Oct 15, 2025 • ESET WeLiveSecurity
IT service desks: The security blind spot that may put your business at risk
IT service desks represent a growing security blind spot that threat actors increasingly exploit to bypass organizational security controls. By impersonating...
Executive Summary
IT service desks represent a growing security blind spot that threat actors increasingly exploit to bypass organizational security controls. By impersonating legitimate employees or end-users, attackers can manipulate helpdesk personnel into performing actions such as resetting credentials, granting elevated access, or disabling security features. This social engineering vector circumvents traditional security measures by exploiting trust placed in the service desk function. Organizations should implement strict verification procedures for service desk requests, including multi-channel authentication and enhanced staff training on social engineering tactics. Regular security awareness and red team exercises focused on service desk scenarios can help identify and remediate these vulnerabilities before they are exploited.
Summary
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.
Published Analysis
IT service desks represent a growing security blind spot that threat actors increasingly exploit to bypass organizational security controls. By impersonating legitimate employees or end-users, attackers can manipulate helpdesk personnel into performing actions such as resetting credentials, granting elevated access, or disabling security features. This social engineering vector circumvents traditional security measures by exploiting trust placed in the service desk function. Organizations should implement strict verification procedures for service desk requests, including multi-channel authentication and enhanced staff training on social engineering tactics. Regular security awareness and red team exercises focused on service desk scenarios can help identify and remediate these vulnerabilities before they are exploited. Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap. Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.