{"id":111942,"date":"2020-05-28T07:45:54","date_gmt":"2020-05-28T14:45:54","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=111942"},"modified":"2020-05-28T07:40:47","modified_gmt":"2020-05-28T14:40:47","slug":"network-email-gateways","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/05\/network-email-gateways\/","title":{"rendered":"Email Gateways Stop Phishing Attacks: Reality or Myth?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">About a year ago when I was consulting with a data science company, I received an email from the company CISO asking me to urgently send him several Amazon gift cards so he could distribute them to customers at a conference. This was a common practice and my first instinct was to jump to action. I had worked with the CISO in various capacities, but It was perplexing that he would ask me for this errand and not someone on his team. So I tried to send him a message on Slack and found his Slack account blocked. After contacting IT Security, it became clear that (ironically) the CISO\u2019s email had been compromised and I was the target of a phishing scam.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email compromise combined with impersonation is a tactic used by phishing threats \u2013 though not as common as some other methods. Financial scams, brand impersonation and blackmail are some of the other tactics used in phishing.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">The Move to Remote Work Presents New Opportunities<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Last year, <\/span><a href=\"https:\/\/www.csoonline.com\/article\/3153707\/top-cybersecurity-facts-figures-and-statistics.html\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">according to CSO Online<\/span><\/a><span style=\"font-weight: 400;\">, 94% of malware was delivered through email, and phishing scams accounted for more than 80% of reported cybersecurity attacks. Sadly, <\/span><span style=\"font-weight: 400;\">with the advent of the pandemic, <a href=\"https:\/\/unit42.paloaltonetworks.com\/covid19-cyber-threats\/\">the opportunities for these malicious attacks<\/a> are growing<\/span><span style=\"font-weight: 400;\">, and it\u2019s likely this trend will continue. A recent <\/span><a href=\"https:\/\/news.gallup.com\/poll\/306695\/workers-discovering-affinity-remote-work.aspx\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Gallup study<\/span><\/a><span style=\"font-weight: 400;\"> shows that 62% of U.S. workers surveyed have worked remotely during the COVID-19 crisis.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, the same study reports that three out of five people working remotely prefer to continue to do so even after the pandemic-related restrictions are lifted. Many organizations are considering offering flexible work arrangements on a more permanent basis.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals have clearly tapped into this new opportunity. COVID-19 phishing and spear phishing attacks have been multiplying exponentially since February of this year, with a huge spike starting at the beginning of March.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">How About Email Gateways?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Most enterprises use email gateways to protect against phishing emails sent to their email server. Email gateways can be deployed as a cloud service, an on-premises appliance or bundled in with the email service. Some security gateways even offer data loss prevention capabilities that stop malicious or inadvertent insider leakage of critical information. In fact, email gateways are able to reduce the number of compromises of users through emails, but as we all know, reducing the number of attacks is not good enough.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As it happens, we are faced with adversaries who are very innovative (in a destructive way). These attackers are constantly finding new ways to bypass email gateways, and email vendors can not react fast enough to stop them. For example, a recent whitepaper, \u201c<\/span><a href=\"https:\/\/start.paloaltonetworks.com\/5-major-security-threats.html?utm_source=paloaltonetworks&amp;utm_medium=blog&amp;utm_campaign=phishing-blog\"><span style=\"font-weight: 400;\">Five Major Security Threats<\/span><\/a><span style=\"font-weight: 400;\">,\u201d shares details of a phishing approach that seeks to avoid detection by embedding malicious links within PDF files rather than within the email itself, where some email gateways can spot and quarantine them. When users open the PDF and click on a malicious link in it, they\u2019ll be directed to a fraudulent webpage that looks exactly like a real page the users might expect to see.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To make matters more complicated, email gateways have no control over many of the attack vectors used for phishing. These include personal email accounts running on company devices, social media and messaging apps \u2013 all of which are prone to phishing attacks. Clearly, as necessary as email gateways are, they are not enough to protect you against email-related attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">So How Do You Stop Phishing Attacks?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Employee security awareness and education is the first line of defense and an important part of protecting your organization against phishing attacks. But with busy and sometimes distracted employees multi-tasking and often running personal email and social media on their company devices, you need more than educated employees. Manual detection and response to phishing emails is complex, time consuming and error prone. To eliminate phishing threats effectively, you need the right security tools deployed across your environment. Here are a few recommendations to strengthen and layer your defenses:<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">URL Filtering\u00a0<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">URL filtering automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based (C2) attacks, malicious sites <\/span><span style=\"font-weight: 400;\">and pages that carry exploit kits. URL Filtering stops phishing using multiple techniques:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">1) Known phishing sites are automatically blocked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">2) New, unknown phishing sites are detected and blocked instantly with machine learning in-line.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">3) In-process credential theft protection prevents users from mistakenly submitting their corporate credentials into unauthorized sites.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">4) Image recognition capabilities stop evasive phishing attempts that hide behind image files and JavaScript.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">DNS Security<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">As soon as a user clicks on a link in a phishing email, a DNS request is generated. It\u2019s impossible to keep up with the high volume of malicious domains constantly being generated, let alone advanced tactics like DNS tunneling. But a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/04\/network-dns-security\/\"><span style=\"font-weight: 400;\">DNS Security service with machine learning<\/span><\/a><span style=\"font-weight: 400;\"> can identify new malicious domains and quickly detect C2 or data theft hidden in DNS tunneling. DNS Security algorithms use historical and realtime shared threat intelligence to accurately detect tunneling behavior. Implemented at the network level, DNS Security cannot be bypassed and requires no ongoing maintenance like other DNS resolvers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">SOAR Platform<\/span><\/h4>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/02\/cortex-xsoar\/\"><span style=\"font-weight: 400;\">Security orchestration, automation, and response (SOAR) platforms<\/span><\/a><span style=\"font-weight: 400;\"> use \u201cphishing playbooks\u201d that execute repeatable tasks at machine speed, identify false positives and prime the security operations center (SOC) for standardized phishing response at scale. These playbooks codify processes across security products and teams while automating high-quantity actions that can waste time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A layered defense including Next-Generation Firewalls will create a strong fortress to secure your environment and give you the tools you need to detect and remediate any possible threats. The best part is that <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/security-subscriptions\"><span style=\"font-weight: 400;\">subscriptions<\/span><\/a><span style=\"font-weight: 400;\"> such as the ones described above can be deployed quickly with a Next-Generation Firewall and benefit from shared intelligence at cloud scale, so that your remote workers are fully protected and don\u2019t fall bait to phishing threats in this era of increased cyber attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more, read <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/5-major-security-threats.html?utm_source=paloaltonetworks&amp;utm_medium=blog&amp;utm_campaign=phishing-blog\"><span style=\"font-weight: 400;\">Five Major Security Threats and How to Stop Them<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">This blog is part of a series, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/reality-or-myth\/\">Reality or Myth<\/a>,\u201d that covers common security threats and suggests best practices for mitigating them. <\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As necessary as email gateways are, they are not enough to protect against email-related attacks including phishing.<\/p>\n","protected":false},"author":663,"featured_media":111943,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[208,7130],"coauthors":[7108],"class_list":["post-111942","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-phishing","tag-reality-or-myth"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/05\/Orange-fishhook.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=111942"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111942\/revisions"}],"predecessor-version":[{"id":111961,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/111942\/revisions\/111961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/111943"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=111942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=111942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=111942"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=111942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}