Story image

Beware the blind spot in phishing education

31 Jan 2017

A common blind spot in training corporate staff to identify and avoid cyber attacks is the targeted phishing attack.

Trained employees might diligently ignore links in the standard phishing emails we all receive daily, but what about targeted attacks by spies?

Spies will carefully research the individual, exploit what they can learn about him or her on social media, or about past or current business practices on sites like LinkedIn. The spy will then craft a ‘spearphishing’ email that seeks to recruit the employee without his/her knowledge.

The email may look like it comes from a best friend, talking about the running group they belong to and asking the targeted victim to log into a run tracker site. If the employee trusts the friend would send something like this, and does not understand that email addresses can be spoofed, or how to check, the spy will win.

Poor training can create overconfidence. Apathy toward cyber attacks can also contribute. Many of us won’t believe that we can be compromised until our entire accounts are published online. But does phishing awareness training always work, or can it create over-confident employees?

Phishing awareness training (and proper email hygiene techniques in general) are only as good as the instruction provided. A necessary component of that instruction often overlooked by trainers is the use of real-life phishing examples that caused significant breaches. However, there is an apathy over cyber security and the threat that cyber espionage and terrorism presents.

After the Sony Pictures Entertainment attack that destroyed systems and stole large quantities of personal and commercial data, every executive was placed on notice that a cyber spy could feasibly compromise an email account and not only use credentials to access an employer’s systems, but also place the entire contents of that email online for journalists to pick over.

The initial shock wore off and it wasn’t until John Podesta’s Gmail account was compromised through a simple phishing attack (not even a targeted, spearphishing attack) that the national consciousness was reminded of the importance of good email security practices.

Training also focuses on phishing attacks – those attacks that are broad spectrum and cast a wide net. These are your common email service provider, PayPal, eBay, bank, etc. “reset your password” emails (and others) that use normal business practices to trick an individual into linking to a spoofed website that either steals credentials or loads malware.

Yet the issue of over-confidence is a common one. The culture of how we use and abuse email needs to change. Email has become an impersonal means of communication, overladen with advertisements and suffering from an information deluge, which studies have shown increases stress instead of encouraging efficiency.

The common business person has multiple accounts for multiple email engagements – social, office, entrepreneurship, community, etc. Often, accounts are linked to a large number of places and share a common password. At some point, monitoring these accounts and carefully screening email and social media becomes a tedious chore. Spies are most successful when the target is mired in monotony and complacency.

Article by Eric O’Neill, national security strategist, Carbon Black.

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.