Skip to main content

What Executive Cyber Security Programs Must Include In 2025

What Executive Cyber Security Programs Must Include In 2025

DeleteMe

March 31, 2023

Reading time: 9 minutes

executive cybersecurity protection

If we were to give one piece of advice to organizations looking to strengthen their executive cyber security in 2025, it is to focus on personalized threats. 

Lately, we’ve seen giant leaps in threat actor capabilities, including:

But all of these attacks have one (very low-tech) input in common: executives’ professional and personal information. 

Taking executive information offline reduces criminals’ ability to target executives (and other employees within your organization) with even the most sophisticated attacks. 

6 Executive Cybersecurity Risks Fuelled By Executives’ Personal Data 

Criminals use executives’ professional and personal data to carry out the following attacks. 

Executive phishing

Executive phishing attacks are highly personalized to the target, i.e., the executive. This makes these kinds of phishing scams very difficult to spot. 

Like most social engineering attacks, executive phishing typically involves four steps:

  1. Information gathering
  2. Relationship development
  3. Exploitation
  4. Execution. 

The information-gathering step is probably one of the most important. 

Here, hackers determine who to attack, who their target is likely to share information with, and under what pretext. 

We know from leaked criminal chat transcripts that attackers use open-source intelligence tools like data brokers to find targets and individuals to “name drop” within their social engineering campaigns to make them look more legitimate and more likely to succeed.

We also know that AI is making executive phishing faster and easier. 

Financial Times headline: "AI-generated phishing scams target corporate executives"

Harvard researchers found that AI models can gather accurate and useful data on people in 88% of cases. 

AI can also help create convincing executive phishing messages. Those same Harvard researchers saw AI-generated phishing emails get a 54% click-through rate – the same as emails crafted by humans and much, much higher than arbitrary phishing emails (12% click-through rate). 

Personal information needed for executive phishing: Varied, including contact details, education and employment history, company org chart, family member details, and more.

CEO fraud

In CEO fraud attacks, threat actors pretend to be senior executives or board members to other business leaders, VIPS, or employees. 

Cybercriminals’ goal in CEO fraud is usually to get the recipient to make an unauthorized financial transfer. Sometimes, they’ll attempt to con the recipient into disclosing sensitive data or downloading malicious files instead. 

CEO fraud happens like any other social engineering attack, with the likelihood of success depending heavily on the reconnaissance stage.

However, unlike spear phishing attacks, where criminals can impersonate professional and personal contacts, CEO fraud emails tend to come from C-suite executives, like the CEO or CISO.

That’s why, in these attacks, threat actors need to understand the org chart of their target company. This is easier than you might think, thanks to B2B data brokers (more on them below) that provide this information to anyone looking for it. 

Data broker professional profiles include org charts

Information needed for CEO fraud: Varied, but success hinges on finding up-to-date business org charts. 

Account takeover

Account takeover is an attack where threat actors take ownership of executive online accounts. 

Rather than relying solely on data breaches, cybercriminals also use personal information available on the internet to guess passwords, especially for high-value and high-profile targets like corporate executives. 

Targeting people like this is time-consuming but often pays off.

The reason why is that many people use personal information, like a family member’s name or the city they were born in, for their credentials. 

For example:

Personal information needed for executive account takeover: As varied as possible, including family member names, addresses, etc. 

SIM swap attacks

And more recently, SIM swapping executives’ kids to pressure the executives into paying ransoms. 

The Register headline: "Ransomware crooks now SIM swap executives' kids to pressure their parents"

Cybersecurity researchers noted cases where criminals SIM-swapped the phones of executives’ children, then called the executives from the kids’ phone numbers to intimidate them. 

As Charles Carmakal, CTO of the cybersecurity company and subsidiary of Google, said during a Google Security Threat Intelligence Panel at the 2024 RSA Conference: 

“Think about the psychological dilemma that the executive goes through – seeing a phone call from the children, picking up the phone and hearing that it’s somebody else’s voice? Sometimes, it’s caller ID spoofing. Other times, we see demonstrated SIM swapping family members.” 

Personal information needed for SIM swap attacks: Varied, but includes executives and their children’s phone numbers. 

Deepfake scams

If it sounds like your boss and looks like your boss, then it must be them, right? With deepfake scams on the rise, that’s no longer the case. 

Deepfake scams are when criminals collect audio and visual samples (e.g., executive voice recordings or footage of their faces) of people known to their targets and feed this data into AI models. 

They end up with phony audio or video that mimics a person’s likeness or speech patterns known to their victim.

LastPass recently experienced a deepfake scam that tried to impersonate the company’s CEO. 

The attackers used WhatsApp calls, texts, and voice messages (all generated by AI) to create a sense of urgency and push the targeted employee into action. 

WhatsApp deepfake executive scam example

Luckily, the employee noticed the unusual communication channel and other signs of social engineering (e.g., the fake urgency) and alerted LastPass’s internal security team. 

The number of companies (and executives) who have been targeted with deepfake scams is seriously concerning. 

Personal information needed for deepfake scams: Contact details, company org chart, and audio or video clips of the individual to be impersonated. 

Fake ransom letters sent to executives’ homes

Criminals never stop innovating. 

A new scam is targeting U.S. executives by sending ransom letters to their home and business addresses, falsely claiming to be from a particular ransomware group. 

Because there’s no evidence of data exfiltration or any standard ransom negotiation channel, these letters are believed to rely purely on fear rather than any actual compromise of company systems.

Similarly, in the past, there have been reports of ransomware groups approaching employees, including executives, directly to assist in planning ransomware attacks

Personal information needed for ransomware-related attacks: Business and home addresses, company org chart. 

Scrubbing Executives’ Personal Data from Common Information Exposure Sources

It’s not hard for criminals to find executives’ professional and personal information. 

From social media profiles such as LinkedIn to corporate websites and press releases, attackers have a ton of resources for gathering intelligence on their targets. 

One of their favorites has to be data brokers and people search sites. 

Data brokers and people search sites are companies that collate people’s personal information into a single place. Their customers are mostly marketers who want to better tailor their ads. However, there is little to prevent cybercriminals from accessing personal information on data brokers as well. 

Data broker profiles pose a threat to executive cybersecurity because they: 

  • Are easy to find with a quick Google search and are among the first few results shown. 
  • Include a lot of personal information, like names, phone numbers, email addresses, employment history, and more. The data available on these profiles is only getting more detailed and is being pulled from sources as varied as public records, social media accounts, breached datasets from the dark web, and more. 
  • Are cheap or even completely free to access. 

Removing executive information from data broker sources is an important part of executive protection. It is also a simple step organizations can take to minimize the risk that their executives will fall victim to a cyber attack. 

Status Quo Executive Cybersecurity is Not Good Enough in 2025

Executive security protection typically consists of two layers:

  • Executive security training. 
  • Technical controls like antivirus solutions. 

The first of these is very failure-prone. Busy executives don’t always have the time to attend security awareness training sessions. 

And even when they do, research shows that security training is quickly forgotten unless it happens continuously. According to the nonprofit USENIX, six months after a phishing training session, individuals show no marked improvement in being able to distinguish between a legitimate and a phishing email. 

The second layer – technical controls – is meant to catch and remediate cyber risks like malware. They can’t be relied on, either. Often, the threat isn’t a malicious attachment or executable; it’s the contents of an email or voice note and the actions that happen as a result. 

Phishing emails that don’t contain malicious links or files can circumvent email security filters; “multi-factor authentication fatigue attacks,” where cybercriminals flood a target’s app with push notifications, can trick executives into authenticating fraudulent login attempts; threats use obfuscation techniques to bypass antivirus and endpoint protection services and tools. 

Digital risk protection for executives requires another layer of defense – information removal.

Executive Cyber Security Protection with Data Broker Removal

Data brokers are an important reconnaissance tool for threat actors and one of the reasons why personalized attacks have become so frequent. 

Monitoring for and removing executive personal information from data exposure sources won’t completely isolate business leaders from cyber threats. However, doing so will make it harder for cybercriminals to conduct open-source intelligence and will reduce the number of opportunities for exploitation. 

SHARE THIS ARTICLE
DeleteMe was created in 2010 when we realized the difficulty of navigating privacy issues in today’s interconnected and digital world. Our mission is to provide everyone with the power to control the…
DeleteMe was created in 2010 when we realized the difficulty of navigating privacy issues in today’s interconnected and digital world. Our mission is to provide everyone with the power to control the…
How does DeleteMe privacy protection work?
  1. Employees, Executives, and Board Members complete a quick signup
  2. DeleteMe scans for exposed personal information
    Opt-out and removal requests begin
  3. Initial privacy report shared and ongoing reporting initiated
  4. DeleteMe provides continuous privacy protection and service all year
Your employees’ personal data is on the web for the taking.

DeleteMe is built for organizations that want to decrease their risk from vulnerabilities ranging from executive threats to cybersecurity risks.

Want more privacy
news?

Join Incognito, our monthly newsletter from DeleteMe that keeps you posted on all things privacy and security.

Is employee personal data creating risk for your business?

DeleteMe provides business solutions for the enterprise, public orgs and public interest groups.

Is employee personal data creating risk for your business?

DeleteMe provides business solutions for the enterprise, public orgs and public interest groups.

Related Posts

10 Ways to Reboot Your Privacy at Work

When personal data is out there on the open web it can lead to privacy and security incidents at work that open you—and your company—up to risk. For…
DeleteMe
October 3, 2022

2022 Cybersecurity Excellence Award: Our Journey & Future

We are excited to announce that DeleteMe was recognized (twice!) with 2022 Cybersecurity Excellence Awards, an annual competition honoring indiv…
DeleteMe
February 10, 2022

The Time is Now to Limit Russian Hacker Access to Publicly Available PII

Although the launch of ContiLeaks and the information revealed there didn’t slow the Russian Hacker gang down, it did provide everyone here at…
Will Simonds
March 10, 2022