Protecting your business from phishing attacks
Posted on 5 Jul 2013 at 10:13
Davey Winder tackles the ever-mutating threat from phishing - in particular, the growth of conversational attacks
Recent research conducted by OnePoll suggests that 60% of office workers in the UK receive a phishing email every day, while 6% get more than ten a day.
I wouldn’t bat an eyelid at these numbers if they related to a consumer audience, but the fact that this was a poll of the business sector is surely cause for concern.
After all, doesn’t pretty much every business in the land have some kind of technical defence in place to deal with spam and email-borne malware? Evidently, these defences aren’t working as well as they should.
Interestingly, the same poll suggests that roughly the same 60% of workers will fall for a phishing scam unless they’ve been trained to spot one. Some 27% of the office workers polled had no idea what phishing is, while one in five admitted they’d fallen victim by clicking on a link or opening a dodgy attachment.
Some 27% of the office workers polled had no idea what phishing is
Earlier this year, I wrote about how to protect your business against spear-phishing, concluding that education is the key to successful protection against this social-engineering menace.
Unfortunately, the process of educating yourself and your workers can feel rather like painting the Forth Bridge, in that it appears to be a never-ending, cyclical task. But, if you look beyond the urban myth, the Forth Bridge has never been continuously painted, and the maintenance contracts for painting it have continually improved – the latest job, completed a couple of years ago, is expected to last for 25 years.
Painting the bridge isn’t trivial, and it does take several years, but the investment pays off in the years that follow.
That’s the analogy I’d apply to the phishing problem, to counter the defeatist view that claims the bad guys come up with a new threat – and force you to start re-educating from scratch – every time you think you have them sussed. You don’t have to do anything of the sort.
If you’ll excuse me belabouring my painting analogy, all you need do is make sure the base coat is thick enough, then touch it up as necessary.
Teaching your staff how to spot the most common mistakes social engineers make when they build their phishing lures will make it easier to spot scams when they’re confronted with a more personalised attack.
To illustrate this by way of an example, PC Pro reader Neill Lillywhite forwarded me a copy of a phishing email he received that would certainly have been enough to fool most uneducated readers, since it was a pretty convincing clone of a typical PayPal transaction notification. However, Neill spotted that its sender had made several small errors that were enough to set off alarm bells.
The mistakes were basic. The account to which the fake email was sent wasn’t the one Neill normally uses for PayPal; most people use the same address for almost everything and so wouldn’t notice anything amiss.
Far sloppier mistakes included the use of a bald "Hello" (rather than Neill’s username) as the greeting, an incorrect date (the email was dated after the day of receipt), and the fact the email claimed to be from www.paypal.com rather than www.paypal.co.uk, which Neill normally deals with.
All these goofs seem obvious once they’ve been pointed out, but they’re easy to miss when you’re skimming over email – especially if you’ve never received anti-phishing training.
Perhaps the biggest error of all in this correspondence is that, if you hover over the PayPal links in the message, they reveal the destination URL is a Russian website. Forget the fact you’d never bought the item described – that’s actually the clever part of this social-engineering trap.
It triggers your "thieving corporation" reflex and almost guarantees you’ll dash off a fuming email of complaint. No, they don’t expect to fool you into paying for goods you didn’t buy; they expect to fool you into clicking the reply link.
Most scams I see are riddled with typos or use phraseology that a native English speaker would never expect in business communications.
The day crooks learn to write grammatically correct English, and discover there are things called spelling checkers, we are in trouble.
By fogtax on 11 Jul 2013
Davey is a contributing editor to PC Pro, having covered the internet as a topic since the magazine started in 1994. Since that time he's won numerous awards for his journalism, but remains a small-business consultant specialising in privacy, security and usability issues.
- How to sell more ebooks on Amazon
- 10 ways to make your business more secure
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- 20 years of PC Pro: our best covers
- Why we've closed the PC Pro forums
- How to turn off Google Location Tracking
- 20 years of PC Pro: our greatest review mistakes
- 20 years of PC Pro: our first A-List
- Wikipedia's "right to be forgotten" protest hits the wrong note
- 3D printing hits the high street for plastic selfies
- 20 years of PC Pro: What amazed us in our first issue
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Microsoft yanks Windows 8.1 update after crash reports
- Microsoft backtracks on blocking out-of-date Java
- Gartner: time to start planning your Windows 7 upgrade
- Still on IE8? You've got 18 months to upgrade
- Who's buying Chromebooks? American schools
- Microsoft targets Windows in next Patch Tuesday
- Microsoft to block old ActiveX controls in security push
- Samsung and Apple call off all legal disputes, except in the US
- Microsoft ordered to hand over European data
- Will the next Windows 8.1 update arrive next month?