The Invisible Attention Vulnerability

The Invisible Attention Vulnerability

A well-known truth among security experts that humans are the weakest link and social engineering is the least resistant path for cyber attackers. The classic definition of social engineering is deception aimed to make people do what you want them to do. In the world of cybersecurity, it can be mistakenly opening an email attachment plagued with malicious code. The definition of social engineering is broad and does not cover the deception methods. The classic ones are temporary confidence building, wrong decisions due to lack of attention and curiosity traps.

Our lives have become digital. An overwhelming digitization wave with ever exciting new digital services and products improving our lives better. The only constant in this significant change is our limited supply of attention. As humans, we have limited time, and due to that our attention is a scarce resource. A resource every digital supplier wants to grab more and more of it. In a way, we evolved into attention optimization machines where we continuously decide what is interesting and what is not and furthermore we can ask the digital services to notify us when something of interest takes place in the future. The growing attention scarcity drove many technological innovations such as personalization on social networks. The underlying mechanism of attention works by directing our brainpower on a specific piece of information where initially we gather enough metadata to decide whether the new information is worthy of our attention or not. Due to the exploding amount of temptations for our attention, the time it takes us to decide whether something is interesting or not is getting shorter within time, which makes much more selective and faster to decide whether to skip or not. This change in behavior creates an excellent opportunity for cyber attackers which refine their ways in social engineering; a new attack surface is emerging. The initial attention decision-making phase allows attackers to deceive by introducing artificial but highly exciting and relevant baits at the right time, an approach that results in a much higher conversion ratio for the attackers. The combination of attention optimization, shortening decision times and highly interesting fake pieces of information set the stage for a new attack vector potentially highly effective.

Some examples:

Email – An email with a subject line and content that discusses something that has timely interest to you. For example, you changed your Linkedin job position today, and then you got an email one hour later with another job offer which sounds similar to your new job. When you change jobs your attention to the career topic is skyrocketing - I guess very few can resist the temptation to open such an email.

Social Networks Mentions – Imagine you’ve twitted that you are going for a trip to Washington and someone with a fake account replies to you with a link about delays in flights, wouldn’t you click on it? If the answer is yes, you could get infected by the mere click on the link.

Google Alerts – So you want to track mentions of yourself on the internet, and you set a google alert to send you an email whenever a new webpage appears on the net with your name on it. Now imagine getting such a new email mentioning you in a page with a juicy excerpt, wouldn’t you click on the link to read the whole page and see what they wrote about you?

All these examples promise high conversion ratios because they are all relevant and come in a timely fashion. If you are targeted at the busy part of the day the chances, you will click on something like that are high.


One of the main contributors to the emergence of this attack surface is the growth in personal data that is spread out on different networks and services. This public information serves as a sound basis for attackers to understand what is interesting for you and when.

Originally published on my blog

要查看或添加评论,请登录

Dudu Mimran的更多文章

  • What is Cloud Workload Protection?

    What is Cloud Workload Protection?

    Cloud usage is increasing rapidly. Analysts forecast growth of 17 percent for the worldwide public cloud services…

    4 条评论
  • Solving Data Privacy Once and For All

    Solving Data Privacy Once and For All

    The way online services are setup today implies that the only way to provide a more personalized experience to…

    2 条评论
  • Digital Transformation Is Hard and Existential

    Digital Transformation Is Hard and Existential

    There is no large corporation on the planet which does not have digital transformation as one of the top three…

  • 2020 Unpredictions in Cyber Security

    2020 Unpredictions in Cyber Security

    The end of the year tradition of prediction is becoming a guessing game as the pace of innovation is increasing towards…

  • "Best Practices" for Data Breaches

    "Best Practices" for Data Breaches

    LifeLabs, a Canadian company, suffered a significant data breach. According to this statement, the damage was “customer…

  • Spanning the Chasm: The Missing Link in Tech Regulation – Part 1 of 2

    Spanning the Chasm: The Missing Link in Tech Regulation – Part 1 of 2

    Mark Zuckerberg was right when he wrote in his op-ed to the Washington Post that the internet needs new rules – though…

  • Dear @Linkedin

    Dear @Linkedin

    I just wanted to say that I love the changes happening on the platform in recent 12 months. Thank you! Here’s my wish…

  • What Will Happen When Machines Start Lying to Us

    What Will Happen When Machines Start Lying to Us

    The mere thought of a computer lying to you about something has boggled my brain ever since I heard it from a friend…

  • Why Privacy Will Remain an Open Issue Unless

    Why Privacy Will Remain an Open Issue Unless

    2018 was a year of awakening to the dear side effects of technological innovation on privacy. The news from Facebook’s…

  • My Ten Cyber Security Predictions for 2019

    My Ten Cyber Security Predictions for 2019

    Well, 2018 is almost over and cyber threats are still here to keep us alert and ready for our continued roller coaster…

社区洞察

其他会员也浏览了