Page 94 - Cyber Defense eMagazine June 2024
P. 94

their session has expired.  To resume the chat, they must log back in with their password.  By delaying
            the ask for the sensitive piece of information and then suddenly requesting it, they get the victim engaged
            with the scam, and increase the likelihood that they will supply the password.

            Once supplied with the password, the adversary will delay the victim while they test the credentials.   If
            the credentials are invalid or two factor authentication is enabled, the criminal will further interact with the
            victim to bypass these obstacles before claiming that their appeal has been successfully submitted and
            they  will  receive further communication  within  a few  days.   In  reality, the  account  has  already been
            compromised.



            How to Protect against this Threat

            The  targeting  of  Meta  using  multiple  unusual  and  advanced  tactics  is  a  clear  indicator  of  the  value
            cybercriminals place on social media business accounts.  Consider the following tactics to effectively
            defend against threats in this area.

               •  Best practices around Email Security and end-user Security Awareness Training are paramount.
                   By  using  a  multi-layered  email  security  solution  that  can  block  malicious  emails  from  being
                   delivered to end users and educating end users on how to identify and report suspicious emails
                   that evade security you greatly decrease the risk of having your credentials compromised
               •  Secure  your  organizations’  social  media  accounts  using  the  most  advanced  identity  features
                   available to them (MFA, Security Keys, and unrecognized device alerts as of this writing).
                              ▪  Consider directing executives or other high profile individuals to secure their own
                                 personal accounts in the same way.
               •  Limit access to account credentials to those individuals who absolutely require them.
                              ▪  While not feasible in all organizations, an even more secure implementation is to
                                 consider having different individuals control different authentication factors.  For
                                 example, have the main user of the account own the password, but a separate
                                 individual own the device which receives MFA codes.



            About the Author

            Michael Tyler is the Senior Director of Security Operations at Fortra. Overseeing
            Managed  Cybersecurity  Services  for  the  company’s  Digital  Risk  and  Email
            Security  solutions,  he  also  leads  the  Managed  Threat  Intelligence  group
            supporting  companies  aiming  to  gain  deeper  understanding  of  adversaries
            targeting  their  organizations.    With  more  than  15  years  of  experience  in
            cybersecurity, Michael has a passion for uncovering the “why” behind attacker
            tactics and developing effective countermeasures to disrupt their operations.  He
            also loves buffalo chicken pizza.  Michael can be reached online via email at
            [email protected] or on LinkedIn at https://www.linkedin.com/in/michaeltyler7/, as well as via our
            company website at https://fortra.com





            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          94
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   89   90   91   92   93   94   95   96   97   98   99