Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Tuesday August 20 2019, @05:54PM   Printer-friendly
from the do-you-have-a-phishing-license? dept.

Phishing is still the most common way for cyber attackers to gain entry into networks. Whether it's crooks looking for financial gain or state-backed hacking operations engaging in cyber espionage, it almost always starts with a message designed to make someone click a link or give away sensitive information. Just one person falling victim can be enough to provide hackers with the foothold they need to gain access to the whole corporate network and the confidential information stored within.

But blaming the victim rarely solves anything – especially given how phishing emails can be so highly tailored towards victims, meaning it can be almost impossible to distinguish a real message from a spoofed one created as part of an attack.

"It's fairly easy for an attacker to get hold of an email address and pretend to be somebody," says Amanda Widdowson, cybersecurity champion for the Chartered Institute of Ergonomics & Human Factors and human factors capability lead for Thales Cyber & Consulting.

[...] "There's a power play going on in a lot of these emails. There's somebody impersonating a position of authority, of seniority, effectively saying don't ask questions, just get it done, which is effective," says Tim Sadler, CEO of email security provider Tessian.

"When people send spear-phishing emails, they're taking on the persona or identity of a trusted person. That personalisation makes it highly effective in terms of getting the target to comply with the request, pay the invoice, do what they need to do," he adds.

[...] "There's very little to let the person receiving the email know the person they're receiving it from is who they say they are. It's a little asymmetric, asking a person to do the hard bit, then making not life easy for them," says James Hatch, director of cyber services at BAE Systems.

This behavior isn't restricted to email either; there are times when banks, utilities, telecommunications and other service providers will call customers out of the blue, and then ask the customer to provide their personal security details to verify it's them, yet the customer has no way of identifying if the call is a hoax or not.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by RandomFactor on Tuesday August 20 2019, @10:19PM (3 children)

    by RandomFactor (3682) Subscriber Badge on Tuesday August 20 2019, @10:19PM (#882821) Journal

    Haven't been paying attention. There anything actually going on regarding non repudiatable provenance?

    Maybe public key signing of headers or something? Or just PKI signing of the body or whatnot?

    --
    В «Правде» нет известий, в «Известиях» нет правды
  • (Score: 2) by edIII on Wednesday August 21 2019, @01:26AM (1 child)

    by edIII (791) on Wednesday August 21 2019, @01:26AM (#882894)

    regarding non repudiatable provenance?

    Not sure I understand you correctly, but this seems like the sending MTA having final say over actions in the receiving MTA. That's not possible, AFAIK. There are useful policies right now, but actions against the policies are always voluntarily followed by the receiving MTAs.

    DKIM does sign some of the header, but not all of it. Obviously, there are lot of hops email can go through. DKIM only affects the hop/domain it can sign for.

    Between two parties you can set up encrypted email, and that is more than signing the body of the email. It's full encryption of the email content.

    --
    Technically, lunchtime is at any moment. It's just a wave function.
    • (Score: 1) by RandomFactor on Wednesday August 21 2019, @02:04AM

      by RandomFactor (3682) Subscriber Badge on Wednesday August 21 2019, @02:04AM (#882910) Journal

      yeah, I don't think our words are matching up. That was...orthogonal.
       
      Rather than worry about it, I suspect we can both agree there's not much new in SMTPland.

      --
      В «Правде» нет известий, в «Известиях» нет правды
  • (Score: 0) by Anonymous Coward on Wednesday August 21 2019, @05:23AM

    by Anonymous Coward on Wednesday August 21 2019, @05:23AM (#882977)

    You could require S/MIME signatures to mail. Any entity on the chain of custody could sign the mail, this would include the sender and the sending MTA.