{"id":310,"date":"2022-03-28T08:13:57","date_gmt":"2022-03-28T07:13:57","guid":{"rendered":"https:\/\/cyberphil.azurewebsites.net\/?p=310"},"modified":"2022-03-28T08:16:34","modified_gmt":"2022-03-28T07:16:34","slug":"charity-begins-with-caring","status":"publish","type":"post","link":"https:\/\/www.cyberphil.co.uk\/?p=310","title":{"rendered":"Charity Begins by Taking Care"},"content":{"rendered":"\n<p class=\"has-text-align-left\">We define Social Engineering as \u2018attacking the human\u2019.&nbsp; Which sounds quite brutal and although in the world of cyber this is not a physical attack against a human \u2013 it is a threat that seeks out human vulnerabilities.<\/p>\n\n\n\n<p class=\"has-text-align-left\">I normally talk about what makes us human by describing your average person as:<\/p>\n\n\n\n<p class=\"has-text-align-left\">Loving and trusting.&nbsp; Most people on the planet are kind, charitable and peaceful.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Pack animals.&nbsp; We, by our very nature and existence are herd or pack animals.&nbsp; We live in close family units, within towns or cities and countries with history, traditions and culture that make us who we are.&nbsp; We are also very patriotic, family orientated and biased because of our way of life.&nbsp; We also follow the herd for a large percentage of the time.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Lazy.&nbsp; We will normally take the quickest or easiest route available.&nbsp; Whether that be a trip to the shops, path to success or way to make money \u2013 if there is a quick and easy option, we will take it.<\/p>\n\n\n\n<p class=\"has-text-align-left\">There are lots of other traits that make us who we are and of course there are some that don\u2019t fit into this general model.<\/p>\n\n\n\n<p class=\"has-text-align-left\">The attributes above give us strength \u2013 but inversely make us vulnerable.<\/p>\n\n\n\n<p class=\"has-text-align-left\">When there is a realistic threat which seeks to exploit a vulnerability \u2013 then we are all at risk of attack.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Cyber threats that involve social engineering are widespread and the techniques, tactics and procedures employed by threat actors are equally diverse.<\/p>\n\n\n\n<p class=\"has-text-align-left\">One thing that criminals in particular are good at is evolving and developing new techniques quickly to circumnavigate problems or to exploit new avenues of opportunity.<\/p>\n\n\n\n<p class=\"has-text-align-left\">We witnessed this several years ago at the outbreak of Covid.&nbsp; Criminals in all forms were using the vulnerability of humans to exploit them.&nbsp; Watering Hole sites, phishing campaigns and online fraud using the cover of Covid all sprang up.<\/p>\n\n\n\n<p class=\"has-text-align-left\">And so it should be no surprise that the outbreak of war in Eastern Europe should present an opportunity for cybercriminals to rejig their tactics to expose those human traits.<\/p>\n\n\n\n<p class=\"has-text-align-left\">We all want to help.&nbsp; If you are not able to sponsor a refugee then the easiest way to help is to make a donation to a charity which is helping.&nbsp; Serves several purposes \u2013 helps your fellow human, makes you feel good about doing something and is quick and easy.&nbsp; Some others have rented vans and trucked to Poland to deliver aid, others are running marathons and some are physically in place to assist NGOs where they are needed.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Me &#8211; I will log on and donate a couple of quid.<\/p>\n\n\n\n<p class=\"has-text-align-left\">But let the donator beware!&nbsp; In the latest NCSC Weekly Report (25 Mar 2022) there is a small but perfectly formed item entitled \u2018Phishing scams \u2018fundraising\u2019 for Ukraine\u2019.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><a href=\"https:\/\/www.ncsc.gov.uk\/report\/weekly-threat-report-25th-march-2022#section_2\">https:\/\/www.ncsc.gov.uk\/report\/weekly-threat-report-25th-march-2022#section_2<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\">Already Action Fraud (in the UK) have received nearly 200 reports of scam emails purporting to raise money for those affected in the conflict.<\/p>\n\n\n\n<p class=\"has-text-align-left\">It is important to help if you can.&nbsp; But it is important to ensure that your help is directed to the right cause.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Phishing campaigns are becoming more sophisticated.&nbsp; We are all vulnerable to them.&nbsp; At a time of heightened vulnerability the risk is bigger.<\/p>\n\n\n\n<p class=\"has-text-align-left\">In the words of Ed Sheeran \u2013 before you save someone else, make sure you save yourself from online fraud (note:&nbsp; not the actual lyrics)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We define Social Engineering as \u2018attacking the human\u2019.&nbsp; Which sounds quite brutal and although in the world of cyber this is not a physical attack against a human \u2013 it is a threat that seeks out human vulnerabilities. I normally &hellip; <\/p>\n","protected":false},"author":1,"featured_media":312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","grid-sizer"],"_links":{"self":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=310"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/310\/revisions\/314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/media\/312"}],"wp:attachment":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}