News

4/9/2016
08:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

The 8 Most Convincing Phishing Schemes Of 2016

The year is young and high-profile phishing attacks keep coming seemingly every week. Here are eight reasons why security pros have to get serious about combating phishing.
Previous
1 of 9
Next

It’s only mid-April, yet there is no shortage of convincing phishing schemes to highlight for 2016.

Gartner reports that one in every 4,500 emails today is a phishing attack, threats that rely on social engineering to gain illicit access to personal and corporate assets.

Aaron Higbee, co-founder and CTO of PhishMe.com, says that this year’s crop of phishing attacks center around three main types:

  • CEO fraud, where scammers who claim to represent legitimate third parties try to get administrative people to believe that the CEO has authorized a wire transfer for thousands, or in some cases millions, of dollars.
  • Tax schemes, where phishers aim to get administrative people, claims adjusters at insurance companies, or auditors, to send employee W-2s. The W-2s have social security numbers and other PII that lead criminals to the personal bank accounts of employees.
  • Fraudulent IRS sites, where users are duped into thinking that the IRS sent them an email requesting more information. These attacks are especially infuriating to experts because the IRS would never send such an email to a taxpayer. 

“What’s happened is that all the techniques that security people have used in the past, such as sandboxes or combing URLs in a body of email, simply don’t work anymore,” Higbee says. “In many of these cases, the criminals bypass all the technical controls and exploit human factors, such as following up an email with a phone call to prove they are legitimate.”

Brian Reed, a Gartner analyst who focuses on data security, adds that the latest phishing scams have gotten increasingly sophisticated. Criminals are doing their homework, he says, finding out who has responsibility at companies for wire transfers and who in the chain is the most vulnerable to a phishing scam.

“These emails are not blindly sent from a fictitious Royal Prince with numerous misspelled words or other obvious errors in the message body,” he says. “They are done by criminals who have studied the inside of these organizations, understand how organizations communicate, and have combed social media to gather information about specific people to target at companies.”

Higbee adds that in many cases, the phishing scams still emanate from West Africa, but today they are major criminal operations.

“Some have even gone so far to set up entire call centers to study companies and follow up with phone calls,” Higbee says. “We’re finding that many of the prospects evaluating our solutions are demoralized. They’ve put every security control they know in place yet they still fall prey to these phishing scams.”

The following phishing schemes we highlight here represent the most egregious of these three type of phishing cases.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
nathanwburke
100%
0%
nathanwburke,
User Rank: Author
4/13/2016 | 6:17:55 AM
Re: These problems were all preventable
Security awareness training can help, but that is also just one piece of a comprehensive security plan that includes the triumvirate of People, Process and Technology. Security awareness training can help with the People component, making employees more cognizant of the low-level, commodity attacks that use emails with attachments and links to compromised sites. 

However, this only applies to the obvious. Don't download and run applications from attachments. Don't click links in emails from people you don't know.  The problem is that many attacks are more sophisticated. In some cases, the phishing attack comes from a compromised email address using language that mimics the hacked sender. In those cases, all of the awareness training available will likely fail.

Creating a Process for flagging potentially malicious activity and quickly removing any threat organization-wide is key to reducing risk of threats introduced accidentally (despite awareness training). Having Technology in place to identify and remediate obvious threats is essential to keeping this process timely and scalable.

Awareness training is important, but simply telling people not to do the obvious isn't enough anymore.
Dan Euritt
50%
50%
Dan Euritt,
User Rank: Apprentice
4/11/2016 | 10:39:10 AM
These problems were all preventable
All companies should be conducting awareness training on these issues, and this article looks like a great place to start. Thanks for posting it up.
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
NC Water Utility Fights Post-Hurricane Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.