It’s been reported that hackers are using newsletter subscription forms to spread links to a phishing website on behalf of well-known international companies such as Audi, Austrian Airlines and S-Bahn Berlin. This, coupled with recent warnings in the US that attackers are using phishing tactics to lure victims to open malicious documents or submit sensitive information when filing their taxes, it is clear that phishing campaigns are back in the spotlight. Fabian Libeau, VP for EMEA at RiskIQ, comments on the rise of such attacks and what organisations can do to safeguard against them:
“In the past few years, there has been a stark increase in cybercriminals using sensitive information from social media posts, messages, and profiles as lures in social engineering attacks, which is something there needs to be awareness of across industries as companies expand their web and social media presence. Phishing is currently one of the most concerning attack vectors in cybersecurity. Every day threat actors send millions of malicious emails that target employees of enterprises to gain access to internal systems. The critical aspect in all social engineering scams is that the intended victim believes the scammer to be legitimate, and as people have become able to spot the most obvious phishing emails, we are increasingly seeing time being spent on crafting well-written and seemingly authentic messages requesting reasonable actions. This means that even if you’re relatively well informed, it’s becoming harder to single out, especially when criminals impersonate.
“When developing strategies for how to safeguard an organisation against the potentially devastating effects of phishing, security teams need to go beyond focusing solely on training for junior employees, which while important is not sufficient. Instead, security professionals need to play a more active part in monitoring for such frauds as well. A key part to a robust anti-phishing strategy is to map out the infrastructure associated with flagged phishing campaigns and set up customised blocks that can prevent further action on behalf of the criminal. This will lower the amount of possible attack vectors, and also increase organisations’ resilience to what is becoming unavoidable phishing campaigns targeting those employees that are most likely to fall for impersonation fraud.“