Christina Lekati

875 Followers
119 Following
197 Posts
#SocialEngineering, #Psychology, & #OSINT intertwined for the sake of security. Exec Board Member @osintcurious

If you think AI and deepfakes are THE name of the game in "sophisticated" social engineering attacks, think again. AI-generated deepfakes are often just one step (a final blow) in a larger social engineering kill-chain.

In this week's social engineering case, we see a layered intrusion involving a compromised Telegram account, a fake Zoom meeting, a ClickFix-style infection vector and, as a last step, an AI-generated video.

๐–๐ก๐š๐ญ ๐ก๐š๐ฉ๐ฉ๐ž๐ง๐ž๐?

๐Ÿ”ธ The threat actor initiates contact with a specific victim via Telegram, using a legitimate but compromised account of an executive, to leverage existing trust.

๐Ÿ”ธ After building rapport through industry-specific conversation, the actor invites the victim to a call, and sends a Calendly link to schedule it.

๐Ÿ”ธ The Calendly link redirects to a spoofed Zoom meeting hosted on the threat actor's infrastructure: zoom[.]uswe05[.]us
๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ช๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต ๐˜ฐ๐˜ฃ๐˜ท๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ญ๐˜ข๐˜จ ๐˜ต๐˜ฉ๐˜ข๐˜ต *๐˜ค๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ* ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ฃ๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ด๐˜ฑ๐˜ฐ๐˜ต๐˜ต๐˜ฆ๐˜ฅ. 
๐˜‰๐˜ถ๐˜ต, ๐˜ธ๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ข ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ต๐˜ข๐˜ฌ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ช๐˜ฎ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข ๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต-๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฆ๐˜ณ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฎ๐˜ฆ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ช๐˜ด๐˜ฎ ๐˜ฌ๐˜ช๐˜ค๐˜ฌ๐˜ด ๐˜ช๐˜ฏ. ๐˜ˆ๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ญ๐˜ช๐˜ต๐˜ต๐˜ญ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ญ๐˜ข๐˜จ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ง๐˜ฐ๐˜ญ๐˜ญ๐˜ฐ๐˜ธ ๐˜ต๐˜ฆ๐˜ฏ๐˜ฅ ๐˜ต๐˜ฐ ๐˜จ๐˜ฆ๐˜ต ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ญ๐˜ฐ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ฅ. ๐˜ˆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ๐˜บ ๐˜ฅ๐˜ช๐˜ฅ.

๐Ÿ”ธ The call begins. The victim sees the video of a CEO from another company. Or, purportedly, their deepfake version.

๐Ÿ”ธ And then hey, "the audio is broken!". If only that could quickly get fixed...there are only 20 minutes left in the call.
This is where the ClickFix-style social engineering begins. The the threat actor directs the victim to run troubleshooting commands on their system to fix the issue.

๐Ÿ”ธ Embedded within the string of commands is a single command that initiates a multi-stage infection chain, ultimately deploying 7 distinct malware families (described in the report).

"Proven play? Replay".
This is not a one time hit. Mandiant has observed UNC1069 using these techniques to target both corporate entities and individuals within the cryptocurrency industry, as well as venture capital firms and their employees or executives. The list will expand.

Sophisticated social engineering attacks remain the ones that contain multiple elaborate steps that eventually build on each other to make the scheme work.

Full report:
https://cloud.google.com/blog/topics/threat-intelligence/unc1069-targets-cryptocurrency-ai-social-engineering

#socialengineering #deepfakes #infosec #threatintelligence

UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering | Google Cloud Blog

North Korean threat actors target the cryptocurrency industry using AI-enabled social engineering such as deepfakes, and ClickFix.

Google Cloud Blog

๐Ž๐ฎ๐ซ "๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ ๐จ๐Ÿ ๐‚๐ฒ๐›๐ž๐ซ ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ง๐ ๐‡๐ฎ๐ฆ๐š๐ง ๐ˆ๐ง๐ญ๐ž๐ฅ๐ฅ๐ข๐ ๐ž๐ง๐œ๐ž" ๐œ๐ฅ๐š๐ฌ๐ฌ ๐ข๐ฌ ๐ซ๐ž๐ญ๐ฎ๐ซ๐ง๐ข๐ง๐  ๐ญ๐ก๐ข๐ฌ ๐ฌ๐ฉ๐ซ๐ข๐ง๐  ๐ญ๐จ Black Hat Asia ๐ข๐ง ๐’๐ข๐ง๐ ๐š๐ฉ๐จ๐ซ๐ž! ๐ŸŽ‰

Join Samuel Lolagar and me on the 21st & 22nd of April for two days full of learning, hands-on exercises, real life case studies and the latests developments in #OSINT #SOCMINT and #HUMINT.

You will learn how to conduct an in-depth digital investigation on a subject, discover new leads, uncover and utilize all the evidence that are hiding in plain sight (and beyond) and conduct virtual HUMINT in an uncomplicated, step-by-step process.
We have seen firsthand the power of these techniques and we firmly believe in the effectiveness of combining these complementary intelligence disciplines.

We are looking forward to passing these skills on to our new group of attendees.
Hope to see you there!

P.S. There will be a class challenge, and a reward :)

Training details & registration: https://blackhat.com/asia-26/training/schedule/?track[]=human

#BlackHatAsia #BHAsia #OSINT #opensourceintelligence #humanintelligence #socialengineering

Berlin was faced with a 2nd arson attack on their power grid within a few months, leaving again thousands of households without power, for days. During this incident, several systems were damaged simultaneously deeming any backup systems, ineffective.
An attack like this requires planning, and it starts from reconnaissance.

How did the attackers know to set fire on one specific bridge that contained five high-voltage and ten medium-voltage cables, causing a major power outage in the area?
Can someone find sufficient information on a city's power grid infrastructure available on the internet?
Yes, they can. With more detail than there should be.

This is where platforms like the Open Infrastructure Map ("OpenInfraMap") enter the game.
๐Ž๐ฉ๐ž๐ง๐ˆ๐ง๐Ÿ๐ซ๐š๐Œ๐š๐ฉ (๐ก๐ญ๐ญ๐ฉ๐ฌ://๐จ๐ฉ๐ž๐ง๐ข๐ง๐Ÿ๐ซ๐š๐ฆ๐š๐ฉ.๐จ๐ซ๐ /) is an open-source web platform that provides a layered, detailed visualization on global infrastructure data like ๐˜ฑ๐˜ฐ๐˜ธ๐˜ฆ๐˜ณ, ๐˜ต๐˜ฆ๐˜ญ๐˜ฆ๐˜ค๐˜ฐ๐˜ฎ, ๐˜ฐ๐˜ช๐˜ญ ๐˜ข๐˜ฏ๐˜ฅ ๐˜จ๐˜ข๐˜ด ๐˜ฏ๐˜ฆ๐˜ต๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด, ๐˜ธ๐˜ข๐˜ต๐˜ฆ๐˜ณ ๐˜ช๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ซ๐˜ฐ๐˜ณ ๐˜ณ๐˜ข๐˜ช๐˜ญ ๐˜ฑ๐˜ฐ๐˜ธ๐˜ฆ๐˜ณ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ช๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ (the data is crowdsourced from OpenStreetMap).

Don't think that searching this map needs to take time, by using Overpass Turbo (also with the help of with any LLM that it is compatible with) one can significantly trim the search time and concentrate their research through queries.

Looking at the OpenInfraMap data in combination with satellite imagery, it is easy to see why this point of attack was chosen: all the 110 ฮšilovolt high-voltage lines that supply southwest Berlin converge into a single cable bridge that is overground, accessible, near a sparsely populated area, with plenty of hiding spaces (trees, etc).

The Google street view imagery provides some extra help in reviewing some of the physical security and the surrounding area in preparation of a better plan.

The OpenInfraMap in combination with Google maps is just one simple example of potential adversarial OSINT. There is more publicly available information and databases that can be researched, found, and used in similar acts of sabotage (or worse, given the geopolitical state we are currently in).

It is scary easy for saboteurs or other attackers to find vulnerabilities on critical infrastructure free & available online, and to focus on the locations/points where an attack could have the maximum impact.
This incident has not been an isolated event.

What can be done? If you work on securing a critical infrastructure entity:

๐Ÿ”น Run your own OSINT analysis to identify vulnerabilities in advance. Know your level of exposure.

Control what you can:
๐Ÿ”น Where possible, ask platforms to add blur or remove certain imagery. Aim for less detail in what can be visible, even through crowdsourced images.

๐Ÿ”น Prioritize based on risk and take practical steps to implement better security measures on those vulnerable, identified spots before an adversary exploits them.

#OSINT #BerlinBlackout

3 resources / 1 post

Open AI has released a new report outlining the ways in which threat actors used their generative AI products to support their social engineering attack operations. They provide the case studies.

https://openai.com/global-affairs/disrupting-malicious-uses-of-ai-june-2025/

Why is this useful?

๐Ÿ”น The operations described in the report help give us a better understanding of how threat actors are *realistically* trying to abuse GenAI models. No guesses, no fancy assumptions, just the observed TTPs.

๐Ÿ”น I know that some of you in my network (and some of our clients) had to deal with the attacks documented. This will hit home.

๐Ÿ”น Ultimately, we can use this report help us further improve our defense strategies with reality in mind.

๐Ÿ”น In the comments, you will find 2 additional reports (from Anthropic & Google) on how GenAI has been used in social engineering attacks. They provide a more holistic understanding on how these tools are being used by adversaries.

---------

2 additional reports on how GenAI has been used in social engineering attacks. They provide a more holistic understanding on how these tools are being used by adversaries:

Report by Anthropic (Claude): https://www.anthropic.com/news/detecting-and-countering-malicious-uses-of-claude-march-2025

Report by Google (government-backed threat actor use of the Gemini): https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai

Happy news!! This September at BruCon we will be taking a deep dive into #socialengineering and #OSINT through a 3-day, hands-on training class!
I SO look forward to it and to meeting the participants!! ๐Ÿคฉ๐Ÿ‘ฉ๐Ÿปโ€๐Ÿ’ป

Full class content & details:
https://www.brucon.org/training-details/social-engineering-open-source

In January, I wrote about a vast China-based cloud CDN called Funnull that catered to cybercriminals in China and Russia seeking to route their traffic through US-based Cloud providers, particularly Microsoft and Amazon.

https://krebsonsecurity.com/2025/01/infrastructure-laundering-blending-in-with-the-cloud/

I did not expect this, or so quickly, but it looks like Treasury just sanctioned Funnulll, calling it a major scam distributor.

https://home.treasury.gov/news/press-releases/sb0149

January's story was based on research by Silent Push, which found a large number of domains hosted via Funnull promoting gambling sites that bear the logo of the Suncity Group, a Chinese entity named in a 2024 UN report (PDF) for laundering millions of dollars for the North Korean Lazarus Group.

In 2023, Suncityโ€™s CEO was sentenced to 18 years in prison on charges of fraud, illegal gambling, and โ€œtriad offenses,โ€ i.e. working with Chinese transnational organized crime syndicates. Suncity is alleged to have built an underground banking system that laundered billions of dollars for criminals.

The rise of Agentic AI has opened new frontiers for adversaries looking to automate and scale social engineering attacks. We are entering a phase where Agentic AI systems will be able act autonomously, make decisions, adapt based on feedback, and complete goal-oriented operations with minimal human intervention.

I wrote an article explaining what Agentic AI really is, and how it can shape the future of social engineering attacks. โฌ‡๏ธ

https://christina-lekati.medium.com/when-ai-goes-rogue-how-agentic-ai-will-reshape-social-engineering-attacks-b795838c1aaa

#AgenticAI #SocialEngineering #cybersecurity

When AI Goes Rogue: How Agentic AI Will Reshape Social Engineering Attacks

Cyber criminals are rarely late to the game when it comes to new technologies. In fact, theyโ€™re often among the first ones to experiment with emerging technologies. They do not have the limitationsโ€ฆ

Medium

Surprise! Really excited to announce that the next "๐‘บ๐’๐’„๐’Š๐’‚๐’ ๐‘ฌ๐’๐’ˆ๐’Š๐’๐’†๐’†๐’“๐’Š๐’๐’ˆ & ๐‘ถ๐’‘๐’†๐’-๐’”๐’๐’–๐’“๐’„๐’† ๐‘ฐ๐’๐’•๐’†๐’๐’๐’Š๐’ˆ๐’†๐’๐’„๐’† ๐’‡๐’๐’“ ๐‘บ๐’†๐’„๐’–๐’“๐’Š๐’•๐’š ๐‘ป๐’†๐’‚๐’Ž๐’”" open class will be happening at x33fcon in Gdynia, Poland!!

This is an intensive, 2-day training. We will cover:

๐Ÿ”น Timeless Social Engineering Attack Scenarios: The tricks that keep working (and why).

๐Ÿ”น The Psychology behind social engineering (we will go well beyond influence tactics!!)

๐Ÿ”น Hybrid & advanced attack techniques that combine multiple attack verticals.

๐Ÿ”น The use of AI in all phases of the social engineering kill-chain.

๐Ÿ”น OSINT: How to conduct reconnaissance on a target (business / person) and what to look for.

๐Ÿ”น Highly practical open-source intelligence (OSINT) tools & techniques that facilitate attack scenarios.

๐Ÿ”น Blue Team Countermeasures: How to disrupt social engineering attacks & create a defense strategy.

...but there will also be some surprises ๐Ÿคซ โœจ โœจ

If you're attending #x33fcon this year I look forward to seeing you there!

Class Details & Registration: https://www.x33fcon.com/?fbclid=IwAR2B-2KwiZ3dJeKl-#!t/SE_OSINT.md

#SocialEngineering #OSINT #x33fcon #RedTeam #BlueTeam

x33fcon

If you are using HUMINT techniques in your cyber threat intelligence process, this is a talk worth watching!
Eliska and Julien do a very good job in breaking down some important concepts including the risks, benefits and analytical aspects of using HUMINT tactics in a CTI workflow and provide some of their own experiences in an easy to understand way.

As a side note, HUMINT in CTI is not meant to replace the technical analysis, but to complement it. It is meant to fill in some gaps with intel that cannot be found through a technical analysis or other passive intelligence collection disciplines. That may include a threat actor's motives, future targets, skill/group developments, future plans, etc.

Happy watching!

https://youtu.be/o1TTO5d1DXQ?si=ScY3uyG63ixNl2Zs

It's so overt it's covert: leveraging classic HUMINT tactics in CTI investigations

YouTube

Surprise! Really excited to announce that the next "๐‘บ๐’๐’„๐’Š๐’‚๐’ ๐‘ฌ๐’๐’ˆ๐’Š๐’๐’†๐’†๐’“๐’Š๐’๐’ˆ & ๐‘ถ๐’‘๐’†๐’-๐’”๐’๐’–๐’“๐’„๐’† ๐‘ฐ๐’๐’•๐’†๐’๐’๐’Š๐’ˆ๐’†๐’๐’„๐’† ๐’‡๐’๐’“ ๐‘บ๐’†๐’„๐’–๐’“๐’Š๐’•๐’š ๐‘ป๐’†๐’‚๐’Ž๐’”" open class will be happening at x33fcon in Gdynia, Poland!!

This is an intensive, 2-day training. We will cover:

๐Ÿ”น Timeless Social Engineering Attack Scenarios: The tricks that keep working (and why).

๐Ÿ”น The Psychology behind social engineering (we will go well beyond influence tactics!!)

๐Ÿ”น Hybrid & advanced attack techniques that combine multiple attack verticals.

๐Ÿ”น The use of AI in all phases of the social engineering kill-chain.

๐Ÿ”น OSINT: How to conduct reconnaissance on a target (business / person) and what to look for.

๐Ÿ”น Highly practical open-source intelligence (OSINT) tools & techniques that facilitate attack scenarios.

๐Ÿ”น Blue Team Countermeasures: How to disrupt social engineering attacks & create a defense strategy.

...but there will also be some surprises ๐Ÿคซ โœจ โœจ

If you're attending #x33fcon this year I look forward to seeing you there!

Class Details & Registration: https://www.x33fcon.com/?fbclid=IwAR2B-2KwiZ3dJeKl-#!t/SE_OSINT.md

#SocialEngineering #OSINT #x33fcon #RedTeam #BlueTeam

x33fcon