New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Spoofing attacks aren’t going away in 2023, but here’s what you can do about them

Going into 2023, spoofing attacks will increase even more — but individuals and businesses who understand the tricks will stay ahead of malicious actors.

Kolawole Samuel Adebayo by Kolawole Samuel Adebayo
December 27, 2022
in Cybersecurity
0
A picture of a masked man, indicative of someone trying to steal.

Image Source: Tarik Haiga via Unsplash

Share on FacebookShare on Twitter

In a 2019 spoofing attack, malicious actors rerouted user clicks and generated Bitcoin using supposedly legitimate BBC News webpages. Spoofing attacks like this are quite common in today’s cyber landscape.  When you consider that a staggering 3.1 billion domain spoofing emails are sent daily, according to a report by Proofpoint, you realize just how critical spoofing is to the attack cycle. With increased digitization across enterprises in 2022, especially on the back of the COVID-19 pandemic, malicious actors now have a larger attack surface to exploit.

In fact, cybersecurity projections from the World Economic Forum showed that supply chain attacks like the SolarWinds hack would increase this year — and they did (you can find the 5 biggest supply chain attacks in 2022 so far here, according to security blog ImmuniWeb). The pace isn’t going to slow down next year, as experts note we will see more of such attacks in 2023. Considering the level of havoc that a hack can wreak, like irreparable damage to brand reputation and serious financial losses, every organization must now prioritize adopting a proactive, rather than reactive, approach towards cybersecurity in the coming year.

While spoofing may seem like a simple hacking technique, a number of notable, high-profile organizations have suffered severe financial and reputational damage from spoofing attacks. Bad actors are getting more sophisticated by the minute, with a survey from McKinsey stating that companies’ cybersecurity measures aren’t keeping pace with today’s business environment demands. Learning how to win the spoofing war against cyberattackers in 2023 could be the difference between protecting your business and scrambling to pick up the pieces in the wake of an attack later down the road

Don’t choose the reactionary side of the cybersecurity equation next year. Yes, spoofing attacks will grow even stronger, but organizations that prepare ahead will enjoy peace of mind and rest easy, even in the midst of the impending cyber chaos.

Here’s how you can win the spoofing war in 2023.

Spoofing basics

First, let’s understand what spoofing means. Spoofing is really a game of deception. The word “spoof” literally means “fake”. Someone somewhere acting like someone somewhere else to steal something valuable— that’s spoofing.

For a more technical definition, Gartner defines spoofing as “a process whereby a router responds to keep-alive messages from a host rather than passing them on to the remote client, thus saving call charges— used mainly in Integrated Services Digital Network (ISDN).” In other words, a would-be cybercriminal pretends to be someone or an organization that you trust to gain access to your personal information.

It often starts the cycle of larger attacks like advanced persistent threats (APT) and man-in-the-middle (MITM) attacks, aiding threat actors in their mission to take charge of your critical assets.

What you should watch out for

There are several ways cybercriminals can use spoofing to break through your network security and get ahold of your sensitive data, client lists, internal communications, trade secrets, or whatever crown jewels of data are important to your organization. Spoofing can look like any of the following:

1. Minor typo errors

An email with a minor error like using an “I” in place of an “L” is more than a typo— it could be a sign of something seriously suspicious. Some hackers use Cyrillic characters that are similar to Latin script to create fake website URLs that, at first glance, may look exactly like the real thing. For example, “www.whatsapp.com” might be written as  “www.шhatsapp.com”. Notice that the “w” in the second URL contains the Cyrillic letter “ш”.

If a website seems just a little bit off, then there’s a high chance that something is wrong with it. Your security mantra should be: “If it seems off, then it’s probably off.”

2. Incorrect domain names

Sometimes, hackers buy out domains that are common typos for major websites and companies, in the hopes that one slip of your finger could land you in their trap. These sketchy sites often use the same fonts and color schemes as their legitimate counterparts. From there, you could end up entering your data into a nefarious site, all while you believe that you’re accessing a legitimate site. A great example is an incorrect domain name like facebook.business.com instead of the correct business.facebook.com. 

3. Generic email domains for large companies

National banks aren’t going to be contacting you from @gmail.com or @yahoo.com email address. If you get a message from a supposed “government official” or “bank official” using such emails to ask for your personally identifiable information (PII) like your credit card details or passport number, then you’re most likely getting spoofed.

4. Forced urgency

A screenshot of a spoofing emails the writer once received.

The screenshot above shows an email I received from one Todd Green on November 19, 2021, who claimed he had hacked one of my emails to get my password. True, he had gotten a password of mine, but it was an old password that I used about 10 years ago and had since changed. His intention was to pressure me into making a swift but silly decision.

Just like what happened to me, hackers will often try to pressure you to do things immediately, forcing you to make immediate but irrational decisions. Are they asking you to send things over right away? Telling you your bank account will close if you don’t update your password by entering your old one? Then that’s something to suspect.

Winning the war against spoofing attacks in 2023

At this stage, spoofing is more advanced than ever before and organizations must implement a strong zero-trust approach in all aspects of their cybersecurity strategies going into 2023, or risk potentially disastrous consequences. The zero-trust approach is rooted in the principle of “never trust, always verify,” according to Palo Alto Networks. IT teams and employees across the board must adopt a verification-before-authentication culture to mitigate the possibility of a hack.

To win the spoofing war in 2023, here are some vital steps you should take:

  1. Check domain names for typos or any strange-looking alphabets. If you find any such alphabet, beware.
  2. Keep an eye out for incorrect grammar, poor spelling, and any funny-looking sentence structure, syntax, or wording.
  3. Run a search on Google to see if strange-looking emails or websites show up. Also, copy and paste any email texts you consider to be spoofed. You’ll most likely find such texts have been reported and published online.
  4. Don’t click unfamiliar links or download attachments from untrusted sources.
  5. Confirm the legitimacy of any unfamiliar links. When was the website registered? If it’s new, it’s likely not legitimate.
  6. Never share your password with anyone. Your bank already has your password on file, so they won’t ask you for it— even to confirm it’s you.
  7. Ensure you never use unprotected privacy settings. Be security-conscious at all times.
  8. Organizations must conduct regular cybersecurity awareness training for all their employees to keep them abreast of the latest cybersecurity developments, including trending attacks.

Vigilance is the key

Vigilance is the key to staying one step ahead of spoofing attacks. Since spoofing is a game of deception, constant vigilance is essential. As it is with all games of subtlety, people who stay inattentive often become victims. So, be on the lookout for anything that seems a little bit “off”.

Remember; “if it seems off, then it’s probably off.” If you aren’t sure, play it safe! You can always google the site. Go to the domain on Google, or call support to confirm the email is legitimate.

Stay alert. Never trust. Always verify. That’s how to win the war.

 

 

Previous Post

Studies Find Emotive AI Doesn’t Always Improve Customer Service

Next Post

US military biometric capture devices loaded with data were sold on eBay

Kolawole Samuel Adebayo

Kolawole Samuel Adebayo

Kolawole Samuel Adebayo is a freelance tech writer who explores emerging technologies and investigates the digital trends that drive business today and in the future.

Next Post
US military biometric capture devices loaded with data were sold on eBay

US military biometric capture devices loaded with data were sold on eBay

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025
Magnus Almqvist, new CEO of Exberry

Exberry Appoints Magnus Almqvist as CEO to Drive Next Phase of Strategic Growth

March 5, 2025
Expert Family Law Firms in New York: Your Essential Guide to Legal Help

Expert Family Law Firms in New York: Your Essential Guide to Legal Help

March 3, 2025

Recommended

Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media