By Undisclosed on Friday, 19 June 2020
Category: Technical

Tales From Our Ethical Phisherman

You've heard a great deal about ethical hackers, who emulate the Tactics Techniques and Procedures (TTP) of a hacker to test your defences. Well, I'm an ethical phisherman, I use the same TTP as an attacker to lure your staff into taking my bait and then instead of exploiting them, they receive education, whilst you receive statistics on how many staff, from which departments using what devices, at what time. This process helps to shape behaviour and encourages staff to report suspicious emails and in doing so improve your defences. Please take a look at our Managed Phishing Assessment Service https://www.cndltd.com/services/assess/phishing-assessment

Back to Basics - What is Phishing

Phishing is a form of social engineering designed to target what has traditionally been seen as the weakest part of any system - the user. Phishing attacks have been around for many years and come in countless forms, complexities, and themes. From the laughable early attempts that contained broken English and far-fetched requests ('Nigerian Prince'/419 scams anyone?) right through to the well-researched, highly targeted attempts designed to closely imitate individuals and organisations.

Phishing attempts can serve different purposes; from reconnaissance and intelligence gathering through to credential theft and malware delivery. The lures used to achieve these aims are often designed to leverage basic human traits (greed, curiosity, fear etc.) to increase the likelihood of success. 'Success' could be clicking on a malicious link, opening an infected file, or inadvertently entering your credentials thinking you were logging into your Microsoft 365 account.

Attackers Do Not Possess A Moral Compass

Tactics & Techniques 

Attackers are notoriously quick to take advantage of current events, topics, and situations. By rapidly adapting their tactics, techniques, and procedures they can hit unsuspecting users from fresh new angles. The current pandemic is a prime example of this. The creation of new phishing lures and malicious domain registrations took place within days of lockdown commencing and have been designed to capitalise on the fear, uncertainty, and interest in all things COVID-19. Examples include fake Virtual Private Network (VPN) updates designed to target the increased number of remote workers, and bogus HMRC and HR-themed emails looking to exploit fears associated with job insecurity and unemployment caused by the Coronavirus.

It should be realised that attackers do not possess a moral compass when it comes to launching phishing attacks. They simply do not care whether a victim is a hospital, charity, small businesses or vulnerable individual. For them, getting a result is the primary goal and this is usually some form of financial gain. 

Defences - Phishing Prohibited

Thankfully, the technical countermeasures designed to filter out this type of attack have progressed markedly in recent years. Despite the impressive advances in email security, phishing attempts still manage to evade filtering solutions and slip through secure gateways into the inboxes of unsuspecting users.

Users are busy people; lots of emails, lots of competing deadlines, yet all it could take is a momentary lapse of judgement (amongst other failings in a layered security approach…) for credentials to be stolen or for ransomware to get deployed onto your network. The fact is that phishing attacks are a low overhead and get results, so they will remain a threat to individuals and organisations for the foreseeable future.

Top Tips for Defence Against Phishing

 Here are 5 tips to help improve security in the fight against phishing:

How to Pre-Pend a Warning to Office 365 Emails - CND News and Blog

Phishing Assessment

Leave Comments