Protecting your business from phishing attacks
Davey Winder tackles the ever-mutating threat from phishing - in particular, the growth of conversational attacks
Recent research conducted by OnePoll suggests that 60% of office workers in the UK receive a phishing email every day, while 6% get more than ten a day.
I wouldn’t bat an eyelid at these numbers if they related to a consumer audience, but the fact that this was a poll of the business sector is surely cause for concern.
After all, doesn’t pretty much every business in the land have some kind of technical defence in place to deal with spam and email-borne malware? Evidently, these defences aren’t working as well as they should.
Interestingly, the same poll suggests that roughly the same 60% of workers will fall for a phishing scam unless they’ve been trained to spot one. Some 27% of the office workers polled had no idea what phishing is, while one in five admitted they’d fallen victim by clicking on a link or opening a dodgy attachment.
Some 27% of the office workers polled had no idea what phishing is
Earlier this year, I wrote about how to protect your business against spear-phishing, concluding that education is the key to successful protection against this social-engineering menace.
Unfortunately, the process of educating yourself and your workers can feel rather like painting the Forth Bridge, in that it appears to be a never-ending, cyclical task. But, if you look beyond the urban myth, the Forth Bridge has never been continuously painted, and the maintenance contracts for painting it have continually improved – the latest job, completed a couple of years ago, is expected to last for 25 years.
Painting the bridge isn’t trivial, and it does take several years, but the investment pays off in the years that follow.
That’s the analogy I’d apply to the phishing problem, to counter the defeatist view that claims the bad guys come up with a new threat – and force you to start re-educating from scratch – every time you think you have them sussed. You don’t have to do anything of the sort.
If you’ll excuse me belabouring my painting analogy, all you need do is make sure the base coat is thick enough, then touch it up as necessary.
Teaching your staff how to spot the most common mistakes social engineers make when they build their phishing lures will make it easier to spot scams when they’re confronted with a more personalised attack.
To illustrate this by way of an example, PC Pro reader Neill Lillywhite forwarded me a copy of a phishing email he received that would certainly have been enough to fool most uneducated readers, since it was a pretty convincing clone of a typical PayPal transaction notification. However, Neill spotted that its sender had made several small errors that were enough to set off alarm bells.
The mistakes were basic. The account to which the fake email was sent wasn’t the one Neill normally uses for PayPal; most people use the same address for almost everything and so wouldn’t notice anything amiss.
Far sloppier mistakes included the use of a bald "Hello" (rather than Neill’s username) as the greeting, an incorrect date (the email was dated after the day of receipt), and the fact the email claimed to be from www.paypal.com rather than www.paypal.co.uk, which Neill normally deals with.
All these goofs seem obvious once they’ve been pointed out, but they’re easy to miss when you’re skimming over email – especially if you’ve never received anti-phishing training.
Perhaps the biggest error of all in this correspondence is that, if you hover over the PayPal links in the message, they reveal the destination URL is a Russian website. Forget the fact you’d never bought the item described – that’s actually the clever part of this social-engineering trap.
It triggers your "thieving corporation" reflex and almost guarantees you’ll dash off a fuming email of complaint. No, they don’t expect to fool you into paying for goods you didn’t buy; they expect to fool you into clicking the reply link.