<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Incremental social engineering attack? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22201#M2753</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This brings to mind something that occurred in 2017, the other way around. While in KSA, I received an email from a bank with which I had an account in my home country --- India --- thanking me for visiting the branch to meet the new manager the previous day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Far from being out of the area the branch is located in, I wasn't even in country at the time!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After ensuring that the sender address was indeed that of the bank, I contacted them to alert them to this, and asked for an investigation &amp;amp; explanation. When they responded stating that it was due to a new staff member sending out the email erroneously, I made a complaint on the site, but decided to let it pass after they called me &amp;amp; apologized.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, that wasn't the end of it --- shortly after, I received another similar email, followed by the same explanation: employee error! &lt;A href="https://en.wikipedia.org/wiki/ICICI_Bank" target="_blank" rel="noopener"&gt;This is a major bank in India&lt;/A&gt;, so I was dismayed that something like this could happen. (I closed my account after this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had they claimed that&amp;nbsp; they were gauging customer awareness, I might have actually appreciated it...&amp;nbsp; &lt;img id="manwink" class="emoticon emoticon-manwink" src="https://community.isc2.org/i/smilies/16x16_man-wink.png" alt="Man Wink" title="Man Wink" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 11 May 2019 02:22:26 GMT</pubDate>
    <dc:creator>Shannon</dc:creator>
    <dc:date>2019-05-11T02:22:26Z</dc:date>
    <item>
      <title>Incremental social engineering attack?</title>
      <link>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22105#M2733</link>
      <description>&lt;P&gt;OK, here's a weird one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attacker calls up customer service and "corrects" a single character in the spelling of the account name.&amp;nbsp; Then does it again.&amp;nbsp; And again ... until finally the account is now in the attacker's name ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now how would you train people to detect or be on guard against that?&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 18:46:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22105#M2733</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-05-08T18:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Incremental social engineering attack?</title>
      <link>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22114#M2735</link>
      <description>&lt;P&gt;By having a system that does not depend solely on the spidey-sense of the front line personnel, such as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A validation system that keeps the attacker away from my account until they have proven something.&lt;/LI&gt;&lt;LI&gt;A CRM (Customer Relationship Manager) that makes the most recent changes to an account visible to the phone jockey.&lt;/LI&gt;&lt;LI&gt;A fraud unit that watches the frequency of events (charges, calls, changes, atypical balances, etc.) to a given account.&lt;/LI&gt;&lt;LI&gt;A feedback system, whereby I receive alerts regarding changes to my account.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 20:18:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22114#M2735</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2019-05-08T20:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Incremental social engineering attack?</title>
      <link>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22201#M2753</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This brings to mind something that occurred in 2017, the other way around. While in KSA, I received an email from a bank with which I had an account in my home country --- India --- thanking me for visiting the branch to meet the new manager the previous day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Far from being out of the area the branch is located in, I wasn't even in country at the time!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After ensuring that the sender address was indeed that of the bank, I contacted them to alert them to this, and asked for an investigation &amp;amp; explanation. When they responded stating that it was due to a new staff member sending out the email erroneously, I made a complaint on the site, but decided to let it pass after they called me &amp;amp; apologized.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, that wasn't the end of it --- shortly after, I received another similar email, followed by the same explanation: employee error! &lt;A href="https://en.wikipedia.org/wiki/ICICI_Bank" target="_blank" rel="noopener"&gt;This is a major bank in India&lt;/A&gt;, so I was dismayed that something like this could happen. (I closed my account after this)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had they claimed that&amp;nbsp; they were gauging customer awareness, I might have actually appreciated it...&amp;nbsp; &lt;img id="manwink" class="emoticon emoticon-manwink" src="https://community.isc2.org/i/smilies/16x16_man-wink.png" alt="Man Wink" title="Man Wink" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2019 02:22:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22201#M2753</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2019-05-11T02:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Incremental social engineering attack?</title>
      <link>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22229#M2757</link>
      <description>&lt;P&gt;Interesting study:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.csoonline.com/article/2125176/social-engineering-stories.html" target="_blank"&gt;https://www.csoonline.com/article/2125176/social-engineering-stories.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 06:32:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Incremental-social-engineering-attack/m-p/22229#M2757</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-05-13T06:32:08Z</dc:date>
    </item>
  </channel>
</rss>

