Everyone knows that President Harry Truman said, “If you want a friend in this town, get a dog.” Except, he didn’t. This memorable quote was invented by the writer of the play, Give ‘Em Hell, Harry. Truman died the same year that email was invented, but figuring out who-really-said-what and who-is-your-friend have become the central challenges for governments fighting the growing email security threat known as spear phishing.
Spear phishing is a more powerful variant of standard mass phishing emails. Unlike a basic phishing attack, which tries to convince email recipients to click on malware links or disclose personal information by sending generic messages to thousands of recipients, spear phishing messages are customized with specific references to people and projects that the recipients knows. Spear phishing attacks are extremely dangerous and on the rise. According to Trend Micro, spear phishing is employed as a key element in 91% of cyber attacks.
Governments face significant risk exposure from spear phishing. A number of high-profile and highly-damaging spear phishing attacks have already affected the United States Government, but the threat is global in scope. Every government in the world, at the regional and national levels, is assessing how to defend against these types of attacks. The highest profile risks include the following:
How does this happen? Aren’t government systems secure? Aren’t government workers trained to spot a threatening email? Yes and no. The reality is that no amount of training can eliminate human risk. Government workers, like many other people, can be duped by impersonation techniques. Spear phishers take advantage of these types of lapses in conduct.
In the military, the command and social structures actually can make it easier for spear phishing to succeed. For instance, in a test meant to show the phishing vulnerability in the military, over 80% of West Point cadets clicked on a malware link in an email that came from a “Colonel.”
“The Colonel Effect” shows how people can let their guards down when they think that an email comes from an individual with a superior rank.”
As Tom Chapman noted in Spear Phishing Could Enable Cyberterrorism Attacks Against The U.S. “Spear phishing is based on the premise that slipping through a side entrance is easier than breaking down the front door. When you picture spear phishing, Swordfish or other hacker movies are the wrong image — we’re not dealing with cyber geniuses who bang away on the keyboard until they control the entire network. Effective spear phishers are really social engineers. They are experts at appearing to be someone you know and trust.”
Most standard anti-spam email filtering solutions are not set up to catch a spear phishing email. Vade anti-phishing solution offers a defense, however. As a unique countermeasure, it provides better overall email protection by being layered on top of existing anti-spam solutions. It employs Heuristic Email Filtering with artificial intelligence. The solution has been trained to spot spear phishing messages based on learning from monitoring hundreds of millions of emails over a decade. It looks at each URL included in an email the instant a government employee clicks on the, safely exploring it in a remote sandboxed environment to see if it contains any malware, honeypots or malicious code. This averts the problem of phishers sending clean links that they later point to malicious URLs. Proprietary processes spot one-off spear phishing attacks by matching the style and technical indicators of the claimed sender of any given email with known information about the actual sender.
Give us a call at 415-745-3630 or contact us, if you want to discuss how you can quickly add anti-phishing measures to your current email setup.