The Top 3 Current Email Threats

Emails originated as a convenient way to remotely share information and security has been a foremost concern in the design and use of email applications. Consequently, criminals and other threat actors have long used email as a primary and highly effective attack vector on people and organisations. 

Email is a vulnerable resource that is typically critical for an organisation's infrastructure and can be used for phishing scams, business compromise and ransomware,

Each attack can be carried out by other means, such as phone calls, text messages or malicious websites, but email messages remain a convenient and reliable vector for attackers, who often combine two or more of these types of attacks to increase their chances of success. Here are the top three email threats, what they have in common and how you can protect your organisation.

Email attacks fall into three broad categories: phishing, social engineering and malware infections, typically designed to extort ransom,

Phishing & Spoofing Attacks

Most successful email-based attacks have something in common. They generally involve email spoofing, which is when an attacker fakes the sender's address to make it seem like an email message comes from a trustworthy sender. You're more likely to click on a link or open an attachment when you think it comes from someone you know or a company you trust.

  • Spoofing is not an attack itself but a means to an end. Fortunately, technological defenses against spoofing called DKIM, DMARC and SPF are free and widely available. Implementing them will go a long way toward making your organisation's email communications, both incoming and outgoing, more secure. 
  • Phishing Phishing is the most common email threat and the one that's least likely to disappear with time. It tricks you into handing over private bits of information such as account usernames, passwords, email addresses, credit-card numbers or Social Security numbers.

The phisher hides from you by using technology pretending to be a trustworthy entity, which can be a well-known company or a workplace colleague. Malware is usually not involved, and there's little personal interaction. The best phishing scams blend into your daily routine so that you never notice anything is wrong.

A report from CyberRiskAlliance has found that 60% of CISOs and other IT managers surveyed cited phishing and spoofing as among their top three email-security concerns, right behind ransomware. 

In the most common scenario, a phisher's email message tells you there's something wrong with one of your accounts and that you need to log in immediately. The message includes what seems to be a link to the account login page but is really a clever mockup. As soon as you type in your credentials, the attacker has them.

Phishing can also be done via SMS text messages and or through voice calls. But phishing email messages are still the primary method of attack.

Targeted phishing attacks aimed at a single person or a small group of people, such as company executives or human-resources or IT staffers and attackers often research their targets beforehand and personalise the malicious messages to make them more likely to succeed.

While anti-spoofing defences will reduce the number of phishing messages that reach your staffers, they won't stop them all. If an attacker gets access to an employee's internal network account, possibly by spear phishing, then they can send phishing emails to other staffers that genuinely come from that employee's account.
Your correspondent once fell for an email that seemed to come from an HR staffer and asked all staffers to address a payroll issue. A link in the message led to what looked like the Office 365 login page. 

Antivirus software blocked the site for some staffers, but other employees weren't so lucky and had their paycheck direct deposits rerouted to other bank accounts.

Aside from anti-spoofing protocols, protections against phishing are numerous. Training  all your organization's employees about how to monitor emails, looking out for phishing attacks and what to do if they fail to detect them is critical.

Social Engineering &  Business Email Comromise (BEC)

Social engineering is a new name for old-school confidence tricks that don't always involve technology. If you've ever talked your way into an exclusive party or event you weren't invited to, that's social engineering. Today, crooks are using high-level social engineering to carry out business email compromise attacks. They impersonate company CEOs or CFOs and convince employees to pay phony invoices or make wire transfers to random bank accounts.

The attacks usually include spoofing and may be facilitated by phishing, but do not generally involve malware; the goal is money.

These BEC attacks can be done in a number of ways, including by sending text messages to staffers after hours or by dialing into video conferences. "In those meetings, the fraudster would insert a still picture of the CEO with no audio, or a 'deep fake' audio through which fraudsters, acting as business executives, would then claim their audio/video was not working properly," said the FBI in its 2021 Internet Crime Report.   

The most common vector for attacks is via email. Often, the attackers compile lists of company employees authorised to make payments, which can be obtained from LinkedIn or company websites. Then the attackers target employees with spoofed emails that seem to come from the boss and demanding urgent wire transfers to a specific companies or bank accounts. If the employees who get the emails believe the scam and can make the payments, then the money may be gone for good.

The FBI estimates that US businesses and individuals lost $2.4 billion to BEC scams in 2021, with losses rising 65% from July 2019 to December 2021. The worldwide cumulative damage since June 2016 reached $43 billion.

 Malware Infection & Ransomware

In 2011, a large information security vendor was struck by Chinese state-sponsored attackers who sent email messages to just a few people in the company, spoofing addresses so that employees appeared ed to be emailing each other. 

Attached to the messages was a Microsoft Excel file that exploited a previously unknown vulnerability in Adobe Flash and gave the attackers full control of the employees' machines.

The attackers used that access to penetrate the vendor's networks and compromise its leading security product, which was used by US defense contractors and thousands of other organisations to protect their networks. The security company had to make good with its clients and took a $66 million charge because of the attack.

Email-delivered malware is perhaps the most dangerous email threat of all. It can deeply penetrate an organisation's systems, quietly stealing information for months or even years. If the goal is money rather than information, then it can install ransomware that locks up those systems and demands payment to free them or steal proprietary data and ransom that too.

Such malware often comes in the form of an attachment that looks innocuous, like an invoice or a resume. The accompanying message may urge that the attachment be opened immediately. In other cases, the message contains a link that takes the recipient to a website that silently tries to install malware through a web browser.

Aside from anti-spoofing measures, the best defenses against email-borne malware are strong end-point protection software that automatically scans all email attachments, regular application and operating-system updates, and strict security policies.

Conclusion

Email is by far the most common way businesses communicate and in the digitised business world it provides an   open door. Even our most sophisticated detection systems can be fooled by a crafted email from a skilled bad actor. 

Ultimately, the final defence layer is the email user. It is the user who reads the email and clicks the link. With better education in spotting rogue emails, and thinking before they click, many users can stop an attack before it even starts.

IC3:      SC Magazine:   Cyber Risk Alliance:

You Might Also Read:    

Phishing - The Game Is Changing:

 

« $3 Million Romance Fraudster Arrested
British Parliament Shuts Down Its TikTok Account »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.