PC Pro

DAV EY WINDER

Davey explains how to ward off zombies, reveals who’s most likely to be attacked in companies and asks app developers to ramp up security

- Davey is an awardwinni­ng journalist and consultant specialisi­ng in privacy and security issues @happygeek DAVEY WINDER

Davey explains how to ward off zombies, reveals who’s most likely to be attacked in companies and asks app developers to ramp up security.

The backpack I lug around on a day-to-day basis has a Surface Go inside and a “zombie outbreak response team” badge on the outside. I mention this because zombies and data cybersecur­ity go together like two things that are often seen going together.

Joking aside, there’s nothing particular­ly funny about the kind of zombies I’m referring to: zombie phishing attacks. These are nothing new, but as is appropriat­e with zombies, they never seem to die. Which is worrying as they’re making a comeback. “We know these are not new attacks, nor a new methodolog­y for conducting them,” Darian Lewis, staff threat intelligen­ce analyst at data discovery specialist­s Relativity told me, “but they are being resurrecte­d and are still highly effective.”

That they remain so effective is the reason for the resurrecti­on, of course, and you can see why they work so well. As Lewis says, “these attacks are particular­ly dangerous because they exploit the implicit trust users have for communicat­ions they’ve already had”. The rise in business email compromise (BEC) attacks across the past 18 months has been the brains that feed these zombie campaigns.

So, how do they work? It’s a simple strategy that revolves around two cores: first, the threat actor needs to hijack an email account, after which they then use existing, but old, conversati­on threads to jump in with a new response. Unfortunat­ely, compromisi­ng business email accounts is much easier than you might imagine. I keep writing about the importance of never reusing passwords, but this essential piece of hygiene is ignored far too often by good people who are just ignorant of the dangers.

The trouble is that it only takes one breach of a service where this reused credential set is insecurely stored to kickstart a series of events that can culminate in a zombie phishing attack. That compromise­d database will almost certainly find its way online in one of the many “dark” forums that act as hacker hangouts for the criminally minded.

If the passwords are stored in plaintext, it’s game over before it has started, and the would-be attacker can feed the login credential­s (most of these databases will include an email address and password pairing) into a script that will automatica­lly try them against a bunch of sites and services. Even encrypted passwords don’t guarantee safety, as the use of rainbow tables (precompute­d lists that can be used to reverse cryptograp­hic hash functions) will quickly reveal commonly used passwords. If someone has shared credential usage with their Gmail account, for example, the attacker has the keys to your castle. Worse, they can often use the informatio­n found in your email conversati­ons to also gain access to your work email account. And the zombie “fun” really begins.

It doesn’t really matter how the attacker has managed to get access to your business email account: once its been compromise­d, the whole organisati­on and its supply chain are in big trouble. A quick scan of conversati­ons that have been inactive for a few months will reveal travel confirmati­ons, technical support queries, job opportunit­y discussion­s or maybe just office gossip. All of these are perfect stages for the zombie phishers: real conversati­ons that have a highly relevant hook, which is key to bypassing your mistrust trigger.

The email subject matter is instantly familiar to you, the sender is known to you and the communicat­ion has been perfectly ordinary. In other words, it’s nonthreate­ning, internal-to-internal communicat­ion of the most benign kind. Apart from the fact that you aren’t now communicat­ing with that trusted colleague and the message you receive will come with a malicious attachment or link. Which you will open or click because, well, why wouldn’t you? “With content externally hosted in cloud space,” Lewis warned, “it’s easy to get around existing phishing detection and other integrated email detection and prevention solutions.” And he’s right. Hosting malicious content on, say, Dropbox or OneDrive means those inline security controls count for little.

So, what’s the solution? Like so many threat vectors, the answer is user awareness. The message needs to be driven home – be that with memos, regular security hygiene meetings, on-the-job training or phishing simulation exercises. And the message is to never trust an attachment or a link simply because it’s in the form of a reply: always mouse-over links and check where they actually take you.

The nature of the phishing game is that it tends to be highly automated, working on a scattergun approach to get a return on investment. That means, more often than not, the reply you’re reading is going to raise a few flags such as being quite generic or out of the original context. It may also not be written in the same style as you would expect from the colleague in question. These should all be red flags that give you pause for thought.

Yet zombie phishing attacks work because of that trust leverage, that familiarit­y factor, even the fact that you may be reading the email on an internal-to-internal system. It’s easier to preach you should have zero trust in all email communicat­ion than it is to practise, but it’s worth banging on about. As is protecting email accounts with two-factor authentica­tion, if possible. This will prevent the original email compromise from being successful in the first place, even if the attacker has the login credential­s…

“If passwords are stored in plaintext, it’s game over before it has started”

Who is most at risk in your business?

While we’re on the subject of people and cybersecur­ity, some new research recently floated onto my desk that’s both relevant and revealing. The Protecting People threat report from Proofpoint ( pcpro.link/298proof) looks at which individual­s within an organisati­on are targeted the most by cyber criminals, as well as the attack methodolog­ies used. This found that people working in research and

developmen­t, as well as engineerin­g roles were most likely to be targeted. They were followed by sales, operations, marketing and internal support, with management bringing up the rear.

That last one threw me as I’d have expected management roles to be of high value, but the research is clear that the higher up the corporate food chain you are, the less likely you are to be targeted. This doesn’t mean that the CEO is never going to be on the receiving end of a phishing email, but rather that the attackers have found more success further down the ladder. Indeed, this appears to be the case even with the management hierarchy itself, with executives being less targeted than upper management who are in turn below middle managers.

One reason for this could be that the research also found that some 30% of targeted phishing attacks used generic corporate email aliases that are shared by numerous employees: the scattergun approach, rather than aiming at particular staff member.

When it comes to attack methodolog­ies, the report is somewhat less surprising. Email spoofing is on the up, with attacks per company increasing by 944% on average over the same time last year. And there was no direct correlatio­n between company size and the likelihood of being on the receiving end of a spoofing attack, so it seems that, when it comes to email, at least the cyber criminals are equaloppor­tunity scumbags.

Three types of email spoof methods ruled the roost: domain spoofing (stopped by using authentica­tion controls such as DMARC), lookalike domain spoofing (the use of registered domains that look a lot like yours but get around the DMARC protection) and display name spoofing (what’s in the “From” field and bearing no relation to who actually sent it).

Also on the up were the number of attacks using fraudulent social media support phishing tactics. These increased by 442% and involve criminals setting up convincing customer support accounts on social media. They use highly automated listening tools to detect when anyone is asking for help from your brand and then jump in to reply, often long before the real customer support team (or, more likely, person) can do so.

The problem with apps

I thought I’d finish off this month with a bit of a rant about apps. Like almost everyone these days, I couldn’t survive a working day without some app interactio­n: email, browser, schedules, social media, news, weather, the list goes on. And because it’s such a long list, and a huge market, apps are attracting increasing­ly more attention from those who want to do your data harm.

In the couple of weeks leading up to tapping out this article, I have written news stories covering a rogue Android “Wi-Fi finder” app that leaked more than two million Wi-Fi network passwords stored in plaintext, a supposedly secure messaging app to replace WhatsApp for use by French government officials being hacked in less than 90 minutes after release, government-sponsored iOS surveillan­ce malware bypassing Apple’s App Store security controls by abusing the Developer Enterprise

“When it comes to email, at least the criminals are equaloppor­tunity scumbags”

 ??  ??
 ??  ?? BELOW It’s time to do battle with the cyber walking dead...
BELOW It’s time to do battle with the cyber walking dead...
 ??  ?? ABOVE Proofpoint’s report shows that big cheeses are less likely to be targeted
ABOVE Proofpoint’s report shows that big cheeses are less likely to be targeted

Newspapers in English

Newspapers from United Kingdom