How cybercriminals use bait attacks to gather info about their intended victims

With a bait assault, criminals attempt to acquire the mandatory particulars to plan future assaults towards their targets, says Barracuda.


Picture: iStock/OrnRin

Cybercriminals typically will analysis potential victims to assist strategize precisely how and the place to assault them. This tactic applies whether or not the legal is planning to mount a knowledge breach, a phishing marketing campaign or another kind of menace. In a report launched Wednesday, knowledge safety supplier Barracuda checked out a specific trick referred to as a bait assault for instance how this technique is used to select up helpful details about an supposed goal.

SEE: Social engineering: A cheat sheet for enterprise professionals (free PDF) (TechRepublic)  

With a bait assault, also referred to as a reconnaissance assault, the cybercriminal is wanting solely to acquire particulars about an individual or group to assist map out a future assault. Bait assaults normally arrive within the type of emails with little or no and even no content material.

The purpose is solely to substantiate the existence and accessibility of the recipient’s electronic mail, which is completed if the attacker receives no “undeliverable” discover or, even higher, will get a response from the particular person.

The preliminary bait electronic mail usually skirts previous safety defenses for just a few causes. First, the messages comprise little or no textual content and definitely no malicious hyperlinks or file attachments. Second, the attackers typically use reliable electronic mail accounts, reminiscent of Gmail, Yahoo or Hotmail. Third, the criminals ship out a small variety of emails on a random foundation to thwart any bulk or anomaly-based safety detection.

The amount of bait emails remains to be low in contrast with different kinds of phishing messages. Barracuda discovered that round 35% of the ten,500 organizations it analyzed acquired at the least one bait assault in September 2021. On common, three totally different mailboxes per firm bought certainly one of these messages. However since a bait electronic mail appears innocuous with no apparent pink flags, they’re extra more likely to have interaction the recipient.

One bait message acquired by a Barracuda buyer in August included a topic line that merely mentioned “HI” and contained no textual content within the physique. As a follow-up, somebody from Barracuda replied to the e-mail with a message that mentioned: “Hello, how could I enable you to?”


Picture: Barracuda

Inside 48 hours, the unique worker was focused with a phishing assault claiming that the particular person was being charged for a subscription to the Norton LifeLock safety product. In the long run, the aim of the unique bait electronic mail was to substantiate the existence of the account and any curiosity on the a part of the recipient to reply to such messages.


Picture: Barracuda

That can assist you defend your group and customers towards bait assaults, Barracuda presents the next ideas:

  1. Use synthetic intelligence to establish and cease bait assaults. Since bait assaults comprise little or no content material and are available from reliable electronic mail accounts, conventional safety defenses are usually unable to detect them. As an alternative, you have to flip to AI-based safety. Such a safety analyzes knowledge utilizing quite a lot of sources, reminiscent of communication graphs, status methods and network-level evaluation.
  2. Educate workers to identify and report bait assaults. Even with one of the best protection, some bait emails are more likely to attain your customers. To coach workers to acknowledge these assaults and never have interaction with them, embody samples of bait emails in your safety coaching and urge customers to report such messages to your safety workers.
  3. Do not enable bait emails to take a seat in a consumer’s inbox. You do not need to give a consumer the chance to reply to and even open a bait message, which implies the e-mail ought to be faraway from the particular person’s inbox as shortly as attainable. Instruments that make use of automated incident response can discover and deal with these messages to stop the assault from spreading additional.

Additionally see

Recent Articles


Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox