The Evolution of the Cyberattacks. New platforms, new methods
If we are walking down the street and someone approaches us with a supposed winning lottery coupon saying that they cannot. cash it and that they are looking for someone to buy it from them, so they can at least recover some of the prize money, we are likely.

How to Protect Employees from Social Engineering Attacks
If we are walking down the street and someone approaches us with a supposed winning lottery coupon saying that they cannot cash it and are looking for someone to buy it from them, we are likely to doubt the person’s intentions. This scam is just one of many that society has learned to recognize over time.
The same happens with well-known online scams like the Nigerian Scam or fake “millionth visitor” prize pop-ups. Our alarms go off when we see them. However, cyberspace is different: it is dynamic and constantly evolving. New platforms and apps appear every day, and with them, new scams that people are not yet used to spotting.
These attacks are part of Social Engineering techniques — strategies designed to “hack people” by deceiving them to obtain money or sensitive information.
Attacks on WhatsApp usually fall into two categories: message chains and targeted attacks.
- Message chains spread fake offers or giveaways (e.g., supermarket vouchers, free Netflix passes) to as many people as possible, hoping some will click.
- Targeted attacks aim at one person, often trying to steal their WhatsApp account by asking them to forward a verification code “sent by mistake,” sometimes posing as WhatsApp support.
- Intellectual property scam: Fraudsters send emails claiming your account will be closed due to copyright infringement, offering an appeal form that steals your login credentials.
- Fake raffle accounts: Attackers clone legitimate giveaway accounts, then message “winners” with malicious links or data requests.
Even in a professional setting, attackers exploit curiosity. Since 2019, some have posed as researchers from prestigious universities, inviting users to download “exclusive” studies — which are actually infected files.
Key Recommendations to Stay Safe
- Do not share or forward suspicious chain messages.
- Know what data official entities will never ask for.
- Be cautious with executable files — they may contain malware.
- Avoid clicking on provided links; instead, access websites directly via your browser.
- Understand human vulnerabilities — attackers exploit psychological triggers, not just technical flaws.
Kymatio has the technology to identify these vulnerabilities and train each user in a personalized way, helping organizations maintain a high level of alertness against social engineering threats.