Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The death of social media is the renaissance of RSS (2025)

    How the Sriracha guys screwed over their supplier

    NVIDIA reportedly turning to Samsung to revive the RTX 3060

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Could this be the key to eternal storage? Experts claim new DNA HDD can be ‘erased and overwritten repeatedly’

      March 9, 2026

      Need more storage? Get a lifetime of 10TB cloud space for just $270.

      March 8, 2026

      Google PM open-sources Always On Memory Agent, ditching vector databases for LLM-driven persistent memory

      March 8, 2026

      Regulate AWS and Microsoft, says UK cloud provider survey

      March 8, 2026

      Google releases Gemini 3.1 Flash Lite at 1/8th the cost of Pro

      March 4, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      The death of social media is the renaissance of RSS (2025)

      March 9, 2026

      How the Sriracha guys screwed over their supplier

      March 9, 2026

      NVIDIA reportedly turning to Samsung to revive the RTX 3060

      March 9, 2026

      Today’s NYT Connections: Sports Edition Hints and Answers for March 9, #532

      March 9, 2026

      Today’s NYT Mini Crossword Answers for Monday, March 9

      March 9, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Service desks are under attack: What can you do about it?
    Technology

    Service desks are under attack: What can you do about it?

    TechAiVerseBy TechAiVerseMay 20, 2025No Comments5 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Service desks are under attack: What can you do about it?
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Service desks are under attack: What can you do about it?

    Service desk agents are here to help, and we all prefer to talk to an understanding person than a chatbot when wrestling with an IT problem.

    Unfortunately, it’s this human element that cybercriminals also seek to exploit when targeting service desks. They’ll use social engineering to sweet-talk your service desk agents into divulging credentials, resetting passwords, or approving back-door access.

    We’ll walk through how they do it and advise how to reinforce this weak link in the security chain – without losing the human touch.

    Recent attacks on service desks

    Service desk security has been in the news thanks to several large British retailers being recently struck by DragonForce ransomware.

    Initial access in these cases was gained through social engineering at the service desk – allegedly by the US & UK based cybercrime group, Scattered Spider.

    • Marks & Spencer (April–May 2025): Attackers duped M&S’s IT help desk into resetting passwords, gaining access to systems and exfiltrating personal customer data. The breach knocked out online ordering and click-and-collect services for over three weeks.
    • Co-Op Group (May, 2025): In a virtually identical playbook, adversaries persuaded Co-Op’s service desk staff to grant system-level access, resulting in stolen customer contact details, staff credentials, and stock shortages across its 2,300 stores.
    • Harrods (May, 2025): The luxury retailer was the third UK brand in under two weeks to face a cyber onslaught. Harrods detected and contained unauthorized access attempts (believed to also be tied to Scattered Spider) before any data was compromised.
    • Dior (May 2025): The luxury fashion house confirmed a data breach discovered on May 7, 2025, where an unauthorized external party accessed customer data, including contact information and purchase histories. No financial information was compromised. Dior has engaged cybersecurity experts and is notifying affected customers and regulatory authorities as required.
    • MGM Resorts (September, 2023): Back in 2023, Scattered Spider placed a vishing call to MGM Resort’s IT help desk. They tricked staff into disabling a senior manager’s 2FA, and unleashed a ransomware campaign that crippled networks, ATMs, slot machines and digital key systems across its Las Vegas casinos.

    Why do hackers target service desks?

    To put it simply, it’s quicker and easier to manipulate a person than to carry out a more technical intrusion.

    Service desk teams are trained to solve problems quickly and get people working again. Attackers will masquerade as panicked executives or trusted vendors, then try to exploit social norms like helpfulness, deference to authority, and aversion to conflict.

    They’ll weaponize empathy, urgency, and trust to trick staff into rushing or circumventing process. Once they’ve gained that initial foothold, they can advance to privilege escalation or deploying ransomware.

    How do social engineering attacks play out?

    1. Reconnaissance: Some attackers target service desks indiscriminately, while others spend hours scouring public sources to gain an advantage (LinkedIn profiles, company press releases, org charts and social media).
    2. Crafting pretext: Armed with genuine details (e.g. office locations, recent company initiatives), the attacker crafts a scenario about being locked out and needing their password or MFA resetting.
    3. The call:  They make the call, perhaps at a deliberately busy time. Scattered Spider have been known to have success with UK and US companies due to being native English speakers. Some hackers are even turning to AI vishing, where they can impersonate the voice of a real person within an organization.
    4. Building urgency & trust: This is where the attacker tries to put pressure on the service desk agent. They might name-drop an important client or senior executive at the company, or quote a project the agent is aware of to build trust. Then there’ll be a fake business-critical reason for why they need access immediately.
    5. Bypassing MFA: When the agent asks for the MFA push confirmation, the attacker claims they never received it. Or they might make an excuse, like the phone they need is lost or broken. They then request an MFA reset, offering “managerial approval” and citing company policy for emergency access. The agent, eager to help and fearing a delay in executive work, agrees.
    6. Credential reset & token swap: The service desk agent follows procedure, disables the existing MFA device, and sets a temporary one. The attacker immediately receives the new push, approves it in real time, and confirms successful login.
    7. Initial foothold: With valid credentials and an active session, the attacker now has their access route into the organization’s environment.

    Enforce verification or invite breaches

    Training and phishing simulations can help the team stay sharp and spot procedural drift. You can also enforce least privilege by locking down what agents can do by default (e.g. require manager sign-off for high-risk actions, segment ticket systems from core identity stores, and log every step).

    But to support you agents in every interaction, giving them the tools to enforce verification is the best bet.

    Without a rigorous identity check, your service desk becomes a route for attackers to exploit human trust. Mandating verification introduces an important layer of friction that thwarts even the most convincing pretexts.

    Specops Secure Service Desk integrates multi-factor verification, real-time risk scoring, and customizable challenge flows – so your team can enforce identity with confidence and block social engineering at the door.

    By embedding these checks into every password reset, privilege escalation, or remote-session request, you dramatically shrink the human-attack surface. Want to see how Secure Service Desk could fit in with your environment?

    Book a live demo.

    Sponsored and written by Specops Software.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleOpenAI plans to combine multiple models into GPT-5
    Next Article RVTools hit in supply chain attack to deliver Bumblebee malware
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The death of social media is the renaissance of RSS (2025)

    March 9, 2026

    How the Sriracha guys screwed over their supplier

    March 9, 2026

    NVIDIA reportedly turning to Samsung to revive the RTX 3060

    March 9, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025707 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025297 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025166 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025128 Views
    Don't Miss
    Technology March 9, 2026

    The death of social media is the renaissance of RSS (2025)

    The death of social media is the renaissance of RSS (2025) The Flood of Artificial…

    How the Sriracha guys screwed over their supplier

    NVIDIA reportedly turning to Samsung to revive the RTX 3060

    Today’s NYT Connections: Sports Edition Hints and Answers for March 9, #532

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The death of social media is the renaissance of RSS (2025)

    March 9, 20262 Views

    How the Sriracha guys screwed over their supplier

    March 9, 20262 Views

    NVIDIA reportedly turning to Samsung to revive the RTX 3060

    March 9, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.