SlideShare a Scribd company logo
1 of 16
Download to read offline
Protect Your Organization from
Phishing Threats
Andy Rappaport, Chief Architect
Tom Smit, Customer Experience Manager

PA G E
Agenda
•
•
•
•
•

The Evolving Phishing Threat
Attacker’s mentality - What CORE’s penetration testers tell us
5 minute Identity Harvest Challenge
Best Practices – What You Can Do
Organizational Preparedness with CORE Insight

PA G E 2
Phishing is Not the Same as Spam
• Spam: Unwanted email (and possibly texts)
• Phishing: malicious email – social engineering attack
− Pretending to be from someone you trust
− Designed to look like legitimate email from a trusted source.

• Types of Phishing:
− Spear Phishing – Targets select individuals
− Clone Phishing – use previous emails to create legitimate appearances
while changing the links in the email. Use existing trust.
− Long-lining – Mix of large volume of highly customized emails –
intended to defeat filter-type defenses.

PA G E 3
The Evolving Phishing Threat
• Frequency is declining1 but sophistication is increasing
• Spearphishing effectiveness has significantly increased2

• $1.5 Billion – total loses from phishing in 20123
• Why? Lowered barriers to achieve online trust
− Decreased face-to-face contact: remote offices, outsource, partners, social nets
− Tech by-pass the human: Single-sign-on, federation, browsers save a password
− Mixed personas (personal & biz): BYOD.

Sources
1. Anti-phishing Working Group Attack Trend Reports: http://www.antiphishing.org/resources/apwg-reports/
2. http://threatpost.com/spear-phishing-remains-preferred-point-entry-targeted-persistent-attacks-113012
3. http://www.emc.com/collateral/fraud-report/rsa-online-fraud-report-012013.pdf

PA G E 4
What CORE’s Pen. Testers Tell Us
• Social Engineering is the preferred attack vector.
• Users are easier: “We can always phish someone [in an
engagement.] Its just a matter of how hard we need to try.”

• Establish, escalate and leverage trust: “until you get
someone [or something] you want”.

• Value of compromising an identity
− Email account: send email as them  leverage their trust network
− Browser or host: passwords  logon as them

Note the significance of trust in each statement.
PA G E 5
What CORE’s Pen. Testers Tell Us – The Approach
• Establish trust with non-threating message to small group.
− We have been experiencing some errors with the XYZZY system. Sorry
for any inconvenience.
− We are scheduling an upgrade for the XYZZY system.

• … then send the Phish email
− Sorry. Please use this temporary XYZZY system <some link>

• Make it look right
− Use corporate branding / images. Duh.

• Personalize - if possible
− Title: Attendee list for your XYZZY conference keynote
o (A person’s future conference schedule might be easy to discover)

PA G E 6
Try the 5 Minute Identity Harvest Challenge
• Pick an important corporate user – your company or another
• Search for just 5 minutes to get spear-phish info
• Pick a few places to look:
−
−
−
−
−

Corporate site, news
Financial: scheduled stock trades
Search engine: blogs, conferences, speeches, planned travel
Social: Linked-in (college – home-coming), Facebook (social, family)
Physical Addresses: work, home, vaca

What could an attacker do with more time?

PA G E 7
Phish Defenses – What You Can Do
• Defend - Technology deployments
 Blacklisting known phishing sites
 Spam filters
 Anti-virus software

• Educate - User awareness
− Regular 2-way communication. Make humans part of your sensor network.
− Share real-world examples

• Understand the risk - Establish Policy
− Ex: CSR or IT password reset – are they being helpful or insecure?
− Zip files through the firewall?
− Mixing personal and business.

• Test and measure your own exposure and risk
− Test your own defenses
− Hands-on employee assessments

PA G E 8

GOTCHA!
Self-Phishing Best Practices
• Goal: Understand and lower phish risk
• Systematic testing
− Data-driven. Objective.
− Create an easily-repeatable process
− Not a one-time gotcha. (Hook-and-release)

• Test people and defenses/controls
• Different levels of sophistication

Assess

Test

Improve

− E.g. obvious form letter; targeted message w/specific but publicallyavailable information

PA G E 9
Benefits of Self-Phishing
Data-driven Security - Goals-questions-metrics
• Goal: understand/measure own risk from phish exposure.
• Questions:
−
−
−
−

Does the A/V on our IT ‘golden images’ detect spam/phish messages.
Do our defenses provide useful clues to employees?
Which of our users are susceptible to phishing?
How much does our user awareness program reduce the risk?

• Metrics: Understanding effectiveness of your training
− Measure over time and identify areas to improve
− Approach: Mix baselines (Nigerian prince) with more focused
(spearphish)

• Identify users and groups who need additional education
− Adequately trained? New hires? Admins? IT? Devs?

PA G E 1 0
CORE Insight

PA G E 1 1
Insight Can Assess Over Time

Investments in training has
proven productive.

On going evaluation is
critical to minimizing risk.
PA G E 1 2

Next quarter’s focus can be
clearly identified.
Insight Identifies Critical Areas

Identify current weaknesses
in an organization.

Campaigns focus on different users.
•
•
•
PA G E 1 3

Marketing Executives
Contractors
Web Developers

Focus limited resources
on more critical activities
Insight Builds Focused Campaigns
Clone Phishing

Spear Phishing
General Phishing
First Generic Bank <accounts@firstgenericbank.com
Please update your account information
Mar 12, 2013 3:23PM PST

PA G E 1 4
Reporting

PA G E 1 5
Go to www.coresecurity.com/videos/protecting-yourorganization-phishing-threats to watch the recorded
presentation
For more information please contact Core Security at
(617)399-6980 or info@coresecurity.com

PA G E 1 6

More Related Content

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Protect your organization from phishing attacks

  • 1. Protect Your Organization from Phishing Threats Andy Rappaport, Chief Architect Tom Smit, Customer Experience Manager PA G E
  • 2. Agenda • • • • • The Evolving Phishing Threat Attacker’s mentality - What CORE’s penetration testers tell us 5 minute Identity Harvest Challenge Best Practices – What You Can Do Organizational Preparedness with CORE Insight PA G E 2
  • 3. Phishing is Not the Same as Spam • Spam: Unwanted email (and possibly texts) • Phishing: malicious email – social engineering attack − Pretending to be from someone you trust − Designed to look like legitimate email from a trusted source. • Types of Phishing: − Spear Phishing – Targets select individuals − Clone Phishing – use previous emails to create legitimate appearances while changing the links in the email. Use existing trust. − Long-lining – Mix of large volume of highly customized emails – intended to defeat filter-type defenses. PA G E 3
  • 4. The Evolving Phishing Threat • Frequency is declining1 but sophistication is increasing • Spearphishing effectiveness has significantly increased2 • $1.5 Billion – total loses from phishing in 20123 • Why? Lowered barriers to achieve online trust − Decreased face-to-face contact: remote offices, outsource, partners, social nets − Tech by-pass the human: Single-sign-on, federation, browsers save a password − Mixed personas (personal & biz): BYOD. Sources 1. Anti-phishing Working Group Attack Trend Reports: http://www.antiphishing.org/resources/apwg-reports/ 2. http://threatpost.com/spear-phishing-remains-preferred-point-entry-targeted-persistent-attacks-113012 3. http://www.emc.com/collateral/fraud-report/rsa-online-fraud-report-012013.pdf PA G E 4
  • 5. What CORE’s Pen. Testers Tell Us • Social Engineering is the preferred attack vector. • Users are easier: “We can always phish someone [in an engagement.] Its just a matter of how hard we need to try.” • Establish, escalate and leverage trust: “until you get someone [or something] you want”. • Value of compromising an identity − Email account: send email as them  leverage their trust network − Browser or host: passwords  logon as them Note the significance of trust in each statement. PA G E 5
  • 6. What CORE’s Pen. Testers Tell Us – The Approach • Establish trust with non-threating message to small group. − We have been experiencing some errors with the XYZZY system. Sorry for any inconvenience. − We are scheduling an upgrade for the XYZZY system. • … then send the Phish email − Sorry. Please use this temporary XYZZY system <some link> • Make it look right − Use corporate branding / images. Duh. • Personalize - if possible − Title: Attendee list for your XYZZY conference keynote o (A person’s future conference schedule might be easy to discover) PA G E 6
  • 7. Try the 5 Minute Identity Harvest Challenge • Pick an important corporate user – your company or another • Search for just 5 minutes to get spear-phish info • Pick a few places to look: − − − − − Corporate site, news Financial: scheduled stock trades Search engine: blogs, conferences, speeches, planned travel Social: Linked-in (college – home-coming), Facebook (social, family) Physical Addresses: work, home, vaca What could an attacker do with more time? PA G E 7
  • 8. Phish Defenses – What You Can Do • Defend - Technology deployments  Blacklisting known phishing sites  Spam filters  Anti-virus software • Educate - User awareness − Regular 2-way communication. Make humans part of your sensor network. − Share real-world examples • Understand the risk - Establish Policy − Ex: CSR or IT password reset – are they being helpful or insecure? − Zip files through the firewall? − Mixing personal and business. • Test and measure your own exposure and risk − Test your own defenses − Hands-on employee assessments PA G E 8 GOTCHA!
  • 9. Self-Phishing Best Practices • Goal: Understand and lower phish risk • Systematic testing − Data-driven. Objective. − Create an easily-repeatable process − Not a one-time gotcha. (Hook-and-release) • Test people and defenses/controls • Different levels of sophistication Assess Test Improve − E.g. obvious form letter; targeted message w/specific but publicallyavailable information PA G E 9
  • 10. Benefits of Self-Phishing Data-driven Security - Goals-questions-metrics • Goal: understand/measure own risk from phish exposure. • Questions: − − − − Does the A/V on our IT ‘golden images’ detect spam/phish messages. Do our defenses provide useful clues to employees? Which of our users are susceptible to phishing? How much does our user awareness program reduce the risk? • Metrics: Understanding effectiveness of your training − Measure over time and identify areas to improve − Approach: Mix baselines (Nigerian prince) with more focused (spearphish) • Identify users and groups who need additional education − Adequately trained? New hires? Admins? IT? Devs? PA G E 1 0
  • 12. Insight Can Assess Over Time Investments in training has proven productive. On going evaluation is critical to minimizing risk. PA G E 1 2 Next quarter’s focus can be clearly identified.
  • 13. Insight Identifies Critical Areas Identify current weaknesses in an organization. Campaigns focus on different users. • • • PA G E 1 3 Marketing Executives Contractors Web Developers Focus limited resources on more critical activities
  • 14. Insight Builds Focused Campaigns Clone Phishing Spear Phishing General Phishing First Generic Bank <accounts@firstgenericbank.com Please update your account information Mar 12, 2013 3:23PM PST PA G E 1 4
  • 16. Go to www.coresecurity.com/videos/protecting-yourorganization-phishing-threats to watch the recorded presentation For more information please contact Core Security at (617)399-6980 or info@coresecurity.com PA G E 1 6