SlideShare a Scribd company logo
1 of 26
Download to read offline
How Hackers Hyper Target
Phishing Emails
by cutting the cost of spear phishing
Spear phishing is a targeted cyber attack that uses custom tailored
information to increase the likelihood that a victim performs the requested
action.
Spear phishing is not to be confused with phishing, which is typically a more
generic cyber attack against a large quantity of people. The bad guys send
generic phishing emails in hope to just convert on a small percentage of the
group.
If Phishing is a Shotgun, Spear Phishing is a Sniper Rifle.
Phishing is a numbers game. It used to be easy to identify.
In the 90s, they were Nigerian Prince emails offering to share their riches.
They’d have poor spelling and poor grammar.
These old phishing emails
were always easy to
identify.
Today, phishing emails are more sophisticated. For example, cyber criminals
know that millions of people use Amazon, Paypal, and Google, so by
mimicking these sites they can increase the likelihood of a successful attack.
Take this one for example. It looks like an email from Amazon, and most
people would click on it.
How can you check if it’s a legitimate email or a phishing attack?
Check the sender to
see if it’s actually
coming from who
you think it should
be.
Hover over links to
see if they are
directing you to
where you expect.
There’s one more big clue on this email. Can you see it?
The smile is backwards. Come on!
These emails were designed from real world attacks by Wuvavi. They let you simulate phishing
attacks in your company and train employees to identify phishing emails.
Phishing emails are typically generic, like the one I just shared.
Spear phishing emails are more targeted. Cyber criminals target a specific
person, often a CEO or CFO, and use information obtained from social
channels to increase trust with their targets.
For example, I could
see from my targets
facebook that they
have a son named
Noah, a wife, and a
dog named Fido. The
family is on vacation
and just posted
pictures.
So I could create
an account -
john.doe@yahoo.
com, so it looks
like that the
CEOs email.
Then, send their business partner this email...
Hey Sherry. We’re having a great time with the family on vacation. Here’s a picture of little Noah,
Fido, and my wife. I’m making a stop at a customers on our way back, but I don’t have my credit card
to book. Can you wire transfer $7,000 to my account xxxxxxx?
Would your partner, CFO, or colleague fall for this?
There’s a cost to this for the attacker in the time to identify their targets,
monitor them for an opportunity, and then executing the attack.
Compared to regular mass phishing, it’s quite expensive.
Now, what if an attacker could reduce the cost of spear phishing.
Meaning, they spend less time identifying good prospects, less time
monitoring their social media channels, and less time executing.
Well, they could unleash a hell of an attack on a large number of people.
Hell of an attack is the technical term for a hyper targeted mass phishing
campaign.
This is happening now. Have you heard of the shame scam where bad guys
claim they’ve recorded you watching porn from your webcam?
You can read about it in detail below.
https://wuvavi.com/2018/07/17/shame-scammer-claim-theyve-filmed-you-watching-porn-from-webcam/
The email starts with
I will cut to the chase. I am aware your password is Fluffy1234. I also know your secret but you do not know me….I
installed a malware on the adult vids you visited to experience fun. While you were watching the videos, your internet
browser began operating as an RDP with a keylogger that gave me access to your webcam.
These bad guys are using your username and password to show they mean
business and create a sense of trust that they are telling the truth, and fear
that they’ve done what they said.
Cyber criminals have scraped usernames and passwords from a previous data
breach, and they are now using that to shame scam people into paying a
ransom.
In reality, it’s believed that no one has been recorded.
Effectively, they’ve cut the cost of spear phishing, and found a way to spear
phish the masses with a hyper targeted email.
What’s next? I believe these mass spear phishing campaigns will be on the
rise.
What can you do about it?
Care more, share less on social media.
Make good passwords, and change them regularly.
Do not click links in emails.
Provide employee cybersecurity training to raise employee awareness (wuvavi.com).
About Me
Jon Santavy is the CEO of Wuvavi (www.wuvavi.com) – the world’s leading employee cybersecurity awareness platform for
small and medium sized business. Through innovative training, simulated phishing attacks, and the right analytics, Wuvavi
customers reduce their employee related cybersecurity risks. Wuvavi’s goal is to create a culture of awareness in every
organization.

More Related Content

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

How hackers hyper target phishing emails

  • 1. How Hackers Hyper Target Phishing Emails by cutting the cost of spear phishing
  • 2. Spear phishing is a targeted cyber attack that uses custom tailored information to increase the likelihood that a victim performs the requested action.
  • 3. Spear phishing is not to be confused with phishing, which is typically a more generic cyber attack against a large quantity of people. The bad guys send generic phishing emails in hope to just convert on a small percentage of the group.
  • 4. If Phishing is a Shotgun, Spear Phishing is a Sniper Rifle.
  • 5. Phishing is a numbers game. It used to be easy to identify.
  • 6. In the 90s, they were Nigerian Prince emails offering to share their riches.
  • 7. They’d have poor spelling and poor grammar.
  • 8. These old phishing emails were always easy to identify.
  • 9. Today, phishing emails are more sophisticated. For example, cyber criminals know that millions of people use Amazon, Paypal, and Google, so by mimicking these sites they can increase the likelihood of a successful attack.
  • 10. Take this one for example. It looks like an email from Amazon, and most people would click on it.
  • 11. How can you check if it’s a legitimate email or a phishing attack? Check the sender to see if it’s actually coming from who you think it should be. Hover over links to see if they are directing you to where you expect.
  • 12. There’s one more big clue on this email. Can you see it? The smile is backwards. Come on! These emails were designed from real world attacks by Wuvavi. They let you simulate phishing attacks in your company and train employees to identify phishing emails.
  • 13. Phishing emails are typically generic, like the one I just shared. Spear phishing emails are more targeted. Cyber criminals target a specific person, often a CEO or CFO, and use information obtained from social channels to increase trust with their targets.
  • 14. For example, I could see from my targets facebook that they have a son named Noah, a wife, and a dog named Fido. The family is on vacation and just posted pictures. So I could create an account - john.doe@yahoo. com, so it looks like that the CEOs email.
  • 15. Then, send their business partner this email... Hey Sherry. We’re having a great time with the family on vacation. Here’s a picture of little Noah, Fido, and my wife. I’m making a stop at a customers on our way back, but I don’t have my credit card to book. Can you wire transfer $7,000 to my account xxxxxxx? Would your partner, CFO, or colleague fall for this?
  • 16. There’s a cost to this for the attacker in the time to identify their targets, monitor them for an opportunity, and then executing the attack. Compared to regular mass phishing, it’s quite expensive.
  • 17. Now, what if an attacker could reduce the cost of spear phishing.
  • 18. Meaning, they spend less time identifying good prospects, less time monitoring their social media channels, and less time executing.
  • 19. Well, they could unleash a hell of an attack on a large number of people. Hell of an attack is the technical term for a hyper targeted mass phishing campaign.
  • 20. This is happening now. Have you heard of the shame scam where bad guys claim they’ve recorded you watching porn from your webcam? You can read about it in detail below. https://wuvavi.com/2018/07/17/shame-scammer-claim-theyve-filmed-you-watching-porn-from-webcam/
  • 21. The email starts with I will cut to the chase. I am aware your password is Fluffy1234. I also know your secret but you do not know me….I installed a malware on the adult vids you visited to experience fun. While you were watching the videos, your internet browser began operating as an RDP with a keylogger that gave me access to your webcam. These bad guys are using your username and password to show they mean business and create a sense of trust that they are telling the truth, and fear that they’ve done what they said.
  • 22. Cyber criminals have scraped usernames and passwords from a previous data breach, and they are now using that to shame scam people into paying a ransom. In reality, it’s believed that no one has been recorded.
  • 23. Effectively, they’ve cut the cost of spear phishing, and found a way to spear phish the masses with a hyper targeted email.
  • 24. What’s next? I believe these mass spear phishing campaigns will be on the rise.
  • 25. What can you do about it? Care more, share less on social media. Make good passwords, and change them regularly. Do not click links in emails. Provide employee cybersecurity training to raise employee awareness (wuvavi.com).
  • 26. About Me Jon Santavy is the CEO of Wuvavi (www.wuvavi.com) – the world’s leading employee cybersecurity awareness platform for small and medium sized business. Through innovative training, simulated phishing attacks, and the right analytics, Wuvavi customers reduce their employee related cybersecurity risks. Wuvavi’s goal is to create a culture of awareness in every organization.