The Top 3 Current Email Threats

Emails originated as a convenient way to remotely share information and security has been a foremost concern in the design and use of email applications. Consequently, criminals and other threat actors have long used email as a primary and highly effective attack vector on people and organisations. 

Email is a vulnerable resource that is typically critical for an organisation's infrastructure and can be used for phishing scams, business compromise and ransomware,

Each attack can be carried out by other means, such as phone calls, text messages or malicious websites, but email messages remain a convenient and reliable vector for attackers, who often combine two or more of these types of attacks to increase their chances of success. Here are the top three email threats, what they have in common and how you can protect your organisation.

Email attacks fall into three broad categories: phishing, social engineering and malware infections, typically designed to extort ransom,

Phishing & Spoofing Attacks

Most successful email-based attacks have something in common. They generally involve email spoofing, which is when an attacker fakes the sender's address to make it seem like an email message comes from a trustworthy sender. You're more likely to click on a link or open an attachment when you think it comes from someone you know or a company you trust.

  • Spoofing is not an attack itself but a means to an end. Fortunately, technological defenses against spoofing called DKIM, DMARC and SPF are free and widely available. Implementing them will go a long way toward making your organisation's email communications, both incoming and outgoing, more secure. 
  • Phishing Phishing is the most common email threat and the one that's least likely to disappear with time. It tricks you into handing over private bits of information such as account usernames, passwords, email addresses, credit-card numbers or Social Security numbers.

The phisher hides from you by using technology pretending to be a trustworthy entity, which can be a well-known company or a workplace colleague. Malware is usually not involved, and there's little personal interaction. The best phishing scams blend into your daily routine so that you never notice anything is wrong.

A report from CyberRiskAlliance has found that 60% of CISOs and other IT managers surveyed cited phishing and spoofing as among their top three email-security concerns, right behind ransomware. 

In the most common scenario, a phisher's email message tells you there's something wrong with one of your accounts and that you need to log in immediately. The message includes what seems to be a link to the account login page but is really a clever mockup. As soon as you type in your credentials, the attacker has them.

Phishing can also be done via SMS text messages and or through voice calls. But phishing email messages are still the primary method of attack.

Targeted phishing attacks aimed at a single person or a small group of people, such as company executives or human-resources or IT staffers and attackers often research their targets beforehand and personalise the malicious messages to make them more likely to succeed.

While anti-spoofing defences will reduce the number of phishing messages that reach your staffers, they won't stop them all. If an attacker gets access to an employee's internal network account, possibly by spear phishing, then they can send phishing emails to other staffers that genuinely come from that employee's account.
Your correspondent once fell for an email that seemed to come from an HR staffer and asked all staffers to address a payroll issue. A link in the message led to what looked like the Office 365 login page. 

Antivirus software blocked the site for some staffers, but other employees weren't so lucky and had their paycheck direct deposits rerouted to other bank accounts.

Aside from anti-spoofing protocols, protections against phishing are numerous. Training  all your organization's employees about how to monitor emails, looking out for phishing attacks and what to do if they fail to detect them is critical.

Social Engineering &  Business Email Comromise (BEC)

Social engineering is a new name for old-school confidence tricks that don't always involve technology. If you've ever talked your way into an exclusive party or event you weren't invited to, that's social engineering. Today, crooks are using high-level social engineering to carry out business email compromise attacks. They impersonate company CEOs or CFOs and convince employees to pay phony invoices or make wire transfers to random bank accounts.

The attacks usually include spoofing and may be facilitated by phishing, but do not generally involve malware; the goal is money.

These BEC attacks can be done in a number of ways, including by sending text messages to staffers after hours or by dialing into video conferences. "In those meetings, the fraudster would insert a still picture of the CEO with no audio, or a 'deep fake' audio through which fraudsters, acting as business executives, would then claim their audio/video was not working properly," said the FBI in its 2021 Internet Crime Report.   

The most common vector for attacks is via email. Often, the attackers compile lists of company employees authorised to make payments, which can be obtained from LinkedIn or company websites. Then the attackers target employees with spoofed emails that seem to come from the boss and demanding urgent wire transfers to a specific companies or bank accounts. If the employees who get the emails believe the scam and can make the payments, then the money may be gone for good.

The FBI estimates that US businesses and individuals lost $2.4 billion to BEC scams in 2021, with losses rising 65% from July 2019 to December 2021. The worldwide cumulative damage since June 2016 reached $43 billion.

 Malware Infection & Ransomware

In 2011, a large information security vendor was struck by Chinese state-sponsored attackers who sent email messages to just a few people in the company, spoofing addresses so that employees appeared ed to be emailing each other. 

Attached to the messages was a Microsoft Excel file that exploited a previously unknown vulnerability in Adobe Flash and gave the attackers full control of the employees' machines.

The attackers used that access to penetrate the vendor's networks and compromise its leading security product, which was used by US defense contractors and thousands of other organisations to protect their networks. The security company had to make good with its clients and took a $66 million charge because of the attack.

Email-delivered malware is perhaps the most dangerous email threat of all. It can deeply penetrate an organisation's systems, quietly stealing information for months or even years. If the goal is money rather than information, then it can install ransomware that locks up those systems and demands payment to free them or steal proprietary data and ransom that too.

Such malware often comes in the form of an attachment that looks innocuous, like an invoice or a resume. The accompanying message may urge that the attachment be opened immediately. In other cases, the message contains a link that takes the recipient to a website that silently tries to install malware through a web browser.

Aside from anti-spoofing measures, the best defenses against email-borne malware are strong end-point protection software that automatically scans all email attachments, regular application and operating-system updates, and strict security policies.

Conclusion

Email is by far the most common way businesses communicate and in the digitised business world it provides an   open door. Even our most sophisticated detection systems can be fooled by a crafted email from a skilled bad actor. 

Ultimately, the final defence layer is the email user. It is the user who reads the email and clicks the link. With better education in spotting rogue emails, and thinking before they click, many users can stop an attack before it even starts.

IC3:      SC Magazine:   Cyber Risk Alliance:

You Might Also Read:    

Phishing - The Game Is Changing:

 

« $3 Million Romance Fraudster Arrested
British Parliament Shuts Down Its TikTok Account »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71) is Singapore's first cybersecurity entrepreneur hub.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

M7 Services

M7 Services

M7 Services are a comprehensive Managed Services Provider (MSP) with a focus on delivering cutting-edge information technology solutions and unparalleled customer service.

SSL2BUY

SSL2BUY

SSL2BUY is a leading SSL certificate provider, authorized to sell top CA brands like Comodo, DigiCert, GlobalSign, Thawte, GeoTrust and more.