Article | December 1, 2020

Hacker Personas: The Impersonator

Source: Webroot
Skull Hacker Code

THE IMPERSONATOR

Today’s cybercriminals are masters at exploiting basic human trust and impersonators have unfortunately perfected this technique. Pretending to be someone else, these hackers rely on vulnerabilities to manipulate their victims into opening doors to systems or unwittingly sharing sensitive data such as passwords or banking details. What makes this type of cybercriminal a massive threat is their expert ability to hide in plain sight, often masking their true intentions behind seemingly innocuous requests or legitimate-looking websites.

Who Falls Victim to Impersonators?

Many users are growing more educated about their attacks, but impersonators are increasingly sophisticated, often hosting malicious content on legitimate sites. Impersonators leverage trusted brand names, and those who let their guard down can easily fall prey. Phishing attempts can slip through DNS and endpoint protection, which makes security awareness training a must-have tool. Case in point, recent impersonation attacks prove consequences can be costly

access the Article!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights