CyberheistNews Vol 15 #05 | February 4th, 2025
[Eye Opener] Is DeepSeek The Subsequent Menace in Social Engineering?
AI is advancing at lightning velocity, nevertheless it’s additionally elevating some huge questions, particularly relating to safety. The newest AI making headlines is DeepSeek, a Chinese language startup that is shaking up the sport with its distilled cost-efficient, high-performing fashions. However it’s additionally elevating pink flags for cybersecurity execs.
In a single day, DeepSeek grew to become a high contender, principally pushed by curiosity. It is being praised for its effectivity, with fashions like DeepSeek-V3 and DeepSeek-R1 acting at a fraction of the fee and power utilization in comparison with opponents, being skilled on Nvidia’s lower-power H800 chips.
However here is the place issues get difficult: DeepSeek’s outputs seem like biased, favoring Chinese language Communist Get together (CCP) narratives. In some instances, it even outright refuses to handle delicate subjects like human rights.
It is a huge pink flag. Open-source AI instruments like DeepSeek have huge potential not only for productiveness but in addition for social engineering. With its light-weight infrastructure, DeepSeek may very well be weaponized to unfold misinformation or execute phishing assaults at scale.
Think about a world the place tailor-made propaganda or rip-off emails may be generated in seconds at virtually no price, fooling even probably the most tech-savvy customers. That is not a futuristic state of affairs; it is a danger we face as we speak.
The app’s speedy rise has already unsettled AI buyers, triggering a massacre in AI-related shares. For a market that is added over $14 trillion to the Nasdaq 100 Index since early 2023, that is saying one thing. Whereas DeepSeek’s effectivity is impressive–never thoughts for the second how they bought there–its potential for misuse reminds us why vigilance within the AI period is crucial.
The takeaway? DeepSeek exhibits that AI could be a double-edged sword. It is a glimpse into what the AI future might appear like quicker, cheaper, extra accessible nevertheless it’s additionally a wake-up name. As these instruments evolve, so do the ways of unhealthy actors. Staying forward means combating AI with AI.
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/eye-opener-is-deepseek-the-next-threat-in-social-engineering
Six methods menace actors will weaponize DeepSeek – By Yours Really in SC Media:
https://www.scworld.com/perspective/six-ways-threat-actors-will-weaponize-deepseek
[Live Demo] Ridiculously Simple AI Powered Safety Consciousness Coaching and Phishing
Phishing and social engineering is the #1 cyber menace to your group. Sixty-eight p.c of all information breaches are brought on by human error.
Be a part of us for a reside demonstration of KnowBe4 in motion. See how we safeguard your group from subtle social engineering threats utilizing probably the most complete human danger administration platform.
Get a have a look at THREE NEW FEATURES and see how simple it’s to coach and phish your customers.
- NEW! Synthetic Intelligence Protection Brokers lets you personalize safety coaching, cut back admin burden and elevate your human danger administration technique
- NEW! SmartRisk Agent offers actionable information and metrics that can assist you decrease your group’s human danger rating
- NEW! Particular person Leaderboards are a enjoyable manner to assist enhance coaching engagement by encouraging pleasant competitors amongst your customers
- Sensible Teams lets you use staff’ habits and consumer attributes to tailor and automate phishing campaigns, coaching assignments, remedial studying and reporting
- Full Random Phishing routinely chooses totally different templates for every consumer, stopping customers from telling one another about an incoming phishing check
Learn the way 70,000 organizations worldwide have mobilized their finish customers as their human firewall.
Date/Time: TOMORROW, Wednesday, February 5, @ 2:00 PM (ET)
Save My Spot!
https://data.knowbe4.com/kmsat-demo-2?partnerref=CHN2
Utilizing Real Enterprise Domains and Reliable Companies to Harvest Credentials
A KnowBe4 Menace Lab Publication
Authors: Jeewan Singh Jalal, Anand Bodke, and Martin Kraemer
Govt Abstract
The KnowBe4 Menace Lab analyzed a classy phishing marketing campaign focusing on a number of organizations to reap Microsoft credentials.
Menace actors utilized a compromised area, its subdomains, bulk electronic mail providers, and open redirect vulnerability to evade detection and enhance click on success charges.
The marketing campaign was lively till October 3, 2024, underscoring the necessity for ongoing cybersecurity tradition adaptation towards evolving threats.
Menace actors compromise legit enterprise domains to profit from a longtime popularity, bypass electronic mail safety gateways, and conceal from investigations that usually shrink back from legit providers. On this case, the attackers exploited present enterprise infrastructure to run a totally configured electronic mail supply providing that handed SPF, DKIM, and DMARC safety insurance policies.
The attackers created subdomains, abusing dormant CNAME entries, and compromising the DNS administration console. The attackers used a various set of ways and strategies to redirect customers to their phishing touchdown web page. Various ways are used to evade electronic mail safety choices and to extend the possibilities of profitable social engineering with targets.
The phishing touchdown web page was linked by way of QR codes in attachments, in hidden JavaScript, by way of attachments with HTML redirects, and by exploiting an open redirect of a legit URL.
Attackers constantly develop new ways, strategies, and procedures to bypass electronic mail safety options and penetrate worker inboxes. Nicely-guarded organizations leverage open-source, machine, and human intelligence to enhance the safety of their electronic mail gateways.
Cyber resilient organizations additionally practice their customers to withstand social engineering assaults by recognizing pink flags and by exercising emotional intelligence and significant considering.
[CONTINUED] at:
https://weblog.knowbe4.com/using-genuine-business-domains-and-legitimate-services-to-harvest-credentials
QR Codes Uncovered: From Comfort to Cybersecurity Nightmare
What seems like an harmless QR code has develop into a sinister weapon within the cybercriminal’s arsenal. A staggering 25% of all electronic mail phishing assaults now exploit QR codes. Why? As a result of unsuspecting customers scan first and ask questions later, creating an ideal storm of vulnerability that is sweeping by way of organizations worldwide.
Be a part of us for this eye-opening webinar the place Roger A. Grimes, Information-Pushed Protection Evangelist at KnowBe4, will peel again the layers of QR code assaults and arm you with the information to fortify your defenses.
You may uncover:
- The mechanics behind QR codes and why they seem to be a hacker’s dream
- Actual-world examples of QR code phishing that would occur to YOU
- Battle-tested methods to protect your group from these pixel-powered threats
- The key weapon in your safety arsenal: how consumer coaching on cutting-edge threats can rework your complete safety tradition
Do not let your group fall sufferer to a easy sq. of dots! Be a part of us for this important webinar and earn CPE credit score whereas studying to outsmart the QR quagmire.
Date/Time: Wednesday, February 12 @ 2:00 PM (ET)
Cannot attend reside? No worries, register now and you’ll obtain a hyperlink to view the presentation on-demand afterwards.
Save My Spot:
https://data.knowbe4.com/qr-codes-exposed?partnerref=CHN
Ideas for Detecting Actual-time Deepfakes: A Information to Staying One Step Forward
By Perry Carpenter.
Deepfakes are now not simply the stuff of sci-fi thrillers they’re right here, they usually’re deceptively good. From superstar endorsements to real-time impersonations, deepfake know-how has superior to the purpose the place recognizing one is not as simple because it was once.
On this publish, I am going to share insights from my very own testing and experimenting with present deepfake creation applied sciences. You may get a behind-the-scenes have a look at how they’re made and be taught what to be careful for thus you’ll be able to keep forward of the sport.
Understanding the Menace
Deepfakes are artificial media the place somebody’s face, voice, or each are convincingly changed or manipulated. They’re usually used for scams, misinformation, and fraud. For example, scammers have used deepfakes to impersonate executives in video calls or create faux superstar endorsements for merchandise.
The know-how behind deepfakes, like DeepFaceLab/DeepFaceLive or Deep Reside Cam, has made creating these fakes extra accessible than ever. The straightforward entry to those instruments permits inventive and academic makes use of, nevertheless it additionally lowers the obstacles for malicious functions.
Cybercriminals and scammers usually have the motivation and time to analysis and grasp these instruments, whereas Purple Teamers and Safety Consciousness professionals are steadily stretched skinny with restricted time and assets.
Due to that, I just lately created a collection of YouTube movies serving to Purple Teamers and Safety Consciousness leaders get up-to-speed on the know-how, strategies, and detection strategies. As of as we speak, this collection consists of three movies. I consider the collection as: The Defenders Information to Understanding, Creating, and Detecting Deepfakes. The collection consists of:
- Inside a celeb deepfake: How I Made Taylor Swift ‘Endorse’ My E book
- How one can create real-time deepfakes (a.ok.a. I grew to become Taylor Swift…for Science!)
- Deepfake SECRETS EXPOSED: Outsmart AI Deception with These Methods!
The newest on this collection is all about among the oddities and tells that exist in present deepfakes and that is what I might prefer to spend a little bit of time overlaying on this weblog publish.
Frequent Purple Flags in Deepfakes
Remember the fact that the know-how is consistently enhancing. Absence of a inform doesn’t imply that one thing isn’t a deepfake. That being stated, right here are some things to look out for which can be indicative of present points with as we speak’s mostly used deepfake creation packages. I’ve illustrated many of those with screengrabs from the video.
[CONTINUED] on this weblog publish with instance screenshots:
https://weblog.knowbe4.com/tips-for-detecting-real-time-deepfakes-a-guide-to-staying-one-step-ahead
Do Customers Put Your Group at Danger with Browser-Saved Passwords?
Is the recognition of password dumpers, malware that enables cybercriminals to seek out and “dump” passwords your customers save in internet browsers, placing your group in danger?
KnowBe4’s Browser Password Inspector (BPI) is a complimentary IT safety instrument that lets you analyze your group’s danger related to weak, reused and outdated passwords your customers save in Chrome, Firefox and Edge internet browsers.
BPI checks the passwords discovered within the browser towards lively consumer accounts in your Energetic Listing. It additionally makes use of publicly out there password databases to establish weak password threats and stories on affected accounts so you’ll be able to take motion instantly.
With Browser Password Inspector you’ll be able to:
- Search and establish any of your customers which have browser-saved passwords throughout a number of machines and whether or not the identical passwords are getting used
- Shortly isolate password safety vulnerabilities within the browser and simply establish weak or high-risk passwords getting used to entry your group
- Higher handle and strengthen your group’s password hygiene insurance policies and safety consciousness coaching efforts
Get your ends in a couple of minutes!
Discover Out Now:
https://data.knowbe4.com/browser-password-inspector-chn
Let’s keep protected on the market.
Heat Regards,
Stu Sjouwerman, SACP
Founder and CEO
KnowBe4, Inc.
PS: Your KnowBe4 Contemporary Content material Updates from January 2025:
https://weblog.knowbe4.com/knowbe4-content-updates-january-2025
PPS: We launched a brand new AIDA Agent! Scroll all the way down to the Callback Phishing Template
https://assist.knowbe4.com/hc/en-us/articles/30990080170771-AIDA-Template-Technology-Information
Quotes of the Week
“Human greatness doesn’t lie in wealth or energy, however in character and goodness. Individuals are simply folks, and all folks have faults and shortcomings, however all of us are born with a fundamental goodness.”
– Anne Frank – Author (1929 – 1945)
“What lies behind us and what lies earlier than us are tiny issues in comparison with what lies inside us.”
– Ralph Waldo Emerson (1803 – 1882)
You’ll be able to learn CyberheistNews on-line at our Weblog
https://weblog.knowbe4.com/cyberheistnews-vol-15-05-eye-opener-is-deepseek-the-next-threat-in-social-engineering
Safety Information
Beware: Cellular Phishing Mimicking the USPS Is On the Rise
Researchers at Zimperium warn that a big phishing marketing campaign is impersonating the US Postal Service (USPS) to focus on cell units with malicious PDF recordsdata. The objective of the marketing campaign is to direct customers to a spoofed USPS web site designed to reap private info.
“The investigation into this marketing campaign uncovered over 20 malicious PDF recordsdata and 630 phishing pages, indicating a large-scale operation,” the researchers write.
“Additional evaluation revealed a malicious infrastructure, beginning with touchdown pages designed to steal information, that would doubtlessly affect organizations throughout 50+ international locations.
This marketing campaign employs a posh and beforehand unseen approach to cover clickable parts, making it tough for many endpoint safety options to correctly analyze the hidden hyperlinks.”
Notably, the phishing marketing campaign used a brand new obfuscation approach that allowed the malicious hyperlinks to evade detection by safety merchandise. “The PDFs used on this marketing campaign embed clickable hyperlinks with out using the usual /URI tag, making it more difficult to extract URLs throughout evaluation,” Zimperium explains.
“Our researchers verified that this methodology enabled recognized malicious URLs inside PDF recordsdata to bypass detection by a number of endpoint safety options. In distinction, the identical URLs had been detected when the usual /URI tag was used. This highlights the effectiveness of this system in obscuring malicious URLs.”
The researchers be aware that PDFs are generally utilized in enterprise settings, so staff should be cautious of attackers utilizing these recordsdata to ship phishing hyperlinks.
“The widespread use of PDFs is introducing important safety dangers to the enterprise, significantly when focused to cell units,” the researchers write. “PDFs have develop into a typical vector for phishing assaults, malware, and exploits as a consequence of their capacity to embed malicious hyperlinks, scripts, or payloads.
On cell platforms, the place customers usually have restricted visibility into file contents earlier than opening, these threats can simply bypass conventional safety measures.” KnowBe4 empowers your workforce to make smarter safety selections on daily basis. Over 70,000 organizations worldwide belief the KnowBe4 platform to strengthen their safety tradition and cut back human danger.
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/beware-mobile-phishing-mimicking-the-usps-is-on-the-rise
Microsoft is Nonetheless the Most Generally Impersonated Model in Phishing Assaults
Microsoft, Apple, and Google had been probably the most generally impersonated manufacturers in phishing assaults final quarter, in accordance with researchers at Examine Level.
“Microsoft retained its dominance as probably the most imitated model in phishing schemes, accounting for a staggering 32% of all makes an attempt,” Examine Level says. “Apple adopted with 12%, whereas Google ranked third.
Notably, LinkedIn reentered the listing at fourth place, emphasizing the persistent focusing on of know-how and Social Community manufacturers.
The persistence of phishing assaults leveraging main manufacturers underscores the crucial want for consumer schooling and superior safety measures. Verifying electronic mail sources, avoiding unfamiliar hyperlinks, and enabling multi-factor authentication (MFA) are very important to guard towards these evolving threats.”
Examine Level additionally noticed a spike in phishing assaults impersonating clothes manufacturers throughout the holidays, mimicking manufacturers like Adidas, LuluLemon, Hugo Boss, Guess, and Ralph Lauren.
“The vacation season noticed a surge in phishing campaigns impersonating well-known clothes manufacturers,” the researchers write. “Fraudulent domains, similar to nike-blazers[.]fr and adidasyeezy[.]ro, replicated official web sites to mislead buyers with faux reductions, in the end stealing login credentials and private info.
These fraudulent websites replicate the model’s emblem and provide unrealistically low costs to lure victims. Their objective is to trick customers into sharing delicate info, similar to login credentials and private particulars, enabling hackers to steal their information.”
Examine Level says customers can keep away from falling for these assaults by following safety finest practices, together with:
- Putting in up-to-date safety software program.
- Recognizing pink flags in unsolicited communications.
- Avoiding interactions with suspicious hyperlinks or web sites.
Weblog publish with hyperlinks:
https://weblog.knowbe4.com/microsoft-is-still-the-most-commonly-impersonated-brand-in-phishing-attacks
What KnowBe4 Clients Say
“Hello Stu, Thanks for reaching out! We’re actually proud of the platform and have already observed enhancements throughout our workforce. Folks have develop into extra vigilant, and efficiently reported just a few actual assaults that slipped by way of our electronic mail safety. I actually consider KnowBe4 has helped us develop into a greater model of ourselves.”
– M.I., Data Safety Program Supervisor
The ten Attention-grabbing Information Gadgets This Week
Cyberheist ‘Fave’ Hyperlinks