Article | December 1, 2020

Hacker Personas: The Impersonator

Source: Webroot
Skull Hacker Code

THE IMPERSONATOR

Today’s cybercriminals are masters at exploiting basic human trust and impersonators have unfortunately perfected this technique. Pretending to be someone else, these hackers rely on vulnerabilities to manipulate their victims into opening doors to systems or unwittingly sharing sensitive data such as passwords or banking details. What makes this type of cybercriminal a massive threat is their expert ability to hide in plain sight, often masking their true intentions behind seemingly innocuous requests or legitimate-looking websites.

Who Falls Victim to Impersonators?

Many users are growing more educated about their attacks, but impersonators are increasingly sophisticated, often hosting malicious content on legitimate sites. Impersonators leverage trusted brand names, and those who let their guard down can easily fall prey. Phishing attempts can slip through DNS and endpoint protection, which makes security awareness training a must-have tool. Case in point, recent impersonation attacks prove consequences can be costly

VIEW THE ARTICLE!
Signing up provides unlimited access to:
Signing up provides unlimited access to:
  • Trend and Leadership Articles
  • Case Studies
  • Extensive Product Database
  • Premium Content
HELLO. PLEASE LOG IN. X

Not yet a member of MSPinsights? Register today.

ACCOUNT SIGN UP X
Please fill in your account details
Login Information
I'm interested in newsletter subscriptions.
ACCOUNT SIGN UP

Subscriptions

Sign up for the newsletter that brings you the industry's latest news, technologies, trends and products.