Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/11/2017
01:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Phishing Emails that Invoke Fear, Urgency, Get the Most Clicks

The most commonly clicked phishing emails include urgent calls to action, or exploit victims' desire for popularity.

If an employee receives an email about a data breach, chances are they're going to click. If an "important" or "urgent" message arrives from human resources, they're going to want to know why. If an email warns their password is about to expire, they will investigate further to change it.

Hackers know this, which is why they have begun to prey on victims' sense of urgency in phishing attacks. The most effective phishing email subject lines include psychological triggers to get people to click, discovered security awareness firm KnowBe4 in a study of most-clicked phishing email subject lines for Q3 2017. After all, nobody wants to miss an important message from HR.

Sophisticated phishing emails are behind more than 90% of successful cyberattacks, said Mike Rogers, former chairman of the House Intelligence Committee, at the US Chamber of Commerce's cybersecurity summit. Phishing has increased potential to dramatically affect a business' economic loss.

"When you look at the top five items, four out of those five have words like 'expires,' 'immediately,' 'notification,'" says Greg Kras, KnowBe4's chief success officer. "They're all designed to get that sense of urgency. When people see that, they go into corrective action overflow where they're trying to address what they consider to be a problem."

It's common for attackers to prey on fear. Four years ago, says Kras, attackers would never have used "data breach" to spark concern because general users didn’t know what they were. Now with breaches regularly making headlines, more people know they're dangerous. Human resources notifications are effective because they provoke the same sense of urgency.

The most-clicked general email subject lines, and attacks in the wild, for Q3 were designed to provoke a sense of urgency or reward, according to KnowBe4's findings:

  • Official Data Breach Notification (14%)
  • UPS Label Delivery 1ZBE312TNY00015011 (12%)
  • IT Reminder: Your Password Expires in Less Than 24 Hours (12%)
  • Change of Password Required Immediately (10%)
  • Please Read Important from Human Resources (10%)
  • All Employees: Update your Healthcare Info (10%)
  • Revised Vacation & Sick Time Policy (8%)
  • Quick company survey (8%)
  • A Delivery Attempt was made (8%)
  • Email Account Updates (8%)

"The most successful phishing attacks are those that effectively capitalize on natural human responses," says Amy Baker, vice president of marketing at Wombat Security. "We frequently see attackers attempting to drive an emotional reaction, using fear tactics, urgent language, and offers that seem - and are - too good to be true."

Common "in the wild" phishing subject lines, similarly crafted to provoke user action, include:

  • LinkedIn: Important Security Update
  • Amazon: Kindly update your account with Amazon to avoid shutdown
  • Email account will be closed
  • Office 365: Incoming mail on hold
  • We have created your ticket for server upgrade

Many attackers exploit users' desire for reward and personal gratification, Kras explains. For example, an attacker might try to trick someone with a subject line claiming they have 1,000 followers on Twitter, or received thousands of likes on a photo.

"Everything these days has gone into gamification," he says. "Gaming for likes, gaming for followers … awards, achievements, unlocks."

This was prevalent in emailed social media notifications, which KnowBe4 also explored in its research. At 41%, LinkedIn was the most popular network for false messages because, as Kras points out, more people use business email addresses for LinkedIn. They would be more skeptical if, say, a Facebook message appeared in their corporate inbox.

What can you do about it?

"Err on the side of caution," says Kras, urging employees to take their suspicious emails to the IT department. "Most IT groups are going to be responsive. They will appreciate they are being asked more than they appreciate not being asked and having a problem."

Because many phishing emails pose as HR updates, he also advises establishing a communications process with the HR department and creating a process for how notifications are distributed; for example, through the corporate intranet. This way, employees will be able to detect suspicious messages based on how they're received.

Two-factor authentication is another helpful step for businesses to have. "This way, if a user does get their credentials phished, it's not a complete loss," he adds. This also protects people who share passwords, a trend "way more rampant than anyone wants to admit."

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3035
PUBLISHED: 2021-04-20
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
CVE-2021-3036
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to us...
CVE-2021-3037
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS conf...
CVE-2021-3038
PUBLISHED: 2021-04-20
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions...
CVE-2021-3506
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...