Arab Press

بالشعب و للشعب
Monday, Jan 26, 2026

A ransomware attack can begin in surprisingly simple ways

A ransomware attack can begin in surprisingly simple ways

Hackers often look for cracks in an organization's human shield
Ransomware can sneak into an organization by simple deception.

Often referred to as social engineering, hackers often look for cracks in the human shield at organizations.

This lets the attackers in the door, allowing them to gain higher "privileges" – or a higher level of security access – in a computer network; the key to carrying out a ransomware attack.

"Social engineering attacks can be executed to escalate privilege and gain more sensitive information and access over a series of attacks," Alethe Denis, social engineering expert and consultant for Critical Insight, told Fox Business.

Most cyberattacks – about 70 percent – are related to email phishing, Denis said. Phishing emails – which appear to come from a trusted source – are a simple but effective form of social engineering.

A more sophisticated approach involves a "well-thought-out and formally planned attack that has one or more social engineering elements," Denis said, adding that this kind of ransomware attack might, for example, target the oil and gas sector.

This approach may employ the gathering of seemingly innocuous information via a phone call, email or text message.

"While some of us think that we would be able to defend against these things, all of us are actually very much susceptible to these types of attacks," Denis explains in a recent video on the topic.

Attackers can essentially turn somebody in an organization into an unwitting insider.

"[Attackers are] going to hedge bets on using helpful employees whose job function is to be helpful, perform customer service or otherwise be receptive to requests and handle requests – those types of roles within your company are going to be targeted," Denis says in the video.

Denis gives one example of a company issuing a press release about their most recent charitable-giving campaign in which they mention a specific charity and a specific dollar amount that the campaign raised.

"The attacker would be able to then learn the name of the charity, the amount of money that was raised through the campaign and incorporate these into their development of a solid phish [email]," she says in the video.

"They could use logos of the charity … to pose as a representative from the charity and then incentivize the company to … engage with the email based on the fact that they promise some kind of recognition. Either an award or some kind of collaborative marketing effort to bring attention to this campaign," Denis says in the video.

Social media is also a favorite target.

"Social media is a bad actor's best friend and houses an immense amount of data that can be leveraged against businesses," Denis told Fox Business.

The larger point is, once the attacker gets a foothold, ransomware unfolds over a series of attacks, "resulting in a series of smaller compromises and finally one larger compromise to a company's data or systems," Denis said.

Though the final attack is the one that makes the news, the first stages of an attack are part of "an onion with many layers and take thoughtful time and planning."
Newsletter

Related Articles

Arab Press
0:00
0:00
Close
Trump Defends Saudi Crown Prince in Heated Exchange After Reporter Questions Khashoggi Murder and 9/11 Links
Saudi Stocks Rally as Kingdom Prepares to Fully Open Capital Market to Global Investors
Air France and KLM Suspend Multiple Middle East Routes as Regional Tensions Disrupt Aviation
Saudi Arabia scales back Neom as The Line is redesigned and Trojena downsized
Saudi Industrial Group Completes One Point Three Billion Dollar Acquisition of South Africa’s Barloworld
Saudi-Backed LIV Golf Confirms Return to Trump National Bedminster for 2026 Season
Gold Jumps More Than 8% in a Week as the Dollar Slides Amid Greenland Tariff Dispute
Boston Dynamics Atlas humanoid robot and LG CLOiD home robot: the platform lock-in fight to control Physical AI
United States under President Donald Trump completes withdrawal from the World Health Organization: health sovereignty versus global outbreak early-warning access
Trump Administration’s Iran Military Buildup and Sanctions Campaign Puts Deterrence Credibility on the Line
Tech Brief: AI Compute, Chips, and Platform Power Moves Driving Today’s Market Narrative
NATO’s Stress Test Under Trump: Alliance Credibility, Burden-Sharing, and the Fight Over Strategic Territory
Saudi Arabia’s Careful Balancing Act in Relations with Israel Amid Regional and Domestic Pressures
Greenland, Gaza, and Global Leverage: Today’s 10 Power Stories Shaping Markets and Security
America’s Venezuela Oil Grip Meets China’s Demand: Market Power, Legal Shockwaves, and the New Rules of Energy Leverage
Trump’s Board of Peace: Breakthrough Diplomacy or a Hostile Takeover of Global Order?
Trump’s Board of Peace: Breakthrough Diplomacy or a Hostile Takeover of Global Order?
Trump’s Board of Peace: Breakthrough Diplomacy or a Hostile Takeover of Global Order?
Trump’s Board of Peace: Breakthrough Diplomacy or a Hostile Takeover of Global Order?
Prince William to Make Official Visit to Saudi Arabia in February
Saudi Arabia Advances Ambitious Artificial River Mega-Project to Transform Water Security
Saudi Crown Prince and Syrian President Discuss Stabilisation, Reconstruction and Regional Ties in Riyadh Talks
Mohammed bin Salman Confronts the ‘Iranian Moment’ as Saudi Leadership Faces Regional Test
Cybercrime, Inc.: When Crime Becomes an Economy. How the World Accidentally Built a Twenty-Trillion-Dollar Criminal Economy
Strategic Restraint, Credible Force, and the Discipline of Power
Donald Trump Organization Unveils Championship Golf Course and Luxury Resort Project in Saudi Arabia
Inside Diriyah: Saudi Arabia’s $63.2 Billion Vision to Transform Its Historic Heart into a Global Tourism Powerhouse
Trump Designates Saudi Arabia a Major Non-NATO Ally, Elevating US–Riyadh Defense Partnership
Trump Organization Deepens Saudi Property Focus with $10 Billion Luxury Developments
There is no sovereign immunity for poisoning millions with drugs.
Mohammed bin Salman’s Global Standing: Strategic Partner in Transition Amid Debate Over His Role
Saudi Arabia Opens Property Market to Foreign Buyers in Landmark Reform
The U.S. State Department’s account in Persian: “President Trump is a man of action. If you didn’t know it until now, now you do—do not play games with President Trump.”
CNN’s Ranking of Israel’s Women’s Rights Sparks Debate After Misleading Global Index Comparison
Saudi Arabia’s Shifting Regional Alignment Raises Strategic Concerns in Jerusalem
OPEC+ Holds Oil Output Steady Amid Member Tensions and Market Oversupply
Iranian Protests Intensify as Another Revolutionary Guard Member Is Killed and Khamenei Blames the West
President Trump Says United States Will Administer Venezuela Until a Secure Leadership Transition
Delta Force Identified as Unit Behind U.S. Operation That Captured Venezuela’s President
Saudi-UAE Rift Adds Complexity to Middle East Diplomacy as Trump Signals Firm Leadership
OPEC+ to Keep Oil Output Policy Unchanged Despite Saudi-UAE Tensions Over Yemen
Saudi Arabia and UAE at Odds in Yemen Conflict as Southern Offensive Deepens Gulf Rift
Abu Dhabi ‘Capital of Capital’: How Abu Dhabi Rose as a Sovereign Wealth Power
Diamonds Are Powering a New Quantum Revolution
Trump Threatens Strikes Against Iran if Nuclear Programme Is Restarted
Why Saudi Arabia May Recalibrate Its US Spending Commitments Amid Rising China–America Rivalry
Riyadh Air’s First Boeing 787-9 Dreamliner Completes Initial Test Flight, Advancing Saudi Carrier’s Launch
Saudi Arabia’s 2025: A Pivotal Year of Global Engagement and Domestic Transformation
Saudi Arabia to Introduce Sugar-Content Based Tax on Sweetened Drinks from January 2026
Saudi Hotels Prepare for New Hospitality Roles as Alcohol Curbs Ease
×