London Daily

Focus on the big picture.
Wednesday, May 13, 2026

A ransomware attack can begin in surprisingly simple ways

A ransomware attack can begin in surprisingly simple ways

Hackers often look for cracks in an organization's human shield
Ransomware can sneak into an organization by simple deception.

Often referred to as social engineering, hackers often look for cracks in the human shield at organizations.

This lets the attackers in the door, allowing them to gain higher "privileges" – or a higher level of security access – in a computer network; the key to carrying out a ransomware attack.

"Social engineering attacks can be executed to escalate privilege and gain more sensitive information and access over a series of attacks," Alethe Denis, social engineering expert and consultant for Critical Insight, told Fox Business.

Most cyberattacks – about 70 percent – are related to email phishing, Denis said. Phishing emails – which appear to come from a trusted source – are a simple but effective form of social engineering.

A more sophisticated approach involves a "well-thought-out and formally planned attack that has one or more social engineering elements," Denis said, adding that this kind of ransomware attack might, for example, target the oil and gas sector.

This approach may employ the gathering of seemingly innocuous information via a phone call, email or text message.

"While some of us think that we would be able to defend against these things, all of us are actually very much susceptible to these types of attacks," Denis explains in a recent video on the topic.

Attackers can essentially turn somebody in an organization into an unwitting insider.

"[Attackers are] going to hedge bets on using helpful employees whose job function is to be helpful, perform customer service or otherwise be receptive to requests and handle requests – those types of roles within your company are going to be targeted," Denis says in the video.

Denis gives one example of a company issuing a press release about their most recent charitable-giving campaign in which they mention a specific charity and a specific dollar amount that the campaign raised.

"The attacker would be able to then learn the name of the charity, the amount of money that was raised through the campaign and incorporate these into their development of a solid phish [email]," she says in the video.

"They could use logos of the charity … to pose as a representative from the charity and then incentivize the company to … engage with the email based on the fact that they promise some kind of recognition. Either an award or some kind of collaborative marketing effort to bring attention to this campaign," Denis says in the video.

Social media is also a favorite target.

"Social media is a bad actor's best friend and houses an immense amount of data that can be leveraged against businesses," Denis told Fox Business.

The larger point is, once the attacker gets a foothold, ransomware unfolds over a series of attacks, "resulting in a series of smaller compromises and finally one larger compromise to a company's data or systems," Denis said.

Though the final attack is the one that makes the news, the first stages of an attack are part of "an onion with many layers and take thoughtful time and planning."
Newsletter

Related Articles

0:00
0:00
Close
The Great Western Exit: Why Best Citizens Are Fleeing the Rich World [PODCAST]
The New Robber Barons of Intelligence: Are AI Bosses More Powerful Than Rockefeller?
The End of the Old Order [Podcast]
Britain’s Democracy Is Now a Costume
The AI Gold Rush Is Coming for America’s Last Open Spaces [Podcast]
The Pentagon’s AI Squeeze: Eight Tech Giants Get In, Anthropic Gets Shut Out [Podcast]
The War Map: Professor Jiang’s Dark Theory of Iran, Trump, China, Russia, Israel, and the Coming Global Shock [Podcast]
Labour Is No Longer a National Party [Podcast]
AI Isn’t Stealing Your Job. It’s Dismantling It Piece by Piece.
Lawyers vs Engineers: Why China Builds While America Litigates [Podcast]
Churchill’s Glass: The Drunk, the Doctor, and the Myth Britain Refuses to Sober Up From
Apple issues an unusual warning: this is how your iPhone can be hacked without you doing anything
Kennedy’s Quiet War on Antidepressants Sparks Alarm Across America’s Medical Establishment
The Met Gala Meets the Age of Billionaire Backlash
Russian Oligarch’s Superyacht Crosses Hormuz via Iran-Controlled Route
Gunfire Disrupts White House Correspondents’ Dinner as Trump Is Evacuated
A Leak, a King, and a Fracturing Alliance
Inside the Gates Foundation Turmoil: Layoffs, Scrutiny, and the Cost of Reputational Risk
UK Biobank Breach Exposes Health Data of 500,000, Listed for Sale on Chinese Platform
KPMG Cuts Around 10% of US Audit Partners After Failed Exit Push
French Police Probe Suspected Weather-Data Tampering After Unusual Polymarket Bets on Paris Temperatures
CATL Unveils Revolutionary EV Battery Tech: 1000 km Range and 7-Minute Charging Ahead of Beijing Auto Show
Crypto Scammers Capitalize on Maritime Chaos Near the Strait of Hormuz: A Rising Threat to Shipping Companies
Changi Airport: How Singapore Engineered the World’s Most Efficient Travel Experience
Power Dynamics: Apple’s Leadership Shakeup, Geopolitical Risks in the Strait of Hormuz, and Europe's Energy Strategy Amidst Global Challenges
Apple's Leadership Transition: Can New CEO John Ternus Navigate AI Challenges and Geopolitical Pressures?
Italy’s €100K Tax Gambit: Europe’s Soft Power Tax Haven
News Roundup
Microsoft lost 2.5 millions users (French government) to Linux
Privacy Problems in Microsoft Windows OS
News roundup
Péter András Magyar and the Strategic Reset of Hungary
Hungary After the Landslide — A Strategic Reset in Europe
Meghan Markle Plans Exclusive Women-Focused Retreat During Australia Visit
Starmer and Trump Hold Strategic Talks on Securing Strait of Hormuz Amid Rising Tensions
Unofficial Australia Visit by Prince Harry and Meghan Expected to Stir Tensions with Royal Circles
Pipeline Attack Cuts Significant Share of Saudi Arabia’s Oil Export Capacity
UK Stocks Rise on Ceasefire Momentum and Renewed Focus on Diplomacy
UK to Hold Further Strategic Talks on Strait of Hormuz Security
Starmer Voices Frustration as Global Tensions Drive Up UK Energy Costs
UK Students Voice Concern Over Proposal for Automatic Military Draft Registration
Rising Volatility Drives Uncertainty in UK Fuel and Petrol Prices
UK Moves to Deploy ‘Skyhammer’ Anti-Drone System to Strengthen Airspace Defense
New Analysis Explores UK Budget Mechanics in ‘Behind the Blue’ Feature
Man Arrested After Four Die in Channel Crossing Tragedy
UK Tightens Immigration Framework with New Sponsor Rules and Fee Increases
UK Foreign Secretary Highlights Impact of Intensified Strikes in Lebanon
UK Urges Inclusion of Lebanon in US-Iran Ceasefire Framework
UK Stocks Ease as Ceasefire Doubts in Middle East Weigh on Investor Confidence
UK Reassesses Cloud Strategy Amid Criticism Over Limited Support Measures
×