Attacks on enterprise communication systems continue to rapidly evolve in size, scope, and sophistication, especially as AI allows for enhanced targeting as well as voice and video impersonation.
For the last three years Metrigy has gathered data from end user organizations on how they are handling the increasing threats to their communications and collaboration applications. And those threats are increasing. Among the nearly 340 participating organizations in this year’s study, 20.5% say they have had an attack on their communications, collaboration, and/or contact center platforms and applications in 2023. That represents an increase of almost 300% since we first started gathering this data in 2021.
While participants typically don’t share the details of their attacks, a wide range of vectors exist for those seeking to achieve financial gain or cause harm and disruption. Examples include:
- Toll fraud attacks designed to generate calls across unscrupulous network operators or allow attackers to use a company’s calling services for further attack
- User impersonation attacks using a combination of number spoofing, application token theft, and/or other information designed to gain access to customer or employee data, enabling financial theft, theft of company information, or business disruption. Attacks may also be based on theft of a person’s mobile phone SIM (an attack known as SIM swapping or SIM hijacking) allowing phone number takeover
- Spam phishing attacks that disrupt company communications by flooding phones with voice and/or text messages, often designed to commit fraud
- Dial-out attacks that spoof a company’s phone number and/or identity to fool customers into thinking they are engaging with a legitimate business
- Exfiltration attacks that exploit vulnerabilities in applications to gain steal company data
All of these attacks continue to rapidly evolve in size, scope, and sophistication, especially as AI allows for enhanced targeting as well as voice and video impersonation.
Lack of Enterprise Response
Continue reading at nojitter.com.