Combat Virtual Kidnappers with Leading Cyber Extortion Defenses

December 14, 2023
1 min read

Virtual Kidnapping, a form of cyber extortion in which fraudsters feign the abduction of a loved one and demand immediate payment, is on the rise, reports ISMG Network. Craig Gibson, a threat defence architect at Trend Micro, warns that criminals can use SIM hijacking to take control of a victim’s mobile phone account, and utilise AI-driven voice-faking tools to mimic the alleged abductee’s voice. These tactics aim to manipulate the victims’ emotions, encouraging them to act promptly and pay the demanded ransom. Gibson suggests more complex, identity-based signals within a zero trust framework to help mitigate such threats.

  • Virtual Kidnapping refers to cybercriminals pretending to have kidnapped an individual, demanding payment from their loved ones before ending the phone call, a ruse on the rise according to the FBI.
  • Craig Gibson, principal threat defense architect at Trend Micro, warns that cybercriminals employ tactics such as SIM hijacking to take over a victim’s mobile phone account.
  • AI-driven voice faking tools are also used to emulate the voice of the supposed abductee, thus enforcing the illusion and creating a sense of urgency within the victim.
  • Non-technical tactics such as sharing “secret knowledge” among family members or employees may help in uncovering scams.
  • Gibson suggests the implementation of complex, identity-based signals within a zero trust framework to mitigate threats like virtual kidnapping.

Cybersecurity researchers constantly study the threat landscape of various sectors, including government, health, banking, and telecommunications. Gibson emphasizes the importance of understanding the current cyber threats and developing multi-tiered risk management solutions. These should be based on governance, processes, and information systems, and should additionally include implemented measures such as the selection, application, and monitoring of information security controls.

Latest from Blog

North Korean hackers pivot to ransomware attacks

TLDR: North Korean hackers from APT45 have shifted from cyber espionage to ransomware attacks APT45 has targeted critical infrastructure and is linked to ransomware families SHATTEREDGLASS and Maui A North Korea-linked threat

Cyber insurance evolves to cover all your online needs

TLDR: Cyber insurance coverage is evolving to help raise security baselines across businesses. Only one-quarter of companies have a standalone cyber insurance policy. In today’s evolving cybersecurity landscape, cyber insurance coverage is

Get ready for a cyber attack with NewsRadio 740 KTRH

TLDR: A cyber attack recently caused a global outage of numerous Microsoft business products, highlighting the vulnerability of our technology infrastructure. Cyber security expert Matt Malone believes that the incident could serve