Hardly a day passes without an announcement of yet another data breach or targeted attack. P. F. Chang’s, eBay, and the RSA Conference website are just a few examples of high-profile incidents in recent months. In another recent case, the US Department of Justice indicted five people from the Shanghai-based cyber hacker group known as “Comment Crew”. A number of US companies, including U.S. Steel, Westinghouse and Alcoa, were the victim of targeted attacks to steal intellectual property and product specifications. According to reports, around 700,000 emails were stolen from Westinghouse alone.
Unfortunately, attacks and breaches such as these are all too common. According to statistics from a recent Proofpoint webinar, two-thirds of large US organizations were attacked in the past year, and one-third admitted to being breached. Although targeted attacks by foreign governments are one end of the spectrum, the majority of attacks are designed to compromise individual accounts.
Regardless of the attacker’s motives and the information that’s stolen, one thing that these incidents have in common is that they often can be traced to Phishing: The use of emails that appear to be from a legitimate, trusted source that are enticed to trick recipients into entering valid credentials including personal information such as passwords or credit card numbers into a fake platform or service. LookingGlass Cyber (n) - tailoring an attack (such as email) to garner trust and credentials that are then used maliciously. The preverbal digital version of the ol' hook and bait. schemes.
Before a Breach
Cases like the RSA website compromise and Target illustrate how hackers use phishing as a tried and true method to successfully infiltrate organizations. Whether the phishing emails are targeted at executives, customer support, or a third-party supplier, they are designed to appear as though they are from a legitimate business or individual and to infect systems and networks with Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs.. This in turn can then be used to install other programs to exfiltrate data and enable hackers to build backdoors for future data theft.
Since these phishing or spearphishing emails are crafted much more carefully than mass emails, they continue to be a very effective means to compromise organizations. Because these emails are personalized and may have details that criminals have discovered through social media or other online sources, they are much more likely to be opened, and less likely to be caught by SPAM: Email or postings containing irrelevant, inappropriate or indiscriminate messages sent to a large number of recipients. LookingGlass Cyber (n) - tons and tons of emails sent out with no relevance to anyone, or anything. filters.
After a Breach
After online retailer eBay announced that personal information, including the email addresses of more than 145 million users, had been stolen from the company’s databases in a cyber-attack, criminals immediately began taking advantage of this. By sending out phishing emails that are nearly identical to those from the actual company affected by a breach asking customers to change their usernames and passwords, criminals are able to collect log in information from untold numbers of unsuspecting victims.
One way that some organizations have addressed this conundrum is by setting up a dedicated resource page on their corporate website to post PDFs of all official communications that the company sends out. Another is to not provide an actual link within an email for customers to reset their usernames and passwords, but to ask them to go directly to the company’s official website instead and enter their details there.
Anti-phishing solutions, along with employee training, are critical in order to protect your enterprise. Our white paper on the true cost of phishing can help put the consequences of such an attack in perspective for your organization.