HomeVulnerabilityDefending digital identification from computer-using brokers (CUAs)

Defending digital identification from computer-using brokers (CUAs)

Parallel execution at scale

CUAs carry out duties at machine pace and in parallel, permitting attackers to launch hundreds of credential stuffing makes an attempt concurrently — orders of magnitude quicker than handbook assaults.

How CUAs can remodel social engineering and phishing assaults

These similar capabilities of CUA additionally enable attackers to take social engineering and phishing to a wholly new degree. CUAs redefine how and the place phishing happens, shifting from e-mail to social platforms and collaboration instruments, the place enterprise anti-phishing controls are often not in place and are additionally much less efficient. Utilizing pure language, an attacker can instruct a CUA to create accounts on social platforms, publish messages, construct credibility after which exploit that belief to ship phishing hyperlinks geared toward stealing credentials.

Past broad engagement, when focusing on a selected consumer, CUAs can leverage AI to scrape consumer data from varied social platforms after which use it for crafting extremely personalised messages that set up rapport and function phishing lures, finally redirecting the sufferer to malicious websites.

See also  „Eine Krisensituation erfordert klare Entscheidungen“
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular