Cybercrime is a global issue, and while money is a huge motivator for criminals, it's far from the only one. Cybercriminals are driven by a range of incentives—bragging rights, espionage, blackmail, and even the thrill of causing disruption. Some schemes require significant effort, and it can be difficult to comprehend why someone would choose to apply their skills for such malicious purposes. As someone dedicated to defending against these attacks, I see a stark contrast between the work I do and those who choose the path of cybercrime.

According to the FBI's 2023 Internet Crime Report, the FBI's Internet Crime Complaint Center (IC3) received an all-time high of 880,418 cybercrime complaints in 2023, leading to potential losses exceeding $12.5 billion. This marked a nearly 10% increase in complaints and a staggering 22% increase in losses compared to 2022. Despite these numbers, the FBI emphasizes that the real scale of cybercrime may be even larger, as only a fraction of incidents are reported.

In this post, I'll summarize a few common cyberattacks, share some personal experiences, and offer advice on how to defend yourself or your business against these increasingly evolving threats.

Phishing

FBI IC3 reports phishing as the most common form of cyber attack 298,878 complaints received with losses over $834 million. Phishing is so common now that it's almost become part of our everyday language. Recently, I even received an email saying, "I'm phishing for your thoughts," which was a clever, albeit spammy, twist on the term that left an impression on me. However, phishing remains one of the biggest threats in cybersecurity today.

According to NIST, phishing is defined as:

"A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a website, in which the perpetrator masquerades as a legitimate business or reputable person."
"Tricking individuals into disclosing sensitive personal information through deceptive computer-based means."

That last part—deceptive computer-based means—is important. Phishing methods are increasingly more sophisticated in mimicking trusted sources, making it harder for the average user to detect schemes.

Example: Sometimes our curiosity gets the best of us. As a cybersecurity pro, I've had direct experience defending and reacting to phishing, and have even at least partly fallen for phishing attempts.

  • A user clicked on a seemingly harmless PDF attachment from what appeared to be a legitimate source, only to find out it was loaded with malware that began sending phishing emails to everyone in his Outlook address book.
  • A colleague received an email from an apparent legitimate source and clicked on a link in the email that led to a fake login page. He entered his credentials. IT didn't realize the breach until months later when hackers hijacked his email account and targeted his contacts.
  • In one instance, a carefully crafted phishing email test fooled me into clicking on a link. Fortunately, it was just a test, but it highlighted how even the trained eye can sometimes be deceived.

How to Defend Against Phishing:

  • Awareness: Know what information about you is out there and how it can be used against you. Attackers often gather reconnaissance before launching a calculated attack.
  • Verify all Password Requests: If you're entering a password into a website or application it should be a legitimate site you are signing up for or a familiar, trusted website.
  • Never Share Passwords: With few exceptions (such as sharing credentials with a system administrator), you should never share passwords—especially not with coworkers, strangers, or anyone pretending to be an authority figure.
  • Enable Multi-Factor Authentication (MFA): Even if attackers get your password, MFA can prevent them from gaining access.
  • Be Skeptical: Phishing emails are becoming harder to detect, but if something feels off, trust your instincts. If it smells like a skunk, it probably is.
  • Check for Compromised Emails: Regularly check if your email address has been compromised using sites like "Have I Been Pwned" and take steps to secure your accounts if needed.

Password Leaks

Whenever we create accounts on third-party websites, our security is only as strong as their defenses. If these sites experience a data breach, your passwords may wind up on the dark web, where they are sold to malicious actors. This is a major problem because many people reuse passwords across multiple sites, amplifying the risk.

Example: Years ago, I was guilty of reusing passwords across sites. One day, after landing from a flight, I received an email informing me that my Netflix account had been compromised. The culprit? A password I had been using for years, which had been leaked in a data breach. Thanks to my password manager, I was able to quickly change my passwords across affected sites, but the incident served as a wake-up call. Just a few days ago, I received a notice from PlayStation that my account was accessed from a foreign location. The password hadn't been updated because I hadn't used the account in years, yet it was still vulnerable.

How to Defend Against Password Leaks:

  • Unique Passwords: Never reuse passwords across multiple accounts. While this can be difficult, password managers make it much easier to manage unique credentials.
  • Use a Trusted Password Manager: I personally use Keeper and KeePass for both personal and business accounts. Many browsers and devices now offer built-in password management features as well.
  • Be Cautious with Browser-Stored Passwords: Avoid storing passwords in browsers, especially on work computers. These passwords can be accessed if someone gains access to your Windows account, potentially leaving your credentials exposed.
  • Monitor for Breaches: Regularly check to see if your passwords have been part of a data breach. If they have, change them immediately across all accounts where they were used. "Have I Been Pwned" also offers a leaked password check.

Vishing

While phishing relies on email and websites, vishing (voice phishing) uses phone calls to manipulate victims into providing sensitive information. These calls often induce fear or urgency, pushing people to act before thinking critically.

Example: I recently received a voicemail from a "Bryan from the legal department," though no specific legal department was mentioned. The call mentioned someone I knew by name, claiming they were in trouble. The caller's New England accent and area code caught my attention, as we tend to think of cybercriminals as being in far-off places, but they can be local too. The goal was clearly to scare me into sending money or personal information under the guise of helping someone I know.

How to Defend Against Vishing:

  • Be Skeptical: Never provide personal or financial information over the phone unless you're certain of the caller's legitimacy. If you feel unsure, ask for a callback number and verify their identity.
  • Let Unknown Calls Go to Voicemail: If you don't recognize the number, don't answer the call. Let it go to voicemail and assess the message before deciding how to respond.
  • Be Aware of AI Voice Generation: With advancements in AI technology, cybercriminals now use voice generation software to convincingly imitate the voices of people you know or legitimate sources. If something feels off, contact the person or organization directly through another channel to confirm.
  • Use Multi-Factor Verification: Before sharing any sensitive information over the phone, ensure there is some form of multi-factor verification in place, such as confirming details through a known, secure channel.

Ransomware

Ransomware is a major cybersecurity threat and is a type of malware that encrypts the victim's data and demands payment, usually in cryptocurrency, for the decryption key. Consider ransomware the payload of an effective hack. From an external surface, the attacks are typically carried out through phishing emails, malicious downloads, or vulnerabilities in outdated software. Once the attacker has infiltrated the internal environment, the victim's files are rendered inaccessible by way of encryption, and the attackers threaten to leak or destroy the data if the ransom isn't paid.

Example: Ransomware is becoming an increasingly dangerous threat, not only to businesses but also to public safety. In 2023, the City of Dallas experienced a significant ransomware attack that took down critical emergency services, including 911 dispatching systems, delaying response times and putting lives at risk. According to a report by Emsisoft, "At least 95 government entities were impacted in 2023," demonstrating how widespread this threat has become. The FBI's 2023 Internet Crime Report revealed that government agencies were the third-largest ransomware targets, with 153 complaints from critical infrastructure sectors that were affected by ransomware attacks.

As these attacks grow more sophisticated, they threaten not just financial loss but critical services society relies on.

How to Defend Against Ransomware:

  • Backup Your Data: Regularly back up your data to a secure location.
  • Monitor Backup Integrity: Verify that your scheduled backups are accurate and up-to-date, with clearly timestamped restore points. Backup monitoring ensures your recovery data is reliable when needed.
  • Test Backup Restore Points: It's important to perform regular tests—at least quarterly—on backup restore points. These tests help identify any gaps in your backup process, ensure that recovery systems function properly, and provide your staff with hands-on training in data restoration. Running these simulations can have a significant impact in reducing downtime during a real-world recovery scenario.
  • Keep Software Updated: Cybercriminals often exploit known vulnerabilities in outdated systems. Installing patches, applying software updates, and applying security fixes regularly ensures your systems remain protected from these threats.
  • Email Security: Email is one of the most common delivery methods for ransomware. Be cautious about opening email attachments or clicking on links from unknown or suspicious sources. Implementing third-party email security solutions, like Mimecast, adds an additional layer of protection. At Santsec, we go a step further by enforcing an internal policy that prohibits sharing URL links over email, significantly reducing the risk of phishing and malicious attachments circulating within our network.

Distributed Denial of Service (DDoS) Attacks

DDoS attacks overwhelm a target's server, network, or website by flooding it with an excessive amount of traffic, causing the system to crash or become unavailable to legitimate users. These attacks often use botnets—a network of infected computers that operate under the control of the attacker—to carry out the attack.

Example: In 2016, Dyn, a major domain name system provider, was hit with one of the largest DDoS attacks in history. The attack disrupted access to major websites like Twitter, Netflix, and Reddit by overwhelming Dyn's infrastructure.

How to Defend Against DDoS Attacks:

  • Use Load Balancers: Load balancers help distribute incoming traffic across multiple servers, preventing any single server from being overwhelmed by a large volume of requests. This ensures that the system remains operational even during high-traffic periods or DDoS attempts.
  • Use DDoS Mitigation Services: Cloud-based DDoS protection services can help detect and filter out malicious traffic.
  • Implement Rate Limiting: Limit the number of requests a system will accept in a certain period to mitigate the effect of a potential attack.
  • Monitor Traffic with Firewalls: Configure firewalls to monitor incoming traffic patterns and alert administrators of unusual activity. Firewalls can help detect the early stages of a DDoS attack and block excessive traffic before it overwhelms your systems.
  • Monitor Traffic: Use network monitoring tools to detect unusual traffic spikes early on and take preventative measures before the attack fully escalates.

Malware

Malware, short for "malicious software," encompasses a wide range of harmful programs designed to disrupt, damage, or gain unauthorized access to computer systems. Malware can include viruses, worms, Trojans, and spyware, among others. Cybercriminals use malware to cause disruption, steal information, spy on users, or gain control of their systems.

Example: In the early 2000s, the ILOVEYOU virus spread rapidly through email systems, tricking users into downloading a malicious attachment that overwrote files and spread to all their contacts. It caused billions of dollars in damages and illustrated how a simple email could cause global chaos.

How to Defend Against Malware:

  • Install Antivirus Software: Use reliable antivirus and anti-malware software, and make sure it's updated regularly.
  • Don't Download Suspicious Files: Avoid downloading files or clicking on links from unknown sources, especially those that look suspicious.
  • Use Firewalls: Firewalls can help block malicious traffic and prevent malware from spreading across your network.

Social Engineering Attacks

Social engineering involves manipulating individuals into divulging confidential information by exploiting human psychology rather than using technical hacking methods. Attackers often impersonate trusted figures (like tech support, government officials, or coworkers) to convince the victim to share sensitive information or grant access to systems.

Example: In a well-known case from 2016, hackers used social engineering to convince a high-level executive at a major tech company to wire $100 million to a fraudulent bank account. The attackers posed as business partners through email and used a mix of confidence and urgency to push the transaction through.

How to Defend Against Social Engineering:

  • Awareness and Training: Educate employees or family members about the risks of social engineering and how to recognize suspicious behavior.
  • Verify Identities: Always verify the identity of the person or organization before sharing sensitive information or making payments.
  • Develop Protocols: Establish strict protocols for approving transactions, especially for large sums of money.

Protect Your Organization from Cyber Threats

Knowledge is your first line of defense. At Santsec, we help organizations build comprehensive cybersecurity strategies that protect against the evolving threat landscape.

Defense Strategies:
  • • Employee security training programs
  • • Multi-layered security architecture
  • • Incident response planning
Our Services:
  • • Vulnerability assessments
  • • Security awareness training
  • • Threat intelligence monitoring