Voice Phishing Attacks Compromise Google and Cisco Security

Cyberwarfare / Nation-State Attacks,
Data Breach Notification,
Data Security

Also: US Cyber Grants Are Declining; Hybrid Threats Renew Focus on Operational Technology Resilience


Clockwise, from top left: Anna Delaney, Mathew Schwartz, Chris Riotta, and Tony Morbin

In a recent discussion, four editors from ISMG illuminated the implications of voice phishing attacks associated with recent breaches at Google and Cisco. This incident brings to light critical vulnerabilities within help desk and CRM infrastructures, as well as the urgent need for enhanced verification processes, robust technical controls, and continuous employee training to mitigate such risks.

The panelists, including Anna Delaney, Mathew Schwartz, Chris Riotta, and Tony Morbin, addressed the pressing issue of decreasing cybersecurity funds for state and local governments in the U.S. This budgetary decline leaves many organizations understaffed and ill-equipped to tackle the dynamically evolving cyber threat landscape. As evidenced by the ongoing cybersecurity crises, the lack of resources compromises the safety of sensitive information across various sectors.

The discussion also delved into the escalating reality of hybrid warfare, a convergence of cyberattacks, disinformation campaigns, and strategic sabotage that heightens the need for resilience in operational technology (OT). As geopolitical tensions rise, organizations must reevaluate their OT strategies to safeguard critical infrastructure, ensuring that the frameworks employed are not only reactive but also preemptive in nature.

Drawing from the MITRE ATT&CK framework, it is crucial to recognize potential tactics and techniques used in the recent breaches. Initial access methods such as phishing could have facilitated the attackers’ entry into target networks. Once inside, adversaries may have leveraged persistence techniques, allowing them to maintain access to compromised systems over extended periods.

Furthermore, the exploitation of trust relationships used by the help desk systems suggests a failure in privilege escalation tactics, where attackers could gain higher levels of access without being detected. Such insights underscore the critical importance of comprehensive training programs that can mitigate human errors, which are often the weakest link in the cybersecurity chain.

The ISMG Editors’ Panel runs weekly to monitor and analyze current cybersecurity threats. Previous editions, such as one dated July 25, covered alarming waves of China-linked SharePoint exploits, while another on August 1 discussed how the ToolShell exploit has blurred distinctions between cybercrime and espionage. As the landscape of threats evolves, staying informed and vigilant is imperative for business owners dedicated to securing their digital assets.

Source link