{"id":7077,"date":"2014-10-23T05:00:43","date_gmt":"2014-10-23T12:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7077"},"modified":"2016-12-09T11:13:20","modified_gmt":"2016-12-09T19:13:20","slug":"knowledge-power-using-cyber-scrutiny-defend-phishing-attacks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/10\/knowledge-power-using-cyber-scrutiny-defend-phishing-attacks\/","title":{"rendered":"Knowledge Is Power: Using Cyber Scrutiny To Defend Against Phishing Attacks"},"content":{"rendered":"<p>If you purchased an iPhone 6 recently, you probably received this email:<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:76.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7078 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email-500x383.png\" alt=\"apple email\" width=\"500\" height=\"383\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email-500x383.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email-230x176.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email-391x300.png 391w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email-52x40.png 52w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/apple-email.png 988w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Some of you may have even clicked the \u201cVerify Now\u201d link and entered your Apple ID account information. I hope not, though, because this email is <em>not<\/em> from Apple. It\u2019s a phishing email meant to trick recipients into giving sensitive information to the attacker who sent it.<\/p>\n<p>This email illustrates two things:<!--more--><\/p>\n<ol>\n<li>Attacks are more sophisticated as cybercriminals get smarter and craftier.<\/li>\n<li>An increased level of understanding regarding cyber attacks is needed, not just within the corporate community, but within the general public as well.<\/li>\n<\/ol>\n<p>The market for enterprise network and cybersecurity grows each year highlighting the emphasis companies are putting on preventing modern threats from infiltrating their internal networks. However, the impetus is focused on technological preventative measures. Could an education in cybersecurity \u2014 who the attackers are, what they\u2019re after, and the appropriate level of scrutiny that should be practiced \u2014 significantly bolster an enterprise\u2019s cyber defense?<\/p>\n<p>Yes. In 2011, <a href=\"http:\/\/blogs.gartner.com\/avivah-litan\/2011\/04\/01\/rsa-securid-attack-details-unveiled-they-should-have-known-better\/\" rel=\"nofollow,noopener\"  target=\"_blank\">RSA was the target of a spear phishing attack<\/a> made successful by at least one employee opening the malicious attachment even after their spam filter had correctly placed the email in the \u201cjunk\u201d folder. RSA suffered a data breach as a result.<\/p>\n<h5>\u201cAt least RSA\u2019s SPAM filters were working, even if their social engineering training for employees was not,\u201d -Avivah Litan, Gartner Analyst<\/h5>\n<p>More recently, a spear phishing attack targeting physicians at a <a href=\"http:\/\/www.thenewstribune.com\/2014\/03\/31\/3126217_phishing-e-mails-net-medical-records.html?rh=1\" rel=\"nofollow,noopener\"  target=\"_blank\">Tacoma-based medical group<\/a> led to the breach of 12,000 patient records. Emails were crafted to appear as though they were sent from the group\u2019s parent company, and prompted targets to click on a link and enter their email account username and password. The group has since rolled out a company-wide phishing prevention system, including retraining the employees who fell for the initial phishing email.<\/p>\n<p>Spear phishing attacks are:<\/p>\n<p><strong>Lucrative. <\/strong>The black market for data is huge, estimated at multiple billions of dollars, meaning that the person or organization behind the attack may not actually use what they steal to make money. Unfortunately, this also means they\u2019re more difficult for authorities to track down.<\/p>\n<p><strong>Successful.<\/strong> Because hackers take pains to get their targets to fall for their schemes, they know what company and department you work for, what applications you use, who you report to, and what kinds of projects you\u2019re likely working on. They know which job titles are likely uninformed or unwary of potential threats. This makes spear phishing campaigns one of the most highly-favored APT attack methods.<\/p>\n<p><strong>Simply a means of getting in.<\/strong> Once a target is duped into clicking a link, opening a file, etc., the attacker can carry out his mission, whether it\u2019s stealing personal information, using a target\u2019s personal account to transfer money, extract intellectual property or insider information.<\/p>\n<p><strong>A real threat to both corporate and consumer spheres.<\/strong> Both have data that attackers want to use to make money, and most people who work for targeted companies have a home computer or mobile device for personal use that is <em>not<\/em> protected by enterprise network or endpoint security policies.<\/p>\n<p><strong>Recognizable\u2026 <\/strong>sometimes, if you know what you\u2019re looking for.<\/p>\n<ul>\n<li>Check the sender\u2019s email address to make sure it\u2019s someone from whom you should be receiving emails. If you\u2019re still not sure, email clients like Outlook and web mail applications like Gmail usually have options to view email messages with the headers included, so you can make sure the \u201cFrom\u201d field matches the \u201cReply-to\u201d field.<\/li>\n<li>Look for patterns of misspellings and incorrect grammar.<\/li>\n<li>Ask yourself if links and attachments within the message are expected information from the sender and work-related. Do the domain name or file name make sense? View the email with formatting turned off to view a link\u2019s actual URL.<\/li>\n<li>Check the attachment\u2019s file extension. Odds are that unless you\u2019re in the IT or engineering department, you shouldn\u2019t be receiving or opening file types with extensions .exe, .dll, .scr, or .class. According to Symantec, these file types were used in more than 50% of last year\u2019s spear phishing attacks.<\/li>\n<li>If you\u2019re still unsure that an email is legitimate, ask your company\u2019s IT security folks.<\/li>\n<\/ul>\n<p>Cyber best practices like these aren\u2019t just for those who deal with security as part of their daily job duties. They need to be taught company-wide.<\/p>\n<p>What kind of corporate policies and programs promote a healthy balance between paranoia and productivity?<\/p>\n<p>I\u2019ve heard of one corporate program where basic cybersecurity best practices are taught as part of the new hire training class for every employee. Another IT-run program periodically assesses its employees by sending fake phishing emails to different groups within the organization; those who fall for the faux scam by either opening an attachment or clicking a link are then required to take a cybersecurity seminar. The goal of these programs is to arm the company\u2019s workforce with knowledge and deploy them as another layer of cyber defense.<\/p>\n<p>Using the right tools to prevent attacks is key, and one of those tools is familiarity with the kinds of tactics cyber criminals are using, and how to recognize and avoid them. What processes or programs have you seen put in place that educates employees and encourages cyber scrutiny?<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you purchased an iPhone 6 recently, you probably received this email: Some of you may have even clicked the \u201cVerify Now\u201d link and entered your Apple ID account information. I hope &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,131,108,744],"tags":[61,208],"coauthors":[716],"class_list":["post-7077","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-malware-2","category-threat-prevention-2","category-web-security","tag-apple","tag-phishing"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7077"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7077\/revisions"}],"predecessor-version":[{"id":7079,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7077\/revisions\/7079"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7077"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}