Skip to main content

Sean Moran

Sean Moran is a cyber security specialist who brings a wealth of knowledge to the Jumpsec team. You can read his latest articles here on data, ransomware and everything cyber.

  • The ‘human element’ is the weakest. If we solve that, we solve ransomware.
    Social engineering is certainly part of the playbook, but overly focusing on human fallibility misses the underlying gaps in identity and access controls that enable lateral movement and persistence.
  • ‘Vishing’ should now be the primary focus as social engineering’s leading technique.
    Attacker’s tactics extend far beyond voice-based attacks as SIM swapping, MFA fatigue attacks, and legacy authentication protocol abuse are all part of the same identity-centric threat model. That’s without mentioning the threat posed by AI-augmented phishing techniques that will increasingly bring non-native English attackers up to par with Scattered Spider’s reported USP.
  • Scattered Spider’s window of opportunity was a single successful fraudulent phone call.
    But how did the individuals associated with Scattered Spider manage to create a realistic pretext for their vishing scenario? It is easier to blame the psychology of deception than to acknowledge the vast footprint of exposed data, open-source intelligence (OSINT), and weak verification processes that may have made the social engineering possible in the first place. From LinkedIn roles and contact details, to leaked helpdesk scripts or leaked internal process documents, attackers’ reconnaissance opportunities can and should be reverse engineered and simulated.
  • Attackers target certain industries and countries for sustained periods before moving on.
    Reports claiming that Scattered Spider have “moved on” from UK retail to US insurance or aviation paint a misleading picture of groups exclusively targeting a specific industry, as opposed to more commonly seen opportunistic targeting across multiple sectors simultaneously. This should not create a false sense of security for those industries that are reportedly ‘in the clear’.
Level 1: Low context, poorly executed human voice call

  • Generic scripts with little to no research (e.g., “Hi, this is IT, can you reset your password?”).
  • Typically flagged quickly due to lack of insider knowledge and unconvincing delivery.

Level 2: Low- to mid-context, AI-generated voice call

  • AI voice cloning for tone and delivery but with minimal or generic pretext work.
  • Convincing voice quality but ineffective if context doesn’t align with expectations.

Level 3: High context, well-researched human voice call

  • A skilled social engineer gathers significant OSINT and delivers a believable, confident call.
  • Relies on charisma, improvisation, and knowledge of internal processes.

Level 4: High-context, quality AI-generated voice impersonating a specific employee or executive

  • Combines extensive OSINT with advanced voice cloning, potentially real-time AI interaction.
  • The biggest ‘growth area’ in vishing sophistication today, capable of mimicking an actual voice, equipped with internal knowledge, with minimal barriers to entry (i.e. language or tech investment).
  • Just how close we are to this level of believability is subjective, but it either here or fast approaching).
Profile-Pic-BW-cropped copy

Sean Moran

Sean is a security writer with a focus on ransomware extortion and its impact on the wider cyber security industry.

×

Under attack? Call our 24/7 Incident Response Hotline now

Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.

0333 987 4048

For regular switchboard please
contact - 0333 939 8080