Sunday, June 15, 2025

USA-China Tensions Transform Global Market

After the U.S. elections, relations between the...

Cybercriminals No Longer Need Malware – They Target Emotions

SECURITYCybercriminals No Longer Need Malware - They Target Emotions

In the world of cybercrime, malicious software is no longer the weapon of choice. According to the CrowdStrike 2025 Global Threat Report, a staggering 79% of cyber incidents in 2024 occurred without the use of malware. Instead of breaching firewalls or exploiting code, attackers are now going after the weakest link in corporate infrastructure: the human.

Goodbye, Viruses. Hello, Psychology.

Hollywood often portrays hackers as tech geniuses—think The Matrix, Swordfish, or Mr. Robot—breaking into systems with lines of code. But reality paints a different picture. Today’s cybercriminals are psychological manipulators. Social engineering, phishing, impersonation, and voice phishing (vishing) have become dominant tactics.

The report highlights a 442% surge in vishing attacks within one year, comparing the first and second halves of 2024. Posing as help desk agents or company executives, attackers exploit human emotions—urgency, authority, curiosity—to manipulate employees into handing over passwords, clicking links, or initiating wire transfers.

“Ironically, the stronger our technical defenses become, the more criminals pivot to exploiting people,” says Paweł Hordyński, cybersecurity expert and CEO of IT Develop. “Malware-free attacks are now the norm. Hackers ‘hack emotions,’ not systems, by sending highly convincing phishing emails or making urgent-sounding calls posing as IT support. Businesses must urgently invest not just in tools, but in staff training and strict verification protocols.”

AI: A Force Multiplier for Fraud

The report also warns that Generative AI (GenAI) is rapidly becoming a game-changer in cybercrime. Tools powered by GenAI allow hackers to quickly scale operations, generate realistic scams, and even create deepfakes. A widely reported case involved an employee at Arup who transferred $25 million after attending a video meeting with AI-generated avatars impersonating senior executives.

48 Minutes to Contain a Breach—Or Less

Speed is now critical. Once a breach occurs, organizations have a tiny window to respond. In 2024, attackers needed an average of 48 minutes to move laterally through company systems, down from 62 minutes in 2023. The fastest recorded time? 51 seconds.

To stay ahead, organizations are increasingly turning to OSINT (Open Source Intelligence) tools. These solutions tap into public data sources—forums, websites, the dark web—to identify early signs of threats, like leaked credentials or brand impersonation. Tools such as TheHarvester, Amass, and SpiderFoot are even available for free, making them especially valuable for SMEs.

While OSINT tools don’t replace traditional security platforms like EDR/XDR or SIEM, they enhance an organization’s threat visibility and early detection capabilities, particularly during reconnaissance and attack surface mapping.

Hardware Security: Outdated Devices Are a Silent Threat

Even the best cybersecurity software can’t protect businesses from the vulnerabilities of outdated or neglected IT infrastructure. Unsupported systems, unpatched firmware, and legacy devices are a significant liability.

According to Forrester, global cybercrime costs could reach $12 trillion in 2025. For many small and mid-sized businesses, upgrading hardware is financially burdensome. This is where IT equipment rental models can help. Renting allows access to modern, secure, and regularly updated technologies without the steep upfront costs.

“Outdated laptops, phones, and routers are a silent but real threat,” warns Jakub Buga, CEO of Gleevery. “Using legacy devices significantly increases exposure to known vulnerabilities. Flexible IT rental models provide access to supported, secure equipment—and often include full lifecycle management, secure data wiping, and compliance with GDPR and ISO 27001 standards.”

Resilience Through Modern Strategy

The evolution of cyberattack methods—particularly the rise of malware-free breaches and the shrinking time to respond—demands a comprehensive, adaptive approach to cybersecurity. Effective strategies must combine:

  • Advanced detection tools (EDR/XDR, SIEM)
  • Proactive OSINT monitoring
  • Robust staff training and verification protocols
  • Secure, modern IT infrastructure
  • Risk management at both technical and human levels

As threats continue to evolve, so too must the defenses. In 2025, cybersecurity is no longer a tech issue—it’s a core business priority.

Check out our other content
Related Articles
The Latest Articles