Hacked, great design for any purposes. Internet technology. Cyber crime, hacker attack. Phishing scam
In 2022, 15 billion unwanted messages a day, spams, phishings and malwares were blocked by Gmail. In 2020 were blocked by Gmail 100 million phishing emails.
1.5 million new phishing websites are made monthly. (Swiss Cyber Institute)
How to defend your organization against email phishing attacks.
Defend your organization by providing a multi-layered attack mitigation suite to improve your
organization’s resilience against phishing attempts while minimizing disruption to user productivity.
The defenses proposed in this guide are also useful against other types of cyberattacks and will help your organization become more resilient overall.
This guidance is designed by UK Government cyber security experts at the NCSC and is aimed at
technology, operations or security professionals responsible for designing and implementing
defenses for medium to large organizations. You will find a real-world example that illustrates how a multi-layered approach prevented a phishing attack from damaging a major organization in the financial sector. The mitigations contained in this guide require a combination of technology, process, and people approaches. To be truly effective, your defenses must be taken as a whole. For example, if you want to encourage people to report suspicious emails, you need to back this up with the technical resources and process behind it that will provide timely feedback on the email they have sent.
What is phishing?
Phishing occurs when attackers try to trick users into taking a “certain action”, such as clicking on a bad link that downloads malware or directs them to a questionable website.
Phishing can be carried out via text message, social media, or phone, but the term “phishing” is
mainly used to describe attacks that come via email. Phishing emails can reach millions of users
directly and hide among the vast amount of innocuous emails that busy users receive. Attacks can install malware (such as ransomware), sabotage systems or steal intellectual property and money.
Phishing emails can hit organizations of any size and type. You may get caught up in a mass campaign (where the attacker is just trying to get new passwords or make easy money), or it may be the first step in a targeted attack against your company where the goal may be something much more specific, such as stealing sensitive data. In a targeted campaign, an attacker can use information about your employees or company to make their messaging even more compelling and realistic and will be crafted to align with the interests of a specific individual or organization. This is commonly referred to as spear phishing.
Any organization can play a role
The mitigations described here are mostly focused on preventing the impact of phishing attacks in your organization. For example, setting up DMARC will prevent phishers from spoofing your domain (domain spoofing means that their emails will look like they come from your organization).
This brings a number of benefits:
1) Your own company’s emails are more likely to make it into the inbox of recipients rather than
being filtered as spam.
2) From a reputational perspective, no organization wants its name to become synonymous
with scams and fraudulent emails.
3) The wider community will also benefit from having your contacts (such as suppliers, partners
and customers) registered with DMARC. This can give you much more confidence that the
email asking for information (or money) is actually coming from the people and places you
expect the email from.
Defending against phishing:
Why you need a multi-layered approach
Typical phishing defenses often rely solely on users being able to spot phishing emails. This approach will have limited success. Instead, you should expand your defenses to include more technical measures. This will improve your resistance to phishing attacks without disrupting your users’ productivity. You will have several opportunities to detect a phishing attack and then stop it before it causes damage. You also acknowledge that some attacks will get through, this will help you plan for incidents and minimize the damage caused.
This guide breaks down threat mitigation into four layers on which you can build your defenses:
1) Make it harder for attackers to access your users
2) Help users identify and report suspected phishing emails
3) Protect your organization from the effects of undetected phishing emails
4) Respond quickly to incidents
Some of the proposed mitigations may not be feasible in the context of your organization. If you cannot implement them all, try to address at least some of the attacking threat mitigations at each layer.
Four layers of mitigation
Layer 1:
Make it difficult for attackers to access your users
This section describes defenses that can make it difficult for attackers to access your end users.
Don’t allow your email addresses to be a source for attackers Attackers “spoof” trusted emails, making their emails look like they were sent by reputable organizations (like yours). These fake emails can be used to attack your customers or people in your organization.
Mitigate spoofed emails from your domains by using the DMARC, SPF, and DKIM anti-spoofing
controls and encourage your contacts (partners, vendors, etc.) to do the same.
Limit the information available to attackers
Attackers use publicly available information about your organization and users to make their phishing (and especially spear phishing) messages more convincing. This is often gleaned from your website and social media accounts (information known as your “digital footprint”).
How do I do it?
Filter or block incoming phishing emails
Filtering or blocking phishing email before it reaches your users reduces the likelihood of a phishing incident and reduces the amount of time users need to spend checking and reporting
Layer 2:
Help users identify and report suspicious phishing emails
This section describes how to help your employees identify phishing emails and improve reporting morale.
Carefully consider your approach to phishing training
Training your users – especially in the form of phishing simulations – is a layer that is often emphasized in phishing defenses. Your users can’t compensate for cybersecurity weaknesses elsewhere. Answering emails and clicking links is a huge part of the modern workplace, so its unrealistic to expect users to be constantly vigilant.
Detecting phishing emails can sometimes be really hard, and spear phishing is even harder to detect. The advice given in many training packages, based on standard warnings and signs, will help your users detect some phishing emails, but cannot teach everyone to spot all phishing emails.
How do I do it?
Make it easier for your users to spot fraudulent requests
Attackers can abuse processes to trick users into handing over information (including passwords) or making unauthorized payments. Consider which processes attackers might mimic and how to check and improve them to make it easier to detect phishing attacks.
In addition, think about how emails you send to suppliers and customers will be received. Can your recipients easily distinguish your genuine email from a phishing attack? After all, you can’t expect their users (like yours) to look for and recognize every hint of phishing. Don’t assume that providing personal information will verify your identity; stolen or researched information is used by phishers to make their emails more convincing.
How do I do it?
Create an environment that encourages users to report phishing attempts
Creating an environment in your organization with a culture in which users can report phishing
attempts (including those that are clicked on) will give you important information about what types of phishing attacks are being used. You can also learn what types of emails are mistaken for phishing and what impact this can have on your organization.
How do I do it?
Layer 3:
Protect your organization from the effects of undetected phishing emails
Because it is impossible to stop all attacks, this section describes how to minimize the impact of
undetected phishing emails.
Protect your devices from malware
Malware is often hidden in phishing emails or on websites to which the emails link. Well-configured devices and good endpoint protection (such as employee computers) can stop malware from installing, even if someone clicks on the email. There are many other defenses against malware, and you will need to consider your security needs according to how you work to ensure you have the right approach. Some protections are specific to particular threats (for example, disabling macros) and some may not be suitable for all devices (anti-malware software may be pre-installed on some devices and not needed on others). Finally, the impact of malware on your wider system will depend on how your system has been set up.
How do I do it?
Protect your users from malicious websites
Links to malicious websites are often a key part of a phishing email. However, if the link cannot open the website, the attack cannot proceed.
How do I do this?
Protect your accounts with effective authentication and authorization
Passwords are a key target for attackers, especially when it comes to accounts with privileges such as accessing sensitive information, handling financial assets or managing IT systems. You should make your login processes to all accounts are more resistant to phishing by limiting the number of accounts with privileged access to an absolute minimum.
How do I do it?
Layer 4:
Respond quickly to incidents
All organizations will experience security incidents at some point, so make sure you’re able to detect and respond to them quickly.
Detect incidents quickly
Knowing about an incident sooner rather than later allows you to limit the damage it can cause.
How do I do it?
Have an incident response plan
Once an incident is discovered, you need to know what to do to prevent further damage as soon as possible.
How do I do it?
A real-world example:
How multi-layered anti-phishing measures countered the Dridex malware The following real-world example illustrates how a company in the financial sector used effective layered measures to defend against phishing attacks. Relying on any single layer of defense would have circumvented some attacks, or in the case of relying on quick cleanup after the fact, would have been very costly and disproportionately time-consuming.
The company, which has around 4,000 employees, received 1,800 emails containing a number of variants of the Dridex malware. The email claimed to be an invoice requiring urgent attention, which was relevant to the role of some recipients. It was not targeted at individual users with any personal details but was well written with good spelling and grammar.
Summary of the phishing attack:
As part of this campaign, 1,800 emails were sent to the organization.
1,750 were stopped by email filtering, which identified the presence of malware.
This left 50 emails that arrived in users’ inboxes.
Of these, 36 were either ignored by users or reported using a feature in their email client. 25
were reported in total, including some post clicks; this was the first indication that the attack
had gotten past the initial layer of defense.
This left 14 emails that were clicked on that triggered the malware.
The 13 malware installations failed to run as intended because the devices had been
updated.
1 instance of malware was installed.
A malware attempt to contact its operator was detected, reported, and blocked.
1 device was seized, examined, and cleaned within a few hours.
Between August 2020 and January 2021, there were 140,000 web shell attacks. (Microsoft) How hackers…
Over 3 billion domain spoofing emails delivered per day. Yahoo was the most impersonated brand…
What is NetBIOS (Network Basic Input/Output System)? Programs running on Microsoft Windows-based systems communicate with…
A security tactic called the Cyber Kill Chain outlines the steps a cyber attacker must…
A well-known open-source security program called Nmap (Network Mapper) is used to find hosts and…
What are Google dorks? Google dorks are search queries that employ sophisticated search operators to…