Spear phishing against employees is the number one threat organisations face today. That’s not just me saying it – there are numerous headlines that validate this statement. If you look at all the major breaches organisations have suffered recently, the vast majority can be traced back to a phishing attack – RSA, Mitsubishi, the chemical and defence sector, the list goes on. The reason this is the attack vector is because it targets the weakest link in an organisation’s security posture – a human.
“A phisher can easily send out millions of emails. Even if it tricks just 1% into clicking the link or divulging personal credentials, that’s quite a lot of hits! When phishers do their homework, and craft legitimate looking emails, the success rates increase.
But when it comes to enterprise grade phishing, it’s a different ball game. The attackers know they’re up against enterprise grade security defences. The first thing they change is keeping the volume of emails low to prevent messages being caught in filters or other technical controls. They will spend time doing their homework and studying the individuals within the organisation, on places like LinkedIn and Facebook and other online forums, to craft a very specific message which is sent to just a handful of people. It takes just one person to respond to the message to give them a foothold in the environment.”
A recent report by Trend Micro estimates that 91% of all cyber attacks that classify as advanced persistent threats begin with a spear phishing email.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.