  display  subtle,  but  telling  anomalies  compared  to
            authentic profiles.  For example, profile pictures may look generic, stock-like, or unnatural; bios may be
            too vague or oddly formal for social media; and often, account creation dates appear very recent. These
            clues will often give away imposter profiles,  which are engineered  for malicious activities,  like phishing
            scams, installing malware, and orchestrating  broader cyberattacks.  Train employees to create a routine
            of scrutinizing profiles for completeness and authenticity. Encourage them to explore the digital footprint
            of suspicious accounts and cross-reference  what they find with other public information where possible.
            Genuine accounts usually have a consistent history of posts and interactions, unlike fake accounts which
            may show minimal activity.

            Secondly, it is much more difficult to fake your personal and professional connections. It is reasonable to
            expect that an accomplished  executive will have a long list of contacts, current and former associates,
            customers, and friends following their profiles. So, examine followers and friends or connections lists to
            identify potential  imbalances  in the ratio of followers  to following.  Fake accounts will often follow many
            but conversely  are only followed  by a few. Such accounts  may also follow  a pattern of  targeting  high-
            profile  or  similar  accounts  disproportionately.  You  can  also  use  analytics  tools  to  assess  the  ratio  of






            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          160
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   155   156   157   158   159   160   161   162   163   164   165