From Our Partners at KnowB4: 

As social engineering continues to grow as a primary method of hacking attempts, another global technology firm has been identified as the target of a social engineering hacking campaign. Global software and cloud computing manufacturer Cisco has disclosed a security incident that occurred as a result of sophisticated voice phishing attacks that targeted employees, according to researchers at Cisco Talos. The researchers believe the attack was carried out by an initial access broker with the intent of selling access to the compromised accounts to other threat actors.  Cisco Talos explains that the attackers first gained access to Cisco’s networks after hacking an employee’s personal Google account, then stole the employee’s Cisco passwords via Google Chrome’s password syncing feature. The attackers then used various social engineering tactics to expand their access. 

“After obtaining the user’s credentials, the attacker attempted to bypass multifactor authentication (MFA) using a variety of techniques, including voice phishing (aka “vishing”) and MFA fatigue, the process of sending a high volume of push requests to the target’s mobile device until the user accepts, either accidentally or simply to attempt to silence the repeated push notifications they are receiving,” Cisco Talos says. 

“On May 24, 2022, Cisco identified a security incident targeting Cisco corporate IT infrastructure, and we took immediate action to contain and eradicate the bad actors,” Cisco said in a statement. “In addition, we have taken steps to remediate the impact of the incident and further harden our IT environment. No ransomware has been observed or deployed and Cisco has successfully blocked attempts to access Cisco’s network since discovering the incident. 

Cisco did not identify any impact to our business as a result of this incident, including no impact to any Cisco products or services, sensitive customer data or sensitive employee information, Cisco intellectual property, or supply chain operations. On August 10 the bad actors published a list of files from this security incident to the dark web.” 

“Vishing is an increasingly common social engineering technique whereby attackers try to trick employees into divulging sensitive information over the phone. In this instance, an employee reported that they received multiple calls over several days in which the callers – who spoke in English with various international accents and dialects – purported to be associated with support organizations trusted by the user.” 

New-school security awareness training can teach your employees to follow security best practices so they can thwart social engineering attacks. Want to see if your employees are at risk? Sign up for a FREE phishing security test through our partners at KnowB4.   

Want to make sure your employees are staying safe on social media? Sign up for a free Social Media Phishing Security Test  

 

Contact Us

We’re happy to answer any questions you may have.

Headquarters (Nashville, TN):
201 Franklin Road
Brentwood, TN 37027

Phone: 615-377-4600

Office Hours: 8am-5pm, Monday-Friday

 

 

Charlotte, NC:
3800 Arco Corporate Drive, ​Suite 250
Charlotte, NC 28273
704-846-6750

Knoxville, TN:
2095 Lakeside Centre Way
Knoxville, TN 37922
865-691-9000