How to Combat Social Engineering: Awareness and Strategies 

Blake Kennedy, Architect at ivision May 29, 2025

Social engineering attempts are on the rise, with a heavy emphasis on phishing and smishing. As these attacks get more creative, it’s critical your full organization understands the risk they pose. 

Silent Ransom Group, a cybercriminal group known for extortion with the goal of financial gain, has recently placed a target on the legal industry. The group has leveraged “call-back” phishing tactics that mimic common services then request a response via phone to resolve an issue about pending charges or urgent issues. To the recipient, this looks like a reminder from Duolingo to update their billing information to avoid a cancelled subscription. To the attacker, though, it’s the beginning of their social engineering strategy. 

Once the user calls the attacker, they’re manipulated into installing remote desktop software to resolve the phony issue. This installation gives the threat actor full control of the system and the ability to exfiltrate sensitive data and exploit the victim until a ransom is paid. 

There are a variety of tactics that can avoid this sort of turmoil, and security awareness remains at the center of all of them. Here are some recommendations ivision stands by for preparing your team to combat potential attacks:  

ivision’s security solutions help set your business up for success against these kinds of attacks, whether it be through managed security or consulting services around security strategy, security assessment, infrastructure security, or data security.

Tags