Whaling. Anatomy of an attack - Whaling. Anatomy of an attack - Vox

Page created by Michelle Barrett
 
CONTINUE READING
Whaling. Anatomy of an attack - Whaling. Anatomy of an attack - Vox
Whaling.
Anatomy of an attack.

Whaling.
Anatomy
of an attack.
Protecting your organisation
from CEO email scams.
Whaling. Anatomy of an attack - Whaling. Anatomy of an attack - Vox
It’s no secret that social engineering attacks, including phishing, spear-phishing and
whaling, have grown from a nuisance to a colossal problem. A growing list of companies
have been hit by these methods — sometimes to the tune of millions of dollars in data or
financial losses.

  THE FIVE PHASES OF A WHALING ASSAULT

         1. In the crosshairs                                       4. Victim’s assistance
         Cyber thieves frequently rely on social media              To the target, the email looks authentic - and
         sites, such as LinkedIn™, to gather details about a        prompts for the specific action or transaction
         high-level executive to impersonate, along with a          leading to a loss. The request usually has a
         lower-level target. The target is typically a controller   sense of urgency and it may request that the
         or human resources executive with the authority to         individual bypass normal procedures.
         request a financial transaction or send data without
         additional approvals.                                      26% of organisations had
                                                                    experienced loss of confidential
          82% of South African organisations                        data because of an email-based
          have seen whaling attacks                                 impersonation attack in the past
          (impersonation of their CEO or                            12 months.4
          other executives) asking for money,
          sensitive information, intellectual                       5. On the money
          property or login credentials.1                           In most cases, cyber thieves impersonating a

          2. The domain game                                        high-level executive request a wire transfer or
                                                                    for the recipient to send tax data containing
   www
         Crooks register a domain that appears similar to           personal employee information, such as
         the actual domain for a company. For instance,             IRP5s, and personal and financial tax return
         testcompany becomes “testconpany” or                       information.
         “testcornpany.” This creates potential confusion.
         The busy target may not notice the fake domain.

         80% of SA organisations have
         witnessed impersonation fraud in
         which the attacker registered similar
         domains using Punycode or other
         similar looking letters and characters
         for the sending domain.2
         3. Gone phishing
         The recipient receives an email message with his or
         her name on it, as well as other details that make it
         look authentic. This includes relevant details about
         the impersonated executive and likely, a specific
         business initiative.

         72% of whaling attackers pretended
         to be the CEO, while 36% were
         attributed to the CFO.3

                                           77% of South African
                                           organisations don't have
                                           email security policies/
                                           tools (DMARC) currently
                                           in place to help protect
                                           against email spoofing.5
                                                                                                      Page 1
HOW BIG IS THE PROBLEM?

                                                      51%
Messages appear highly credible. They are well
researched using social engineering techniques
that exploit the natural human tendency to trust
and be helpful. Messages use the right names,
correct titles and have very similar-looking
domain names. They are custom-written to
avoid spam filters.                                  of SA organisations say it
They appear to originate from the CEO, CFO
                                                     is likely they will suffer a
or another senior executive and often request        negative business impact
immediate action. They’re almost always under       from an email-borne attack
the amount or threshold required for a second
signature. In some cases, impersonation                 in 2019. 7% say it is
messages are sent by thieves when a key                       inevitable.6
executive is on vacation - making an external
or unknown domain name seem legitimate.

The targeted company lacks essential
authentication and controls, such as a second
signature or sign-off on key transfers or
transactions. Or, the recipient ignores key
procedures for fear of raising the ire of the CEO
                                                      51%
or CFO. In many instances, employees are duped
into thinking that checking on a transaction
might slow things down and derail a key deal.        of SA organisations do
                                                    not currently have a cyber
                                                      resilience strategy in
                                                              place.7

       Organisations may lack
          essential security
        safeguards, including
       endpoint security, data                      34% of organisations
        encryption and email                        believe their CEO
       gateway technology to                        undervalues the role of
      identify suspicious email.
                                                    email security to protect
                                                    their organisation.8

                                                                           Page 2
ATTACKS IN MOTION

A few examples of large international companies that have
fallen victim to whaling attacks:
FACC:                                              Ubiquiti Networks:
The Austrian aircraft industry supplier lost 50    The high-performance networking tech
million euros ($57.6 million), reportedly due to   company suffered a $39.1 million loss as a
a whaling attack. Its stock fell 17% after the     result of a whaling attack. The San Jose-based
breach became public.9                             firm has recovered only a portion of the sum.12

Seagate:                                           Weight Watchers International:
A successful whaling attack landed thieves up      A whaling email allowed thieves to obtain
to 10,000 W-2 tax documents for all current        tax data for nearly 450 current and
and past employees.10                              former employees.13

Snapchat:
An employee fell for an email impersonating
a request from CEO Evan Spiegel and
compromised payroll data for 700 employees.11

Success Story
Specialty recruitment firm Athona Ltd. based in the U.K., used Mimecast’s Impersonation
Protect cloud-based antiwhaling service to identify and block whaling emails - without
generating false-positives. This helped protect the firm’s reputation and reduced the risk
of disruption and data theft.

                                                                                       Page 3
SIX WAYS TO HARPOON THE THIEVES

      1. Educate and inform employees
      Coach key employees to recognize an                  Social engineering attacks,
      impersonation email and what steps to take           including whaling, are
      to avoid falling victim to thieves. Train them       increasing rapidly. Through a
      to pick up the phone and verify a                    combination of awareness,
      large transaction.                                   simulations, technology, and
                                                           better internal
      2. Use simulations                                   systems and processes,
      An effective method for detecting                    it’s possible to dramatically
      weaknesses and raising awareness is the use          reduce risks and build a
      of real-world testing. This takes the form of a      cybersecurity foundation
      phishing message that is intentionally sent to       that better protects your
                                                           organisation from financial
      key individuals in the organisation.
                                                           and data loss.
      3. Make faking messages difficult
      Customised stationery and unique identifiers
      in messages, as well as periodic changes
      in design, make it more difficult for cyber
      thieves to create convincing-looking emails.

      4. Tap technology
      An effective method for thwarting thieves is
                                                            Over 90%
      Targeted Threat Protection - Impersonation
      Protect, which is advanced email gateway
      technology that identifies and, if desired,
      quarantines suspicious messages through
      the use of names, domains and keywords.                   of cyberattacks begin
                                                                with email, and social
      5. Stay alert                                             engineering-led email
      Monitoring, Threat Intelligence and alert                 attacks are growing
      services that notify organisations when                   rapidly.15
      a new or different threat exists are also
      valuable. In today’s fastmoving cybersecurity
      environment, hours and even minutes matter.

      6. Rethink procedures
      It may be necessary to change authentication      21% of SA organisations
      and approval methods by adding a second           have suffered direct
      signature or lowering the monetary amount         financial loss because
      required to trigger secondary approval.           of an email-based
      Multilevel authentication and approvals can
      greatly reduce risk.
                                                        impersonation attack in
                                                        the past 12 months.14

                                                                              Page 4
MIMECAST IMPERSONATION PROTECT

Mimecast Impersonation Protect is an
essential layer of email security
Visit vox.co.za to learn more about the Targeted Threat Protection
service to protect your organisation against catastrophic data and
financial losses.

About Mimecast                                                                  Whaling — derived from
Mimecast is a cybersecurity provider that helps thousands of organisations      an analogy with a big
worldwide make email safer, restore trust and bolster cyber resilience.         “phish” — is particularly
                                                                                threatening because it’s
Known for safeguarding customers against dangerous email, Mimecast’s
                                                                                both highly deceptive and
expanded cloud suite enables organisations to implement a comprehensive
cyber resilience strategy.                                                      damaging.

From email and web security, archive and data protection, to awareness          A cyber-criminal,
training, uptime assurance and more, Mimecast helps organisations stand         disguised as the CEO, CFO
strong in the face of cyberattacks, human error and technical failure.          or other senior executive,
                                                                                typically sends an email
Our customer engagement teams and Security Operations Centre
help organisations of all sizes with proactive support and actionable           message to a recipient
intelligence. Our easy to use and deploy cybersecurity platform with open       and convinces this person
APIs, makes customers’ existing investments more valuable and teams             to initiate a wire or data
smarter.                                                                        transfer. These attacks
                                                                                are also referred to as
The collective intelligence gathered across our global customer base and
                                                                                impersonation
strong partner network provides a community defense that helps make
the world a more resilient place.                                               attacks or business email
                                                                                compromise attacks.
www.mimecast.com

Sources
1. Mimecast and Vanson Bourne, ‘The State of                Email Security 2018," 24 July 2018
   Email Security 2019," 29 May 2019                    9. ComputerWeekly.com, “$54m cyber fraud hits
2. Mimecast and Vanson Bourne, ‘The State of                aircraft supplier share price,” Jan. 22, 2016
   Email Security 2019," 29 May 2019                    10. KrebsonSecurity, “Seagate Phish Exposes All
3. Mimecast Blog, "Whaling warning for 2016,"               EmployeeW-2’s,” March 16, 2016
   Dec. 23, 2015                                        11. CNN.com, “Snapchat employee fell for phishing
4. Mimecast and Vanson Bourne, ‘The State of                scam,” Feb. 29, 2016
   Email Security 2019," 29 May 2019                    12. CSO, “Ubiquiti Networks victim of $39 million
5. Mimecast and Vanson Bourne, ‘The State of                social engineering attack,” Aug. 6, 2015
   Email Security 2019," 29 May 2019                    13. MSN.com, “Tax Forms: Cybertheft Schemes on
6. Mimecast and Vanson Bourne, ‘The State of                the Upswing,” April 4, 2016
   Email Security 2019," 29 May 2019                    14. Mimecast and Vanson Bourne, ‘The State of
7. Mimecast and Vanson Bourne, ‘The State of                Email Security 2018," 24 July 2018
   Email Security 2019," 29 May 2019                    15. CSO Online, "Top cybersecurity facts, figures and
8. Mimecast and Vanson Bourne, ‘The State of                statistics for 2018," Oct 10, 2018

                                                                                                     Page 5
About Vox
Innovation and insight combine in Vox, a market leading end-to-end integrated ICT and telecommunications company. We
have an enviable track record of meeting the needs of thousands of consumers, SMEs, large corporates, and public sector
organisations. Thanks to our dedicated staff of more than 1 500 people – and our several hundred business partners
countrywide – we set the benchmark for service delivery by connecting people through best-of-breed technology.

From data to voice, as well as cloud, business collaboration and conferencing tools, Vox offers intelligent solutions that
connect South Africans to the world, supporting entrepreneurs, customers and commerce, whilst practicing values of
integrity, choice and service excellence in all of its dealings.

For more information on complementary or
alternative products, visit us at vox.co.za
New Business Sales JHB : +27 (0) 87 805 5050
Consumer Support : +27 (0) 87 805 0530
Business Support : +27 (0) 87 805 0500
Email: info@voxtelecom.co.za
You can also read