Thursday, June 5, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network Social Engineering 

Home » Cybersecurity » Social Engineering » COVID-19 and Amygdala Hijacking in Cyber Security Scams

SBN

COVID-19 and Amygdala Hijacking in Cyber Security Scams

by SEORG on April 9, 2020

What races through your mind when you see “Coronavirus” or “COVID-19”? Fear, anxiety, curiosity… these internal reactions can prompt actions that we may not normally take. Recent attacks have been sending out mandatory meeting invites that ask you to log in to accounts. Others have been receiving emails to put themselves on a waiting list for a vaccine or treatment. The heightened emotions we experience when we see emails, or messages like this, may prompt us to give personal information out more willingly than we usually would. Security awareness takes a back seat as emotion takes over. It’s known as amygdala hijacking. Why does this happen to us?

COVID-19 and Amygdala Hijacking in Cyber Security Scams

Amygdala Hijacking in Cyber Security Scams

The amygdala is a small part of the brain that is largely responsible for generating emotional responses. An amygdala hijack is when something generates an overwhelming and immediate emotional response.

Techstrong Gang Youtube
AWS Hub

Many common cyber security scams use amygdala hijacking to their benefit. We see this used often in phishing, vishing, SMShing, and impersonation attacks. Chris Hadnagy of Social-Engineer, LLC did a case study on amygdala hijacking in social engineering.

Phishing

Chris sent out 1,000 phishing emails that offered client employees the chance to enter a raffle to win 1 of 10 free iPhones. All they had to do was click on a link and enter the username and password to their computer. Seventy-five percent (750) of the employees clicked the link and entered their domain credentials.

This might seem shocking to those of us reading it. The phishing email itself seemed somewhat obvious. Entering domain credentials in this situation doesn’t seem logical. Why did so many people click? The answer can be traced back to the amygdala. When the employees saw this email with the offer of something free, they became excited. Their emotional response overrode their logic centers, and they clicked.

Vishing

Out of these 750 names, Chris took 25 and called them. He claimed to be tech support for their company and informed them their computer was now laden with malware due to a phishing email that had just been clicked. To fix this he said he would need to direct them to a website where they can download a .exe and install it. He said this was a cleaning tool that would clean up the malware. It was actually a program that allowed Chris to access their desktop remotely. Amazingly, 24 of 25 of the employees downloaded and ran this program!

The emotion used to prompt the desired response this time was anxiety. The employee was nervous that their system had been compromised and was willing to implement the solution when one was offered. These two tests were extremely successful. Imagine if Chris had been a malicious hacker, rather than a hired security professional. He would now have access to 24 computers within this company. The risk and effort put in on his side was low, especially when compared to the payoff.

Amygdala Hijacking During a Pandemic

Keep this study in mind and think about our current world situation. Many feel anxious about loved ones, their health, and economic stability. This setting lends itself to scams that leverage amygdala hijacking. I am sure you can think of a time in the past when scammers used tragedy to their advantage.

News outlets all around are issuing warnings of COVID-19 scams that are circulating. Knowing the tactics is the start of preparing yourself to avoid these scams. We can protect ourselves if we just stop and think. If you feel yourself reacting emotionally to an email or a phone call, just give your brain a moment. By pausing, you will allow your logic functions to start working again and be able to make a more informed decision.

Ask Yourself

If you are not sure if the email is a phishing email or a legitimate one, there are a few things you can ask yourself to help your assessment: Who, what, when, where, and why?

  • Who – Who sent this email? Is it from someone you know and trust? Is it from a service you use? If so, is the email address theirs?
  • What – What is the topic of the email? If it is from someone you know, does it sound like them? If it’s from a service provider, is the grammar correct and the explanation clear?
  • When – When was the email sent? Is it amid a global crisis? Or, early in the morning when you’re still sleepy? Make sure you aren’t clicking because of your current emotional or physical state.
  • Where – Where is this link sending me? Roll over the link to see if it looks legit. If you are unsure, the best action is to go directly to the company’s site. For example, if this is a request for your password reset, simply reset it through their website rather than through the email.
  • Why – Why do I want to click this link? Is there something in the wording that is making me feel a strong emotion? If so, look closely at the link before clicking.

Answering these questions may not give you a definitive answer as to if the suspected email is legitimate or not, but it will give you a better idea. When in doubt, trust your gut if something feels off.

Applying Your Knowledge

Now that you are familiar with amygdala hijacking and how it can be used against you; you are prepared to defend against it. Whether it’s COVID-19 or in any situation, when you receive an email, phone call, or text… just remember to pause and ask yourself, “who, what, when, where, and why?”. These simple questions can help you remain aware of not only your own emotional responses, but what the sender is requesting as well. Being aware keeps the control in your hands.

Sources:
https://news.yahoo.com/coronavirus-cybercriminals-phishing-cyber-181153504.html
https://www.healthline.com/health/stress/amygdala-hijack#overview
https://www.social-engineer.org/framework/attack-vectors/phishing-attacks-2/
https://www.social-engineer.org/framework/attack-vectors/vishing/
https://www.social-engineer.org/framework/attack-vectors/impersonation/
https://www.social-engineer.org/framework/attack-vectors/smishing/
https://www.social-engineer.com/about/
https://www.youtube.com/watch?v=9e6k_PtEXdM
https://www.social-engineer.com/natural-disasters-social-engineer/
https://www.social-engineer.com/free-yourself-from-fud/
https://www.secfedbank.com/sites/default/files/Five%20Examples%20of%20Social%20Engineering.pdf

Image:
http://www.gcs.k12.al.us/coronavirus-covid19/

The post COVID-19 and Amygdala Hijacking in Cyber Security Scams appeared first on Security Through Education.


Recent Articles By Author
  • DEF CON 29: SEVillage Recap
  • In the Name of Psychology
  • DEF CON® Kids: Preparing Them for the Future
More from SEORG

*** This is a Security Bloggers Network syndicated blog from Security Through Education authored by SEORG. Read the original post at: https://www.social-engineer.org/social-engineering/covid-19-and-amygdala-hijacking-in-cyber-security-scams/

April 9, 2020April 9, 2020 SEORG Chris Hadnagy, COVID-19 and Amygdala Hijacking in Cyber Security Scams, General Social Engineer Blog, impersonation, Phishing, smishing, social engineering, vishing
  • ← SANS Internet Storm Center Covid19 Domain Classifier, The Video
  • Video: Deepfakes – A Technical Peek Behind the Curtain →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Cloud Field Day

Upcoming Webinars

How to Spot and Stop Security Risks From Unmanaged AI Tools
Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Sysdig Reveals Discovery of Cyberattack Aimed at Tool to Build AI Apps
Survey: Changing Threat Landscape Drives Cybersecurity Spending Shifts
Survey Surfaces Rise on Cyberattacks Fueled by AI
U.S., Dutch Agencies Shut Down AVCheck Services Used by Threat Groups
Microsoft Open Sources GitHub Copilot: A New Era for AI Coding
Multiple High-Risk Vulnerabilities in Microsoft Products
BSidesLV24 – Keynotes: Closing Ceremony
Scalable Strategies for Managing Cloud Machine Identities
Critical Linux Vulnerabilities Risk Password Hash Theft Worldwide

Industry Spotlight

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities 

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

June 4, 2025 Richi Jennings | Yesterday 0
USDA Worker, 5 Others Charged in Food Stamp Fraud Operation
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access Industry Spotlight News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

USDA Worker, 5 Others Charged in Food Stamp Fraud Operation

May 30, 2025 Jeffrey Burt | May 30 0
Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers
Cloud Security Cybersecurity Data Security Featured Incident Response Industry Spotlight Malware Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Victoria’s Secret Hit By ‘Security Incident’ After Attacks on UK Retailers

May 29, 2025 Jeffrey Burt | May 29 0

Top Stories

Microsoft Launches Free Security Program for European Governments
Cloud Security Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Incident Response Malware Mobile Security Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft Launches Free Security Program for European Governments

June 4, 2025 Jeffrey Burt | Yesterday 0
Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities
Cloud Security Cybersecurity Data Security Featured Identity & Access Incident Response Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 

Microsoft, CrowdStrike Partner to Bring Clarity to Threat Actor Identities

June 3, 2025 Jeffrey Burt | 1 day ago 0
Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks
Cybersecurity Data Privacy Data Security Endpoint Featured Identity & Access Mobile Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threat Intelligence 

Qualcomm Fixes Three Adreno GPU Flaws Abused in Android Attacks

June 2, 2025 Jeffrey Burt | 2 days ago 0

Security Humor

Facebook CEO Mark Zuckerberg announces the plan to make Facebook more private at Facebook’s Developer Conference on April 30, 2019

Meta’s Secret Spyware: ‘Local Mess’ Hack Tracks You Across the Web

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×