Virtualization Technology News and Information
Article
RSS
Don't Get Hooked: Why Today's Phishing Scams Are Trickier Than We Think

Written by Simon Langton, VP of Professional Services, Avecto 

The General Data Protection Regulation (GDPR) came into effect on May 25th, bringing about a new era of compliance reporting for any company that manages data on EU citizens. Organizations are now required to log a data breach within 72 hours of it occurring, facing serious fines if they fail to comply. And with new high-profile phishing attacks being reported every day, it has never been more critical for enterprises to protect themselves from hackers.

And while the GDPR is bringing about stronger compliance laws, it's also encouraging new tactics from hackers who are taking advantage of the regulation. Earlier this month, hackers attempted to steal personal data by posing as well-known companies and sending fake emails warning about imminent changes to privacy settings. For example, a GDPR-themed scam disguised as an email from Airbnb asked victims to accept new privacy policy based on the regulation before further bookings can be made.

Targeted phishing schemes and malicious URL's continue to plague enterprises and consumers and we can expect more organizations to take advantage of the GDPR by posing as opt-in customer communications. In order to remain secure and compliant, we've outlined some examples of how to spot phishing attacks and prevent them.

Spotting event related phishing attacks

According to a recent report from Wombat Security, 76 percent of information security professionals revealed that their organization experienced phishing attacks in 2017. Modern phishing campaigns are becoming increasingly difficult to spot, especially with an uprise in the class of phishing attacks that are event driven and temporal in nature. Most commonly, they take form in the exploitation of emergencies or natural disasters in which attackers create schemes that look like requests for charitable donations. Just this past summer, hackers used Hurricane Harvey-themed messages to trick people into opening phishing emails and links on social media sites, which resulted malware infections or conning victims out of money.

In an effort to combat this, users should be careful about what they click on. Make sure the charities you are trying to donate to are legitimate and have authentic URL's. Reflect before you click on whether you have donated to the organization before or if it's the first time. If it's their first contact with you, can you think of why they would suddenly be reaching out? If not, it should raise your suspicion and don't click on the link. Examining the URLs within the email is another key way to spot phishing attacks. If the organization has sent emails to you before, check if the addresses match communication you have previously received.

Do a thorough read of the communication before you click as well. Is it a high-quality message or do you find that it reads poorly? Hints that it's coming from a less than reputable source include old logos, the use of several different font types that are inconsistent with the charities current branding.  An example of inconsistent branding was the recent Adidas phishing campaign that offered a "free" $50 per month subscription via all under the promise of free shoes. However, those who looked closely at the phishing email would have spotted a homographic link spoofing the appearance a legitimate Adidas website albeit a vertical line with no dot in place of where the "i" would be. Additionally, the message should typically be free of grammatical errors and also be formatted with a sophisticated HTML code. Producing high-quality communications is hard and legitimate companies have teams of professionals on staff who work hard to ensure communications come off professionally. If you find the communications don't meet these requirements, don't click on them.

It also goes without saying but keeping your software up to date will play a large part in preventing hackers from finding security holes.

Preparation is Everything 

Users are often the weakest link regardless of how good your security is in your organization. That's why it's key to prepare your users with regular training in how to spot cyber-attacks. Training programs should regularly be implemented to show the possible scenarios of violations and the risks to the company. The training should also be frequently assessed to measurement its effectiveness. IT leaders should also implement email phishing assessments to evaluate how well employees have internalized the training. This involves developing an email that has the same look and feel as a legitimate organization email that will be sent out to all employees in the organization. Key metrics should be tracked from this campaign including who opened the email, clicked o the link, entered credentials, or submitted any information through the links. After clicking through, the employee should receive a message indicating they have been ‘phished' and that this is meant as an educational tool.

Another way to stop cyber-attacks is to remove user admin rights through a policy of least privilege. For example, the ransomware attack, known as WannaCry or WannaCrypt0r shut down IT systems in NHS hospitals and GP surgeries in the UK as well as many large global organizations including Telefonica, FedEx and Renault. The attack originated via an extensive email phishing campaign with emails posing as messages from a bank concerning a money transfer. When these emails are opened a payload is dropped to disk causing the victim's data to be encrypted.

A year later after WannaCry first debuted, many organizations still have not learned the lessons and assumed they aren't a target; everyone is a target. It is crucially important to reduce the attack surface on your endpoints rather than relying on detection. Preventing users from making unwanted desktop changes without restricting them from performing their job function continues to be a serious challenge for almost all organizations. Striking a balance between providing users with a degree of control over their desktop configuration and protecting the standard desktop build is difficult, as this control often results in granting admin rights to a user.

From Internet-connected thermostats to cloud services, attackers are seeking more ways to disrupt business operations and charge a ransom. The adoption of Windows 10 is an important move for organizations because there are improved security features and a faster patching. Running the most secure operating system, implementing least privilege and whitelisting applications is a solid security baseline for any organization to build on.

Conclusion

The best defense against all types of phishing attacks is implementing technology that can adapt to various attacks and knowing what to watch for. For businesses worried about their employees putting systems at risk, training and education is essential. Ensuring that appropriate controls and procedures are in place to swiftly detect and respond to attacks is also helpful.

However, it all comes down to human intuition and insight. Scammers may be cunning, but so are you.

##

About the Author

Simon Langton, VP of Professional Services, Avecto

With over 17 years of experience in the technology industry, Simon is responsible for Avecto's professional services and customer teams. Simon sets the strategy for the way in which Avecto helps its customers implement and maintain its unique Defendpoint security software. Prior to his role at Avecto, Simon was Head of Innovation and Technology at Intrinsic Enablers of Business Agility and Business Operations Manager at AppSense.
Published Tuesday, July 17, 2018 7:35 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<July 2018>
SuMoTuWeThFrSa
24252627282930
1234567
891011121314
15161718192021
22232425262728
2930311234