If youâre running a business or advising clients, itâs important to know what happened at Caesars Entertainment in the late summer of 2023.
The Caesars attack was a ransomware attack, but it was not typical. Thatâs because the attackers used a ploy that has proved quite effectiveâand popularâamong hackers: social engineering.
What is a social engineering attack?
Social engineering means taking readily available information and using it to dupe an employee into thinking that theyâre talking to a real person rather than an impersonator.
According to one report, social engineering accounts for as much as 74% of data breaches. Other data shows that this type of attack causes an average of $4.1 million in damage.
How do social engineers successfully manipulate people?
Social engineers exploit basic human psychology to manipulate their targets.
Theyâre successful because they:
- Build false trust through familiarity and impersonation.
- Create urgency that pressures victims to act quickly without verification.
- Exploit authority by pretending to be executives or IT personnel.
- Play on fear by suggesting negative consequences for non-compliance.
- Use social proof by referencing mutual connections.
Caesarsâ attackers were adept at these techniques.
They spoke English fluently and with little to no accent. They were familiar with common American phrases and conversational norms.
When they called the casinoâs IT help desk, pretending to be employees, they got away with it. Not only was their conversation realistic, but they also had a lot of data at their disposal.
Using LinkedIn, Facebook, X, and other social sites, the attackers knew names, places, interests, connected colleagues, and other information about the person they were impersonating to make it seem like they were that employee.
They told the help desk that they had lost their username and password. The help desk, untrained in such tactics, warmed up to the conversation and ultimately reset and shared new passwords with the attackers.
âAlthough members of the group may be less experienced and younger than many of the established multifaceted extortion and ransomware groups, they are a serious threat to large companies in the United States,â a Google executive told CNBC. âMany members are native English speakers and are incredibly effective social engineers.â
Once the attackers received the new credentials, they could access the companyâs network. They dropped malware through the system that encrypted key files and data.
They stole information. The casino would never be the same.
After suffering this massive disruption, Caesarsâ executives ultimately relented and paid the attackers a $15M ransom to unlock their data. Caesars is still sorting out lawsuits and always faces the uncertainty that the hackers left something behind and could strike again.
A similar cyberattack on MGMâs casinos happened around the same time.
Executives there chose not to pay a ransom and instead rebuilt their systems.
Losses exceeded $100 million. Lawsuits also continue there.
How could these large companies with such well-recognized brands and seemingly all the resources in the world fall victim to such an attack?
The story is newsworthy. However, the media doesnât cover the countless similar attacks on small and mid-sized businesses around the world that lack the same brand recognition.
Your business. My business. And itâs only going to get worse.
Types of social engineering scams, attacks, and tactics
The attack on Caesars Entertainment demonstrates how sophisticated these scams have become. As an employeeâand certainly as a business ownerâyou must know how to recognize a social engineerâs tactics to avoid falling victim.
Letâs look at the common ways these attackers operate:
Pretexting
Pretexting is when a hacker creates a fabricated scenario to obtain information. Caesarsâ attackers used pretexting when they called the help desk. They crafted a convincing story about forgetting their password, complete with personal details gleaned from social media. Once they had new credentials, they accessed the network and unleashed their attack.
Phishing
When an attacker sends an email or message that appears legitimate but actually contains malicious links or attachments, itâs phishing. The attacker often impersonates trusted entities like banks, vendors, or colleagues.
Phishing attacks are growing more sophisticated. Gone are the days of obvious spelling errors and strange email domains. Todayâs phishing attempts can be nearly impossible to distinguish from legitimate communications.
Baiting
Baiting is when a hacker offers something enticing to swap for information or access.
Imagine finding a USB drive in your company parking lot labeled âConfidential: Salary Information.â Human curiosity makes many people plug it in without thinking, which is exactly what attackers want. Similarly, attackers might offer free downloads that secretly install malware.
Theyâre essentially digital fishermenâthe bait looks appealing, but thereâs a hook hidden inside.
Quid Pro Quo
Quid Pro Quo means promising a benefit in exchange for information. A common scenario is an attacker calling employees claiming to be from IT support, offering to help with a non-existent problem.
While âhelping,â theyâll request login credentials or ask the employee to install software thatâs actually malware. It works because it plays on our natural tendency to trust authority figures and our appreciation for unexpected assistance.
Tailgating
Physically following someone into a restricted area. The attacker might pretend to be a colleague who forgot their access card, a delivery person with hands too full to badge in, or a maintenance worker responding to an urgent call.
Once inside, they can access physical systems and plant devices or steal sensitive information. It exploits our natural reluctance to appear rude or unhelpful to someone in apparent need.
AI-enhanced voice spoofing
Thanks to AI, attackers can now clone voices with frightening accuracy. Imagine getting a phone call from your CEO asking for emergency access to a systemâexcept itâs not your CEO; itâs an AI replication.
Within a few years, businesses of every size will face these ultra-realistic impersonation attempts. Donât believe me? Call any big company nowadays with customer service operations and see how long it takes before you realize youâre initially talking to a bot. Now, imagine that technology is in the hands of attackers. The line between real and fake is blurring rapidly.
How to protect your business from social engineering attacks
The good news is that you can take action to protect yourself and your company against socially engineered attacks.
Hereâs a step-by-step approach:
Step 1: Implement comprehensive employee training
Training your employees is critical. People need to know how to spot these callers, what questions to ask, and what data to confirm.
Internal policies should be in place, such as requiring help desk people to call the caller back after validating the phone number.
Depending on the information requested, more than one sign-off may be required before sharing.
Step 2: Establish multifactor authentication systems
The second is a multi-pronged approach for authentication:
- Password resets should require confirmation via text message, authentication software, or hardware.
- A passkey systemâwhere PINs are locally stored on a deviceâshould be required to access systems.
- Biometric accessâfingerprints, facial recognition, eye scansâshould also be strongly considered.
Step 3: Partner with security experts
Finally, itâs important to outsource this security to companies that do it for a living:
- Partner with a good cloud services provider to host your data and implement secure access controls.
- Ask them, or their partners, for continuous training.
- Confirm that they regularly update and patch your employeesâ operating systems and require password changes.
Take action now
Donât wait until your business becomes the next victim of a social engineering attack. Implement proper training, robust authentication systems, and partner with trusted security experts before itâs too late. Rememberâprevention costs far less than a data breach.
Subscribe to our blog for the latest cybersecurity insights and stay ahead of emerging threats.