A new FireEye study examined half a billion emails from January-June of 2018
A newly released report from FireEye, an Enterprise cybersecurity company, has found that one out of every 101 emails sent is malicious. The report, titled “All it takes is ONE,” was compiled after researchers pored over nearly half a billion emails sent in the first half of 2018.
Email is the most popular attack vector for hackers and cybercriminals – by far. While the specific numbers vary by study, the vast majority of cybercrime starts via email, 91% according to a Radicati group report. A Verizon report states that 92.4% of malware is delivered via email. 76% of organizations say they experienced a phishing attack in 2017.
Think about that, that’s one every other day. And your employees aren’t just dealing with the threat of malicious email, they’re also being worn down by a constant torrent of spam. While the percentage of spam email has declined from its halcyon days when it was up around 75%, at the end of 2017 it was was still 55%.
All of this comes together to create a climate where people are just numb to email. Case in point: only 17% of phishing emails actually get reported.
Email Threats Come Well Disguised
We spend lots of time on phishing, but there’s never a bad time to be reminded that the level of social engineering inherent in some of today’s phishing and malware campaigns is staggering. The Democratic National Committee was undone by a convincing Google spoof. MacEwan University was bilked out of a small fortune after cybercriminals spoofed the websites of local construction companies to send phony invoices from. Hackers can use Unicode characters to make their domain names look more realistic. LinkedIn is used as a resource to research targets, which can make an email seem more convincing. Emails are crafted to create a sense of urgency.
If it weren’t so duplicitous, it would be impressive.
One of the trends Symantec pointed to in its most recent threat report was the rise of malicious links being used in malicious emails as opposed to attachments. In 2016, less than 2% of email malware contained a malicious link. Last year, in 2017, that percentage increased to 12.3%. This coincides with a considerable increase in phishing websites since the last half of 2017, with over 1.4 million new phishing sites created each month.
Not surprisingly, Public Administration is the most frequently targeted industry.
As for the way these emails are disguised and designed, the most common tactics are to disguise them as bills/invoices, legal notices, error messages and delivery notifications.
There are specific words you that appear more frequently than others, too. As we discussed, the intention is to make the email seem as urgent as possible. Obviously, the aforementioned themes accomplish that. So does word choice. In web design this is sometimes referred to as a dark pattern. These words are meant to trigger a response, ideally causing the user to take the intended action.
One technique for creating a sense of urgency is to mimic a Business Email Compromise (BEC). BECs embody all of the tactics we previously discussed, the social engineering, the background research. These are highly targeted campaigns that are aimed at getting a company to execute an unauthorized transfer of funds (as we saw in the MacEwan university phishing scheme). According to the FBI, BEC schemes cost US organizations $676 million in 2017. Here are some of the most commonly used words that appear in the subject lines of malicious emails:
- Payment (13.8%)
- Urgent (9.1%)
- Request (6.7%)
- Attention (6.1%)
- Important (4.8%)
- Confidential (2.0%)
- Immediate Response (1.9%)
- Transfer (1.8%)
- Important Update (1.7%)
- Attn (1.5%)
And then here are some of those common words that appear in those emails.
- Delivery (12.1%)
- Mail (11.8%)
- Message (11.3%)
- Sender (11.2%)
- Your (11.2%)
- Returning (7.6%)
- Failed: (7.6%)
- Invoice (6.9%)
- Images (6.6%)
- Scanned (6.5%)
In terms of payload, more than 3 out of every 5 malicious emails uses an infected script, just under a third use an executable.
As we stress all the time, your own employees are your greatest threat. And unfortunately, 70% of US employees have no concept of cybersecurity best practices. The only tried and true way to really defend against phishing, and really all forms of email malfeasance for that matter, is education.
Fortunately, our own IT virtuoso, Ross Thomas, has written a phenomenal series on email security and the ways that you can lock down your own office’s email servers.
So read it.
Clearly, email security has never been more important.
- Email Security – Part 1: Certificate Signed Emails
- Email Security – Part 2: Phishing and Other Falseness
- Email Security – Part 3: Sender Policy Framework (SPF)
- Email Security – Part 4: DKIM (DomainKeys Identified Mail)
- Email Security – Part 5: DMARC, Reporting and Email
As always, leave any comments or questions below…