Cyberattack Knowledge Base  
First hacking technique to gain access to the company information?
image

Spear Phishing

The company's employees should see it as a red flag when anyone requests personal contact information. It's also a red flag if the sender's email comes from a suspicious or unfamiliar domain.

Hackers may impersonate the general manager to trick an employee into giving them access to the GM's account. This is known as spear phishing. Spear phishing is a targeted phishing attack aimed at a specific individual or group within an organisation.

Second hacking technique to gain access to the company information?
image

Social Engineering

A company employee should not trust a phone number they don't recognize. It's a red flag if the company's general manager is contacting them from a phone number registered in a country like Singapore.

Hackers use their skills to convince the employee that they are the real GM, in order to gain more information. In this case, the employee might reset the user’s password and provide a new one.

Social engineering relies on conversational techniques to trick targets (company employees) into revealing sensitive information or downloading malware.

Hackers attack type to request money form the company?
Hackers organisation name?