Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

2/15/2017
08:40 PM
Connect Directly
Facebook
Twitter
RSS
E-Mail
100%
0%

Clinton Campaign Tested Staffers With Fake Phishing Emails

Campaign stressed good IT hygiene, according to manager Robby Mook, who said the fake phishing emails were used to gauge effectiveness of security training for staffers,

RSA CONFERENCE – San Francisco – Email leaks notwithstanding, Hillary Clinton's campaign manager Robby Mook says the campaign conducted regular security training for staffers, which included sending fake phishing emails to campaign staffers to see how they'd be handled.

"We sent out phishing emails of our own to test people and communicate back to team to see how far they were clicking, to educate people, and show their vulnerability and how much their choices matter," Mook said in an interview at RSA Conference. He recalls at least three faux-phishing tests, adding there may have been more.

Mook says the campaign also emailed staffers regularly about good IT hygiene. "We had signs up in the bathrooms about not sharing passwords and 'Don't click on that link, stop and think'," Mook says. Staff meetings also included regular security updates from the campaign's IT director, he adds.

Mook made the rounds at the RSA Conference here this week, speaking about user vulnerability to inside attacks and speaking at the Global Insider Threat Summit sponsored by security vendor Dtex Systems.

Mook also wants to make clear that it was the Democratic National Committee's servers that were hacked, not those of the Clinton campaign. The distinction is important; the campaign suffered from emails that were leaked from personal email accounts, notably, those from candidate Clinton, campaign chairman John Podesta, and other staffers. Hackers may have been helped by real phishing emails that Podesta or other users clicked on, and ultimately gave up addresses and passwords.

The DNC, separate from the Clinton campaign, had its servers hacked sometime in 2016; WikiLeaks published excerpts in July.

"We reminded people to keep [campaign] information out of their personal accounts," Mook told Dark Reading. And they tried to encourage use of two-factor authentication and stronger passwords. The campaign also encouraged people to use texting when they didn't want something showing up in email, Mook says.

What happened to the Clinton campaign wasn't the result of malicious insiders but rather staffers clicking on a bad link, and the organization's inability to mitigate an inside threat, Mook adds.

Some 68% of breaches can be traced back to some kind of employee negligence, says Dtex CEO Christy Wyatt. Her company teamed with Ponemon Research on a study called 2016 Costs of Insider Threats that surveyed 240 IT and security professionals.

But whether it's a national political campaign, state or local governments or even SMBs, there's not enormous sensitivity to the threat level that cyberattacks pose, Mook says. "Campaigns are money-strapped and security got pushed down - but that won't be the case in the future," he adds.

Political figures are vulnerable and prone to these sorts of online attacks. "They need to plan for the most aggressive attacks," Mooks says.

Had the DNC been outfitted with a more robust system to monitor for inside threats, they may have caught the breach sooner, Mook claims. "The potential to disrupt like the Russians did is huge. We have to take steps to prevent that sort of thing from happening again."

Mook believes there's genuine bipartisan interest in security, pointing across the aisle to recent comments from Republican Senators John McCain, Mike McCall, and Marco Rubio. "If anyone is concerned about this, it's politicians themselves," Mook says. "They understand they may be the ones hurt tomorrow" by careless insiders, bad actors, and breaches.

Related Content:

Save

Save

Save

Save

Save

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
ClarenceR927
50%
50%
ClarenceR927,
User Rank: Strategist
2/16/2017 | 9:35:32 AM
What a Surprise!
We test too. Naturally we are not allowed to send our test phish upstream in the coproration as it would be embarassing for the executives to get caught.  I wonder if Podesta as also skipped on the tests.
jries921
50%
50%
jries921,
User Rank: Ninja
2/16/2017 | 11:55:42 AM
Re: What a Surprise!
If the practice really does have management support, then senior managers won't be exempted.  If John Podesta was exempted, I'm sure he regrets it now.
T Sweeney
100%
0%
T Sweeney,
User Rank: Moderator
2/16/2017 | 1:44:01 PM
Re: What a Surprise!
I understand wanting to protect the egos of execs, but at the expense of the organization's security?

Is the assumption, then, that your execs open all their email (unlikely) and click on all links (very unlikely)?

Separately, I'd love to know how common this practice is of sending fake phishing emails to test training effectiveness, and what other conditions get used in the exercise.
tompendergast
100%
0%
tompendergast,
User Rank: Author
2/17/2017 | 10:48:51 AM
Re: What a Surprise!
Good article, thanks. I'm convinced that it's the combination of simulated phishing, relevant training, and persistent reinforcement that is the key to building up human capacity. It sounds like this group did it right. 
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
2/20/2017 | 5:30:13 AM
Re: What a Surprise!
@Terry: I'm aware of at least one situation in which fake phishing emails were sent within a major organization explicitly warning users "DO NOT CLICK ON THIS LINK" and explaining that it was an example of a phishing email.

10% of the users still clicked -- including one C-suiter.

The C-suiter's justification for clicking?  "I wanted to see what would happen."
ChispaTD
50%
50%
ChispaTD,
User Rank: Apprentice
2/21/2017 | 3:45:12 PM
Re: What a Surprise!
I'm not surprised. The fastest way to get someone to do something, especially an exec, is to tell the person not to do it. 
ChispaTD
50%
50%
ChispaTD,
User Rank: Apprentice
2/21/2017 | 3:29:26 PM
Re: What a Surprise!
I'd like to know that as well. How effective is it to run these tests if it's not rolled out across the entire organization?
kasstri
100%
0%
kasstri,
User Rank: Strategist
2/16/2017 | 5:43:48 PM
keyboard
This is really a nice post. Thanks for sharing this us.
mikeroch
50%
50%
mikeroch,
User Rank: Apprentice
2/20/2017 | 9:59:30 AM
Email phishing for 192.168 0l 1
Email phishing is hell, it should not be executed at any cost.
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
CVE-2019-12400
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
CVE-2019-15092
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.