Cofense Email Security

How Phishing Poses a Threat to Your Business

Definition of a Phishing Threat

The definition of a phishing threat is any attempt to fraudulently solicit personal information from an individual or organization, or any attempt to deliver malicious software (malware), by posing as a trustworthy organization or entity. Threats are most commonly delivered by email, as in the online banking example given below, but they can also manifest as advertisements on genuine websites that have had security vulnerabilities exploited.

A Few Types of Phishing Emails:

  • Urgent or Billing Phishing: A phishing email attack that attempts to mimic a real business in order to trick victims into visiting a malware-infected site. Fictitious power bills or urgent, credit card fraud notices are common templates for a deceptive phishing email.
  • Spear-Phishing: Attacks are generally more dangerous than regular phishing because spear-phishing emails are tailored to attack a specific individual, department or company.
  • Whale Phishing: The main goal is to gain the credentials of top-level executives. While similar to spear-phishing, whale phishing or executive phishing is much more personalized to the target and damaging to the company.

The definition of a phishing threat given above differs slightly from the definition provided by the United States Computer Emergency Readiness Team (US-CERT). That organization´s definition of a phishing threat implies that phishing attacks online are always the result of social engineering. This is not necessarily the case, as some attacks – such as “watering hole” attacks – have become so sophisticated that social engineering is not always necessary for cybercriminals to extract sensitive data or install malware.

Phishing Threats to Your Business

Phishing Threats to Operations
Regardless of whether an employee is doing their online banking or research for a work project, if they access a fake phishing website from their work computer, and download executable malware, the organization´s entire network could be infected. Depending on the nature of the malware, data could be compromised, stolen or encrypted into a format that makes it unusable until a ransom is paid.

Phishing Threats to Data
Phishing threats to data apply whether an employee is responding to a phishing email about their bank account or to any account that requires a login and password – not just e-commerce websites, but also personal email and social media accounts. The consequences of a successful phishing attack on an organization may take years to become apparent, which is why phishing threats to data should be taken seriously and measures implemented to manage the threats.

Spear Phishing Threats
Spear phishing threats are often more successful than random phishing threats due to the victim(s) being specifically targeted by the cybercriminal. The attacker finds personal details of their victim (such as appear on social media profiles) and creates a convincing phishing email that appears realistic because of its content. The massive data breaches at Target, Anthem and Sony Pictures have all been attributed to successful spear phishing attacks.

Ransomware
The delivery of ransomware via email is one of the most serious of all current phishing threats. Ransomware is the easiest form of malware to monetize and there has been a noticeable increase in ransomware attacks on mobile devices and on cloud-based applications which get shared with internal and external users (44% of cloud malware types make up the most common delivery vehicles for ransomware).

How to Prevent Phishing Threats in an Organization

With there being so many different and sophisticated types of phishing attacks online, managing phishing threats in an organization is a colossal task. Technology can help manage threats to a degree, but enough phishing emails avoid detection to make the activity of phishing still worthwhile for cybercriminals.

Simulations of Phishing Threats Makes Perfect
How can you affect lasting changes in user behavior around phishing threats? Rather than rote training, engaging users by simulating real-life phishing threats drives the point home. Just as fighter pilots train in flight simulators, users can learn by experiencing a simulated phishing threat in a controlled environment.

Mixing an occasional simulated phishing threat into users’ regular email teaches them to stay alert and spot suspicious emails. Whether they click on the simulated phish, or spot and report it to incident responders, the experience is much more likely to leave a mark compared to sitting through a lecture about security.

Users experience phishing threats in terms of how they look and act – how a malicious payload infiltrates a system, spreads across the network, disrupts operations, and steals data. Next time, they will be more attuned to a suspicious email See Something, Say Something

Recognition is the first step in the battle against phishing threats. Conditioning users to identify phishing emails will reduce the chances they will fall for a real phishing threat. However, the chances are, if one employee is receiving phishing threats through emails, others are as well. Organizations must encourage users to report suspicious messages, including emails, texts or phone calls, to security or incident response teams.

Users who recognize potential phishing threats provide a valuable source of internal, real-time attack and threat intelligence. When they report suspicious emails, incident responders obtain information that they would not have otherwise received or received too late. This internal ‘crowdsourcing’ is especially beneficial with phishing, as it’s the most common attack method.

Overloading the Security Operations Center
A natural complication of internal reporting is to overwhelm security teams with potentially harmful emails and false positives. Being able to quickly identify which reports are more reliable than others is critical to lessening the chance of a breach from a phishing email and a factor when implementing a solution to mitigate phishing threats.

Employee-sourced reports on attacks in progress provide incident response teams and security operations analysts with the information needed to rapidly respond to potential phishing threats and mitigate the risk from those that may fall prey to them. Being able to sort, assess and respond quickly is critical to stopping a phishing breach and mitigating business disruption.

Ultimately, an end-to-end phishing threat mitigation approach is a critical foundation for any security program’s phishing threat management strategy. Instead of just being the target, the workforce becomes cybercrime sensors – sounding the alarm and keeping the organization safe by providing the information SOCs need for managing phishing threats quickly and effectively.

End-to-End Phishing Mitigation from Cofense

Cofense is a testament to this working process.  Cofense has conditioned our own workforce to recognize and report phishing attempts – gathering phishing attack intelligence from our entire employee base. By analyzing these emails, Cofense has avoided compromise as well as discovering and publishing malware samples well before other leading threat intelligence providers.

Even with record investment in cybersecurity, the number of breaches attributed to phishing attacks continues to grow. It’s obvious that technology alone can’t solve the problem. That’s why Cofense solutions focus on engaging the human – your last line of defense after a phish bypasses other technology – for better prevention and response. Contact us today. 

Learn more about phishing detection and response?

Explore our Resource Center for our latest content

Explore our database of phish found in environments protected by SEGs

Share This Article
Facebook
Twitter
LinkedIn

Download our latest Phishing Review to learn about threat landscape trends.

Search

We use our own and third-party cookies to enhance your experience. Read more about our cookie policy. By clicking ‘Accept,’ you acknowledge and consent to our use of all cookies on our website.