IT support teams, also known as service desks, are usually the first people we call when something goes wrong with our computers or accounts. They’re there to help fix issues, unlock accounts, and reset passwords. But this helpfulness is now being used against them.
Cybercriminals are targeting these service desks by pretending to be trusted employees or partners. They call in with fake stories, hoping to trick support staff into giving them access to systems. This method, called social engineering, relies on human trust — not hacking tools.
Recent Examples of These Attacks
In the past few months, several well-known companies have been hit by this kind of trickery:
1. Marks & Spencer: Attackers got the IT team to reset passwords, which gave them access to personal data. Their website and online services were down for weeks.
2. Co-Op Group: The support team was misled into giving system access. As a result, customer details and staff logins were stolen, and some store shelves went empty.
3. Harrods: Hackers tried a similar trick but were caught in time before they could cause any damage.
4. Dior: An unknown group accessed customer information like names and shopping history. Thankfully, no payment details were leaked.
5. MGM Resorts (2023): Hackers phoned the help desk, pretending to be someone from the company. They convinced the team to turn off extra security on an account, which led to a major cyberattack.
Why Hackers Target Support Desks
It’s often much easier to fool a person than to break into a computer system. Help desk workers are trained to respond quickly and kindly, especially when someone seems stressed or claims they need urgent access.
Hackers take advantage of this by pretending to be senior staff or outside vendors, using pressure and believable stories to make support agents act without asking too many questions.
How These Scams Work
• Research: Criminals gather public details about the company and employees.
• Fake Identity: They call the support team, claiming to be locked out of an account.
• Create Urgency: They insist the situation is critical, hoping the agent rushes to help.
• Avoiding Security: They make up excuses for not being able to use two-step login and ask for a reset.
• Gain Access: Once the reset is done, they log in and start their attack from the inside.
What Can Be Done to Prevent This
Companies should train their support teams to slow down, ask the right questions, and always verify who they’re talking to — no matter how urgent the request sounds. It’s also smart to use extra security tools that help confirm a person’s identity before giving access.
Adding clear rules and multi-layered checks will make it harder for attackers to slip through, even when they try their best to sound convincing.
A major Chinese telecom company has launched what it claims is the first commercial security system that can protect digital communication from even the most powerful future hackers — including those using quantum computers.
China Telecom Quantum, a state-owned firm, recently introduced a new kind of encryption system that combines two advanced technologies to create strong protection for data, phone calls, and user identity. This system was successfully used to make a secure phone call between Beijing and Hefei a distance of more than 1,000 kilometers — without risking any data leaks or breaches.
The Problem: Quantum Computers Could Break Today’s Encryption
As quantum computing continues to develop, it is expected to pose a serious threat to current cybersecurity systems. These new types of computers are extremely fast and powerful, and experts believe they could one day crack the encryption used to protect sensitive information like passwords, bank data, and government records.
To stay ahead of these threats, China Telecom has built a new system that combines:
1. A quantum-based method that sends encryption keys using the principles of quantum physics, making them nearly impossible to steal or intercept.
2. A mathematics-based method that protects data using very difficult equations that even quantum computers would find hard to solve.
This two-layer approach forms a highly secure framework to protect digital communication.
Tested in Real Conditions and Ready to Use
China Telecom says the system has been tested successfully and is ready to be used on a large scale. The company has already created secure quantum networks in 16 cities, including Beijing, Shanghai, Guangzhou, and Hefei.
These networks now make up a nationwide secure communication system. Among them, Hefei’s network is the largest and most advanced in the world, with eight main hubs and over 150 connection points spread across 1,147 kilometers. It is already being used by around 500 government departments and nearly 400 publicly owned companies.
Extra Tools for Safe Messaging and Document Management
The company has also introduced two new secure tools:
• Quantum Secret — a messaging and teamwork app designed to keep communication safe from even advanced hackers.
• Quantum Cloud Seal — a platform made for secure digital approvals, auditing, and managing documents for businesses and government offices.
Both tools are already being used across different industries in China.
With this launch, China has taken a major step toward building a future-ready cybersecurity system — one that can stay strong even as quantum computing technology continues to grow.
Cyberattacks aren’t what they used to be. Instead of one group planning and carrying out an entire attack, today’s hackers are breaking the process into parts and handing each step to different teams. This method, often seen in cybercrime now, is making it more difficult for security experts to understand and stop attacks.
In the past, cybersecurity analysts looked at threats by studying them as single operations done by one group with one goal. But that method is no longer enough. These days, many attackers specialize in just one part of an attack—like finding a way into a system, creating malware, or demanding money—and then pass on the next stage to someone else.
To better handle this shift, researchers from Cisco Talos, a cybersecurity team, have proposed updating an older method called the Diamond Model. This model originally focused on four parts of a cyberattack: the attacker, the target, the tools used, and the systems involved. The new idea is to add a fifth layer that shows how different hacker groups are connected and work together, even if they don’t share the same goals.
By tracking relationships between groups, security teams can better understand who is doing what, avoid mistakes when identifying attackers, and spot patterns across different incidents. This helps them respond more accurately and efficiently.
The idea of cybercriminals selling services isn’t new. For years, online forums have allowed criminals to buy and sell services—like renting out access to hacked systems or offering ransomware as a package. Some of these relationships are short-term, while others involve long-term partnerships where attackers work closely over time.
In one recent case, a group called ToyMaker focused only on breaking into systems. They then passed that access to another group known as Cactus, which launched a ransomware attack. This type of teamwork shows how attackers are now outsourcing parts of their operations, which makes it harder for investigators to pin down who’s responsible.
Other companies, like Elastic and Google’s cyber threat teams, have also started adapting their systems to deal with this trend. Google, for example, now uses separate labels to track what each group does and what motivates them—whether it's financial gain, political beliefs, or personal reasons. This helps avoid confusion when different groups work together for different reasons.
As cybercriminals continue to specialize, defenders will need smarter tools and better models to keep up. Understanding how hackers divide tasks and form networks may be the key to staying one step ahead in this ever-changing digital battlefield.
A newly discovered cyberattack is targeting WordPress websites by using a plugin that pretends to improve security but actually opens a backdoor for criminals. This fake plugin secretly gives attackers full control of affected sites.
How the Infection Begins
Security researchers at Wordfence found this malware while cleaning an infected website earlier this year. They noticed that a key WordPress system file named ‘wp-cron.php’ had been tampered with. This edited file was creating and activating a hidden plugin on its own, without the website owner’s permission.
This plugin has appeared under various names such as:
• wp-antymalwary-bot.php
• addons.php
• wpconsole.php
• wp-performance-booster.php
• scr.php
Even if the plugin is deleted manually, the altered ‘wp-cron.php’ file automatically brings it back the next time someone visits the website. This allows the malicious code to keep coming back.
How Hackers Might Be Gaining Entry
It’s still not clear how the hackers are getting into these websites in the first place. Experts believe they may be using stolen login credentials for hosting accounts or file transfer services like FTP. Unfortunately, no server logs were available to confirm exactly how the breach happens.
What the Plugin Allows Attackers to Do
Once active, the plugin checks if it's running correctly and then silently gives the attacker admin-level control. By using a special hidden function, attackers can log in as an administrator without using the usual login page. All they need is a specific web address and a password to take over the site.
The plugin also opens a secret door (called an API route) that doesn’t require login access. This lets attackers do things like:
• Add harmful code into theme files
• Clear plugin cache data
• Carry out other hidden tasks via special web requests
In updated versions of the malware, the plugin can also add harmful JavaScript to the website’s code. This can be used to show spam, redirect users to risky websites, or collect data from site visitors.
What Site Owners Should Watch For
Website managers should check the ‘wp-cron.php’ file and their theme’s ‘header.php’ file for any unfamiliar edits. Also, log entries with keywords like “emergency_login” or “urlchange” should be seen as warning signs of a possible attack.
Regular monitoring and cleanup can help prevent these kinds of silent takeovers.
As artificial intelligence becomes more common in business settings, experts are warning that these tools could be the next major target for online criminals.
Some of the biggest software companies, like Microsoft and SAP, have recently started using AI systems that can handle office tasks such as finance and data management. But these digital programs also come with new security risks.
What Are These Digital Identities?
In today’s automated world, many apps and devices run tasks on their own. To do this, they use something called digital identities — known in tech terms as non-human identities, or NHIs. These are like virtual badges that allow machines to connect and work together without human help.
The problem is that every one of these digital identities could become a door for hackers to enter a company’s system.
Why Are They Being Ignored?
Modern businesses now rely on large numbers of these machine profiles. Because there are so many, they often go unnoticed during security checks. This makes them easy targets for cybercriminals.
A recent report found that nearly one out of every five companies had already dealt with a security problem involving one of these digital identities.
Unsafe Habits Increase the Risk
Many companies fail to change or update the credentials of these identities in a timely manner. This is a basic safety step that should be done often. However, studies show that more than 70% of these identities are left unchanged for long periods, which leaves them vulnerable to attacks.
Another issue is that nearly all organizations allow outside vendors to access their digital identities. When third parties are involved, there is a bigger chance that something could go wrong, especially if those vendors don’t have strong security systems of their own.
Experts say that keeping old login details in use while also giving access to outsiders creates serious weak spots in a company's defense.
What Needs to Be Done
As businesses begin using AI agents more widely, the number of digital identities is growing quickly. If they are not protected, hackers could use them to gain control over company data and systems.
Experts suggest that companies should treat these machine profiles just like human accounts. That means regularly updating passwords, limiting who has access, and monitoring their use closely.
With the rise of AI in workplaces, keeping these tools safe is now more important than ever.