Protecting your business from phishing attacks
Posted on 5 Jul 2013 at 10:13
Davey Winder tackles the ever-mutating threat from phishing - in particular, the growth of conversational attacks
Recent research conducted by OnePoll suggests that 60% of office workers in the UK receive a phishing email every day, while 6% get more than ten a day.
I wouldn’t bat an eyelid at these numbers if they related to a consumer audience, but the fact that this was a poll of the business sector is surely cause for concern.
After all, doesn’t pretty much every business in the land have some kind of technical defence in place to deal with spam and email-borne malware? Evidently, these defences aren’t working as well as they should.
Interestingly, the same poll suggests that roughly the same 60% of workers will fall for a phishing scam unless they’ve been trained to spot one. Some 27% of the office workers polled had no idea what phishing is, while one in five admitted they’d fallen victim by clicking on a link or opening a dodgy attachment.
Some 27% of the office workers polled had no idea what phishing is
Earlier this year, I wrote about how to protect your business against spear-phishing, concluding that education is the key to successful protection against this social-engineering menace.
Unfortunately, the process of educating yourself and your workers can feel rather like painting the Forth Bridge, in that it appears to be a never-ending, cyclical task. But, if you look beyond the urban myth, the Forth Bridge has never been continuously painted, and the maintenance contracts for painting it have continually improved – the latest job, completed a couple of years ago, is expected to last for 25 years.
Painting the bridge isn’t trivial, and it does take several years, but the investment pays off in the years that follow.
That’s the analogy I’d apply to the phishing problem, to counter the defeatist view that claims the bad guys come up with a new threat – and force you to start re-educating from scratch – every time you think you have them sussed. You don’t have to do anything of the sort.
If you’ll excuse me belabouring my painting analogy, all you need do is make sure the base coat is thick enough, then touch it up as necessary.
Teaching your staff how to spot the most common mistakes social engineers make when they build their phishing lures will make it easier to spot scams when they’re confronted with a more personalised attack.
To illustrate this by way of an example, PC Pro reader Neill Lillywhite forwarded me a copy of a phishing email he received that would certainly have been enough to fool most uneducated readers, since it was a pretty convincing clone of a typical PayPal transaction notification. However, Neill spotted that its sender had made several small errors that were enough to set off alarm bells.
The mistakes were basic. The account to which the fake email was sent wasn’t the one Neill normally uses for PayPal; most people use the same address for almost everything and so wouldn’t notice anything amiss.
Far sloppier mistakes included the use of a bald "Hello" (rather than Neill’s username) as the greeting, an incorrect date (the email was dated after the day of receipt), and the fact the email claimed to be from www.paypal.com rather than www.paypal.co.uk, which Neill normally deals with.
All these goofs seem obvious once they’ve been pointed out, but they’re easy to miss when you’re skimming over email – especially if you’ve never received anti-phishing training.
Perhaps the biggest error of all in this correspondence is that, if you hover over the PayPal links in the message, they reveal the destination URL is a Russian website. Forget the fact you’d never bought the item described – that’s actually the clever part of this social-engineering trap.
It triggers your "thieving corporation" reflex and almost guarantees you’ll dash off a fuming email of complaint. No, they don’t expect to fool you into paying for goods you didn’t buy; they expect to fool you into clicking the reply link.
Most scams I see are riddled with typos or use phraseology that a native English speaker would never expect in business communications.
The day crooks learn to write grammatically correct English, and discover there are things called spelling checkers, we are in trouble.
By fogtax on 11 Jul 2013
Davey is a contributing editor to PC Pro, having covered the internet as a topic since the magazine started in 1994. Since that time he's won numerous awards for his journalism, but remains a small-business consultant specialising in privacy, security and usability issues.
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy
- Raspberry Pi and Wolfram: a must-have for every child
- Could you get by with Office Web Apps?
- The best Android antivirus apps for 2014
- Headings vs headers: how to use both in Word
- Hello Cortana, it's nice to meet you
- Windows 8.1 Update: an abject surrender
- The insane economics of Sky Now TV
- No such thing as a free app... so pay up if you want quality
- Time to outlaw crapware-laden installers
- Windows Phone 8.1 video: hands-on
- Office for iPad: key information
- Why every PC buyer owes Richard Durkin a debt of gratitude
- HTC One M8 vs Samsung Galaxy S5: 2014's big-hitters compared
- Windows XP end of life: key information
- Cisco: 100% of companies hosting malware
- Microsoft supercharges PowerPoint with Office Mix
- Microsoft and Nokia deal tweaked ahead of completion
- Microsoft slashes custom XP support price
- Ubuntu LTS Server 14.04 extends cloud support
- Intel: PC sales are "encouraging"
- Google to rank encrypted pages higher
- Heartbleed: the race to reissue security certificates
- Dropbox boosts app line-up with Carousel and Mailbox for Android
- BlackBerry CEO says not selling off phones "any time soon"