Scams v Hacks
We hear a lot about the consequences of cyber-attacks and data breaches but not a lot about the specific threats against SMEs, rather than the generic threats against all businesses. In general businesses are more likely to be targeted by scammers (social engineering attacks) than by purely technical attacks. But why? Attacks against individual SMEs are not going to bring in a lot of profit for the criminal, so they often go after multiple targets all at once. How they do that is to craft an attack which can be automated and directed at many SMEs all at once. The easiest way to do that is via a social engineering attack. Let’s take a look at what we mean by that.
Scams and social engineering attacks rely heavily on human error. Not only do SMEs have weaker defences than their corporate cousins, but they spend little, if anything, on cyber awareness training. The attack that brought down Knights of Old, reducing a once thriving business to bankruptcy in a frighteningly short time, was the result of a weak password being cracked. That suggests that OK, a stronger password protocol and the use of MFA would have been of great benefit but so would educating the users about social engineering and how they can protect the company and their jobs.
Typically, we see:
• Phishing emails that trick employees into giving credentials or downloading malware.
• Business email compromise (BEC) — attackers impersonate executives to request bank transfers or the immediate payment of an invoice.
• Fake invoices or supplier fraud.
It’s done this way simply because it’s easier and cheaper to execute than a technical attack. It’s scalable with scammers sending thousands of phishing emails, and it often bypasses technical defences by exploiting people directly.
In addition to the traditional attacks, we are now facing AI generated attacks, enabling criminals to design scams that are even more scalable and to be produced more quickly. Some examples include:
Deepfake CEO Fraud (AI-Generated Voice or Video)
A finance employee receives a video call from someone who appears to be the CEO instructing them to urgently transfer funds to a supplier. The video and voice are AI-generated deepfakes using real footage and voice samples taken from public online sources. This has happened in the UK causing a UK based firm to lose over £20m in early 2025. Obviously not an SME but the attack was not difficult to generate.
Another AI attack was an upscale of the Business Email Compromise:
Criminals use AI to monitor and mimic email communication styles. They craft perfectly worded emails from a company executive asking the accounting team to update supplier bank details or pay fake invoices. What is new in 2025 is that AI now personalises these scams based on internal speech patterns and tone scraped from Slack or Teams (when credentials are compromised and that list is not exhaustive – other online messaging systems are available).
One scam that we are now seeing more of is the fake job applicant scam targeting HR departments and IT onboarding teams. Scammers apply for remote jobs using fake CVs and AI-generated video interviews. Once hired, they gain access to internal systems and exfiltrate data or install malware. They’re playing the long game here, but it can really pay off.
There are lots of examples and I’ll just put in a couple more:
How many of you use Software as a Service (SaaS) and pay a subscription? In this case a fake renewal notice is sent for services like Microsoft 365, Zoom, or Slack. The email contains a link to a spoofed portal, which steals company admin credentials when they try to “log in.” A new twist in 2025 is that the phishing emails are personalised with real invoice numbers and recent usage data scraped from prior breaches.
Most of you are probably on LinkedIn, even if you are not particularly active on there. We are now seeing more of the LinkedIn Clone Attack. What happens here is that the scammers clone the LinkedIn profile of a known business leader and use it to reach out to employees or partners, proposing urgent collaborations or investment opportunities that include malicious links. In a more advanced tactic, they use AI-generated responses in real-time chats that make these accounts seem very real.
So, in conclusion, whilst we cannot rule out the more technical attack on an SME, we can say that the most likely attack will come via some sort of scam, often nowadays using AI. The defences need to be in depth and will include some technical defences but often the best defence against social engineering is cyber awareness training and this is generally ignored by SMEs.
H2 provides affordable and flexible one-off and ongoing data protection and cyber risk protection services.
To learn more about the services we provide please click here https://www.hah2.co.uk/
Or book a call via our Calendly link
Alternatively, please feel free to give us a call or email
T: 0800 4947478
M: 07702 019060
Trust H2 – Making sure your information is secure