Saudi Press

Saudi Arabia and the world
Saturday, Oct 04, 2025

A ransomware attack can begin in surprisingly simple ways

A ransomware attack can begin in surprisingly simple ways

Hackers often look for cracks in an organization's human shield
Ransomware can sneak into an organization by simple deception.

Often referred to as social engineering, hackers often look for cracks in the human shield at organizations.

This lets the attackers in the door, allowing them to gain higher "privileges" – or a higher level of security access – in a computer network; the key to carrying out a ransomware attack.

"Social engineering attacks can be executed to escalate privilege and gain more sensitive information and access over a series of attacks," Alethe Denis, social engineering expert and consultant for Critical Insight, told Fox Business.

Most cyberattacks – about 70 percent – are related to email phishing, Denis said. Phishing emails – which appear to come from a trusted source – are a simple but effective form of social engineering.

A more sophisticated approach involves a "well-thought-out and formally planned attack that has one or more social engineering elements," Denis said, adding that this kind of ransomware attack might, for example, target the oil and gas sector.

This approach may employ the gathering of seemingly innocuous information via a phone call, email or text message.

"While some of us think that we would be able to defend against these things, all of us are actually very much susceptible to these types of attacks," Denis explains in a recent video on the topic.

Attackers can essentially turn somebody in an organization into an unwitting insider.

"[Attackers are] going to hedge bets on using helpful employees whose job function is to be helpful, perform customer service or otherwise be receptive to requests and handle requests – those types of roles within your company are going to be targeted," Denis says in the video.

Denis gives one example of a company issuing a press release about their most recent charitable-giving campaign in which they mention a specific charity and a specific dollar amount that the campaign raised.

"The attacker would be able to then learn the name of the charity, the amount of money that was raised through the campaign and incorporate these into their development of a solid phish [email]," she says in the video.

"They could use logos of the charity … to pose as a representative from the charity and then incentivize the company to … engage with the email based on the fact that they promise some kind of recognition. Either an award or some kind of collaborative marketing effort to bring attention to this campaign," Denis says in the video.

Social media is also a favorite target.

"Social media is a bad actor's best friend and houses an immense amount of data that can be leveraged against businesses," Denis told Fox Business.

The larger point is, once the attacker gets a foothold, ransomware unfolds over a series of attacks, "resulting in a series of smaller compromises and finally one larger compromise to a company's data or systems," Denis said.

Though the final attack is the one that makes the news, the first stages of an attack are part of "an onion with many layers and take thoughtful time and planning."
Newsletter

Related Articles

Saudi Press
0:00
0:00
Close
Altman Says GPT-5 Already Outpaces Him, Warns AI Could Automate 40% of Work
Trump Organization Teams with Saudi Developer on $1 Billion Trump Plaza in Jeddah
Electronic Arts to Be Taken Private in Historic $55 Billion Buyout
Colombian President Petro Vows to Mobilize Volunteers for Gaza and Joins List of Fighters
Nvidia and Abu Dhabi’s TII Launch First AI-&-Robotics Lab in the Middle East
UK, Canada, and Australia Officially Recognise Palestine in Historic Shift
New Eye Drops Show Promise in Replacing Reading Glasses for Presbyopia
Dubai Property Boom Shows Strain as Flippers Get Buyer’s Remorse
Top AI Researchers Are Heading Back to China as U.S. Struggles to Keep Pace
JWST Data Brings TRAPPIST-1e Closer to Earth-Like Habitability
UAE-US Stargate Project Poised to Make Abu Dhabi a Global AI Powerhouse
Trump and Starmer Clash Over UK Recognition of Palestinian State Amid State Visit
Saudi Arabia cracks down on music ‘lounges’ after conservative backlash
Saudi Arabia Signs ‘Strategic Mutual Defence’ Pact with Pakistan, Marking First Arab State to Gain Indirect Access to Nuclear Strike Capabilities in the Region
Sam Altman sells the 'Wedding Estate' in Hawaii for 49 million dollars
Turkish car manufacturer Togg Enters German Market with 5-Star Electric Sedan and SUV to Challenge European EV Brands
World’s Longest Direct Flight China Eastern to Launch 29-Hour Shanghai–Buenos Aires Direct Flight via Auckland in December
New OpenAI Study Finds Majority of ChatGPT Use Is Personal, Not Professional
Kuwait opens bidding for construction of three cities to ease housing crunch.
This Week in AI: Meta’s Superintelligence Push, xAI’s Ten Billion-Dollar Raise, Genesis AI’s Robotics Ambitions, Microsoft Restructuring, Amazon’s Million-Robot Milestone, and Google’s AlphaGenome Update
Indian Student Engineers Propose “Project REBIRTH” to Protect Aircraft from Crashes Using AI, Airbags and Smart Materials
Could AI Nursing Robots Help Healthcare Staffing Shortages?
Turkish authorities seize leading broadcaster amid fraud and tax investigation
Qatari prime minister says Netanyahu ‘killed any hope’ for Israeli hostages
Apple Introduces Ultra-Thin iPhone Air, Enhanced 17 Series and New Health-Focused Wearables
Big Oil Slashes Jobs and Investments Amid Prolonged Low Crude Prices
Social Media Access Curtailed in Turkey After CHP Calls for Rallies Following Police Blockade of Istanbul Headquarters
Did the Houthis disrupt the internet in the Middle East? Submarine cables cut in the Red Sea
Gold Could Reach Nearly $5,000 if Fed Independence Is Undermined, Goldman Sachs Warns
Uruguay, Colombia and Paraguay Secure Places at 2026 World Cup
Trump Administration Advances Plans to Rebrand Pentagon as Department of War Instead of the Fake Term Department of Defense
Tether Expands into Gold Sector with Profit-Driven Diversification
Trump’s New War – and the ‘Drug Tyrant’ Fearing Invasion: ‘1,200 Missiles Aimed at Us’
At the Parade in China: Laser Weapons, 'Eagle Strike,' and a Missile Capable of 'Striking Anywhere in the World'
Information Warfare in the Age of AI: How Language Models Become Targets and Tools
Israeli Airstrike in Yemen Kills Houthi Prime Minister
After the Shock of Defeat, Iranians Yearn for Change
YouTube Altered Content by Artificial Intelligence – Without Permission
Iran Faces Escalating Water Crisis as Protests Spread
More Than Half a Million Evacuated as Typhoon Kajiki Heads for Vietnam
HSBC Switzerland Ends Relationships with Over 1,000 Clients from Saudi Arabia, Lebanon, Qatar, and Egypt
Sharia Law Made Legally Binding in Austria Despite Warnings Over 'Incompatible' Values
Dogfights in the Skies: Airbus on Track to Overtake Boeing and Claim Aviation Supremacy
Tim Cook Promises an AI Revolution at Apple: "One of the Most Significant Technologies of Our Generation"
Are AI Data Centres the Infrastructure of the Future or the Next Crisis?
Miles Worth Billions: How Airlines Generate Huge Profits
Zelenskyy Returns to White House Flanked by European Allies as Trump Pressures Land-Swap Deal with Putin
Beijing is moving into gold and other assets, diversifying away from the dollar
Cristiano Ronaldo Makes Surprise Stop at New Hong Kong Museum
Zelenskyy to Visit Washington after Trump–Putin Summit Yields No Agreement
×