DISCARDED: Tales From the Threat Research Trenches

The Art of the Innocent Ask: How Threat Actors Use Benign Conversations


Listen Later

Send us fan mail!

Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. 

These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation.

What exactly is a benign conversation—and why is it anything but harmless? Whether it’s a simple “Do you have a minute?” or a seemingly legit job offer, these messages are often the opening moves in complex social engineering attacks used for fraud, malware delivery, and even nation-state espionage.

The team dives into:

  • The top five fraud-related benign conversation themes, including the rise of advanced fee fraud


  • Real-world examples of job scams, gift card requests, and a Taylor Swift-themed lure


  • The difference between financially motivated lures and espionage-style social engineering


  • How Iranian and North Korean threat actors are perfecting the art of trust-building through impersonation and tailored messages


  • TOAD scams (Telephone-Oriented Attack Delivery) and the power of fear and urgency


  • The critical role of spoofing in making these attacks believable


  • The human toll and psychological manipulation behind scams like pig butchering—and why acknowledging the abuse behind them matters


From hijacked contact forms and fake antivirus invoices to AI-generated phone calls and scam compounds, this episode blends serious security insight with Friday vibes and candid discussion. 

Whether you're a seasoned threat analyst or just here for the “lure-palooza,” you’ll walk away with a sharper eye for red flags—and a deeper understanding of the evolving cyber threat landscape.



 

Resources Mentioned:

🔍 [Read the full report] https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering



 For more information about Proofpoint, check out our website.

 


Subscribe & Follow:

Stay ahead of emerging threats, and subscribe! Happy hunting!


...more
View all episodesView all episodes
Download on the App Store

DISCARDED: Tales From the Threat Research TrenchesBy Proofpoint

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

55 ratings


More shows like DISCARDED: Tales From the Threat Research Trenches

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,983 Listeners

Risky Business by Patrick Gray

Risky Business

365 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

636 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

366 Listeners

Hacked by Hacked

Hacked

183 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,009 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

312 Listeners

Click Here by Recorded Future News

Click Here

415 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,913 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

43 Listeners