News

4/9/2016
08:00 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

The 8 Most Convincing Phishing Schemes Of 2016

The year is young and high-profile phishing attacks keep coming seemingly every week. Here are eight reasons why security pros have to get serious about combating phishing.
Previous
1 of 9
Next

It’s only mid-April, yet there is no shortage of convincing phishing schemes to highlight for 2016.

Gartner reports that one in every 4,500 emails today is a phishing attack, threats that rely on social engineering to gain illicit access to personal and corporate assets.

Aaron Higbee, co-founder and CTO of PhishMe.com, says that this year’s crop of phishing attacks center around three main types:

  • CEO fraud, where scammers who claim to represent legitimate third parties try to get administrative people to believe that the CEO has authorized a wire transfer for thousands, or in some cases millions, of dollars.
  • Tax schemes, where phishers aim to get administrative people, claims adjusters at insurance companies, or auditors, to send employee W-2s. The W-2s have social security numbers and other PII that lead criminals to the personal bank accounts of employees.
  • Fraudulent IRS sites, where users are duped into thinking that the IRS sent them an email requesting more information. These attacks are especially infuriating to experts because the IRS would never send such an email to a taxpayer. 

“What’s happened is that all the techniques that security people have used in the past, such as sandboxes or combing URLs in a body of email, simply don’t work anymore,” Higbee says. “In many of these cases, the criminals bypass all the technical controls and exploit human factors, such as following up an email with a phone call to prove they are legitimate.”

Brian Reed, a Gartner analyst who focuses on data security, adds that the latest phishing scams have gotten increasingly sophisticated. Criminals are doing their homework, he says, finding out who has responsibility at companies for wire transfers and who in the chain is the most vulnerable to a phishing scam.

“These emails are not blindly sent from a fictitious Royal Prince with numerous misspelled words or other obvious errors in the message body,” he says. “They are done by criminals who have studied the inside of these organizations, understand how organizations communicate, and have combed social media to gather information about specific people to target at companies.”

Higbee adds that in many cases, the phishing scams still emanate from West Africa, but today they are major criminal operations.

“Some have even gone so far to set up entire call centers to study companies and follow up with phone calls,” Higbee says. “We’re finding that many of the prospects evaluating our solutions are demoralized. They’ve put every security control they know in place yet they still fall prey to these phishing scams.”

The following phishing schemes we highlight here represent the most egregious of these three type of phishing cases.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 9
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
nathanwburke
100%
0%
nathanwburke,
User Rank: Author
4/13/2016 | 6:17:55 AM
Re: These problems were all preventable
Security awareness training can help, but that is also just one piece of a comprehensive security plan that includes the triumvirate of People, Process and Technology. Security awareness training can help with the People component, making employees more cognizant of the low-level, commodity attacks that use emails with attachments and links to compromised sites. 

However, this only applies to the obvious. Don't download and run applications from attachments. Don't click links in emails from people you don't know.  The problem is that many attacks are more sophisticated. In some cases, the phishing attack comes from a compromised email address using language that mimics the hacked sender. In those cases, all of the awareness training available will likely fail.

Creating a Process for flagging potentially malicious activity and quickly removing any threat organization-wide is key to reducing risk of threats introduced accidentally (despite awareness training). Having Technology in place to identify and remediate obvious threats is essential to keeping this process timely and scalable.

Awareness training is important, but simply telling people not to do the obvious isn't enough anymore.
Dan Euritt
50%
50%
Dan Euritt,
User Rank: Apprentice
4/11/2016 | 10:39:10 AM
These problems were all preventable
All companies should be conducting awareness training on these issues, and this article looks like a great place to start. Thanks for posting it up.
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.
CVE-2018-20154
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated users to discover all subscriber e-mail addresses.
CVE-2018-20155
PUBLISHED: 2018-12-14
The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated subscriber users to bypass intended access restrictions on changes to plugin settings.