Skip to main content

What are AI-powered phishing attacks?

AI powered phishing attacks

A traditional phishing attack is a social engineering tactic which is used to steal confidential information via emails, direct messages, dubious websites. AI has now increased their impact by making these attacks appear more authentic and difficult to detect.

Fraudsters are using large language models like ChatGPT to include real time information and create a sense of urgency for victims to act in the phishing emails. There have been cases of fake ChatGPT apps, that deploy phishing campaigns upon download to steal users' information. Phishing websites were also found to spread malware using name and images from OpenAI.

Spear phishing attacks are targeted towards specific user or organization with information obtained from social media. With sophisticated GenAI, spear phishing emails can be written easily and are more likely to trick the recipients. 

Vishing (voice phishing) and deepfakes are other types of phishing that can target victims by using GenAI to clone voice of a trusted contact and create convincing fake images, audio, video recordings.

Best practices to protect yourself from AI-powered phishing attacks:

  • Stay informed with regular training about phishing attacks and simulated phishing exercises.
  • Check for emails that are creating a sense of urgency and classic phishing email errors.
  • Verify sender's email address and inspect links and attachments before clicking on it.
  • Use Multi factor authentication as an extra layer of protection to access accounts.
  • Keep up to date with security practices to address new threats.
  • Prioritize email security and anti-phishing tools using a layered security strategy. 


Comments

Popular posts from this blog

Rising Fraud in eCommerce

Criminal attacks on online retailers have increased dramatically since the COVID era. AI technologies are becoming highly scalable to empower fraudsters to heavily automate their sophisticated attacks and overwhelm rules-based prevention systems. Signifiyd's "State of Fraud and Abuse 2024" study indicated that efforts to place fraudulent orders climbed 19% in the first half of 2024 compared to the previous year. Recent report posted by Juniper Research, a Hampshire, UK-based consultancy predicts the value of e-commerce fraud to rise from $44.3 billion in 2024 to $107 billion in 2029 – a 141% increase. According to the author Thomas Wilson's statement , “eCommerce merchants must seek to integrate fraud prevention systems that offer AI capabilities to quickly identify emerging tactics. This will prove especially important in developed markets, where larger merchants are at higher risk of being targeted for fraud, such as testing stolen credit cards.” Merchants are adv...

2024: The year of most damaging data breaches

TransUnion's report on H2 2024 fraud trends emphasizes the severity of data breaches in the US, which have reached historic levels in the first half of 2024. Healthcare, financial services, and education are among the industries with the highest volume of breaches. Healthcare also had the most significant breach, with criminals targeting third-party service providers like payroll services, medical billing vendors as a source for multiple user credentials. Contrary to healthcare, financial services were mostly exposed to primary data breach which is a direct attack on the organization. Top confidentiality data compromised in the US data breaches H1 2024 includes name, social security number (SIN), date of birth, home address, medical history,  driver's license, banking account numbers, phone numbers, healthcare provider & insurance account number. Substantial year-over-year increase has been observed in the breach of medical history data, healthcare provider and healthcare...

What are Authorized Push Payment (APP) frauds?

APP fraud happens when people are duped into making payments to fraudsters, believing they are undertaking genuine transactions. It relies on the fraudster's ability to manipulate confidence and create urgency through advanced social engineering techniques. Impersonation scam is where the fraudsters impersonate trusted entities to manipulate victims into transferring funds under false premise to acquire their account information, assets, etc. Key strategies to combat APP fraud includes: Using advanced fraud detection system to detect malicious fraud attempts. Educating customers on recognizing the potential scams and protecting themselves. Implementing transaction monitoring to identify risky activities on a real-time basis. Account takeover fraud is a forerunner to APP fraud. With ATO prevention solution, it is possible to prevent bad actors from fraudulent activities. Impose additional transaction checks with time delays for high-value or unusual transactions.