Imagine your phone rings. It's a supposed supplier who says he has an urgent package for your company. At the same time, an email flutters into your inbox. But stop! Before you follow the caller and open the attachment, this very click could lead you into the middle of a cyber network full of intrigue - this form of cyber attack works on different levels!

Crossfire of a new, sophisticated cyberattack

A call, an email, a problem: Once upon a time in Switzerland, a company suddenly found itself caught in the crossfire of a new, sophisticated cyber attack. This story doesn't begin in a dark alley or a seedy online forum. No, it starts with a normal phone call.

A supposed supplier called, spoke of a package and an email that was supposed to contain the delivery code. But in the middle of a telephone conversation, the employee falls into the trap of what appears to be an email.

Perfidious game with reality

The email didn't contain any text, but rather an image - an image that looked like a normal email. What started as a harmless communication resulted in a download that was far more dangerous than it first appeared.

Sophos, a security company that investigated this particular case, was amazed at the ruthlessness and sophistication of this combined attack. This was no ordinary phishing method, but the beginning of a new wave of cyberattacks.

The scent of suspicion, but what is so special? The cyber criminals obviously knew who they were dealing with. Although the fake email was written in French, technical evidence suggested that the attackers knew the target was German-speaking. This shows how well prepared the attackers were and how persistent they were.

Why was this attack so different?

Sophos highlighted some important aspects in its research. Andrew Brandt, one of the company's senior researchers, emphasized how atypical this attack was. It wasn't just the combined call and email approach. It was the fact that the attackers were so targeted and specific that they knew exactly how to best achieve their goal.

The end or the beginning? This specific attack was stopped by an alert employee who became suspicious and pulled the plug. But that's not the end. A similar attack was discovered in Australia, suggesting that this new method of cyberattack is spreading worldwide.

Conclusion

The digital world not only offers opportunities, but also countless dangers. The story of the Swiss company shows how cybercriminals continually adapt and improve their tactics. It shows the importance of always being vigilant, constantly educating yourself and following the latest safety protocols. It's no longer enough to just check your email. You also have to be careful on the phone. Fraud over the phone? Now you know what to do.

MIMIKAMA
Workshops and lectures from Mimikama not only offer a firework of impulses, but also real added value on the subject of media competence and media education.

Mimikama.education

can impart media literacy through targeted lectures and workshops. Various target groups such as students, teachers and parents can be reached and sensitized. How do search engines work?

How can I search images? These techniques are particularly helpful for exposing fakes, hoaxes or dangerous hoaxes. NEW! Geoguessing workshops at Mimikama! Turn the search for truth into an exciting adventure with our geoguessing workshop!

Not yet over in Austria : Manipulation in the shadow of the Internet: ORF and the Russian propaganda media and the trap of disinformation

Source: Sophos

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )