New tech can help catch spearphishing attacks

New approaches that look for more subtle patterns can help reduce highly-targeted spearphishing attacks

A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment.

Everything about the letter looked legit.

"It has my display name, spelled correctly," said Kevin O'Brien, co-founder and CEO at Belmont, Mass.-based GreatHorn. "There are no attachments. There's nothing in the email that's misspelled. My signature line was copied from my real emails."

The text of the email was totally something that a CEO might say.

"Hi Caitlin," the message said, addressing the company's controller, Caitlin McLaughlin. "Are you available to process an outgoing payment today? Let me know and I will send the payment details as soon as I receive it from the consultant shortly; I am traveling and this is urgent."

The only mistake was that the sender's email address spelled GreatHorn with two Rs instead of one, but that would have required eagle eyes to catch.

In addition, some email clients would only show the display name, not the actual email address, said Yoel Alvarez, IT security engineer at Philadelphia-based Hersha Hospitality Management.

"To the untrained eye, this is going to look like a legitimate email," he said. "It bypasses any form of security."

Trained users might also be put on alert by the urgency of the email and the part about the executive traveling, and might delay the transaction until they received definite confirmation from the CEO by contacting him by phone or text on a number that they already had for him.

But what if the email simply asked her something completely innocuous? Scammers will ask simple questions, questions that any co-worker or customer might ask, in order to expand their knowledge of the company, get a feel for email style, and develop relationships with staff.

These communications may also take place via social media channels, web forms, or even phone calls, said Kevin San Diego, vice president of product management at  Cloudmark, which offers a spearphishing detection tool.

Traditional security email gateways or spam filters don't help when it to comes to spearphishing, he said.

"These attacks are highly targeted, with a single message in the email campaign, uniquely crafted for that particular recipient," he said.

And the messages can be very innocuous, with very simple requests that pose no risks to the company at all.

Scammers will also send out fake marketing emails in order to trigger replies from vacation autoresponders -- not only does this give them the employee's email signature, but it also tells them that the employee is on vacation and when they will be back.

The scammers can then work their way up to asking for the wire transfer, the W2 records or other proprietary data.

But there are some tell-tale signs, he added, that may not be readily apparent to the recipient.

Kevin O'Brien, co-founder and CEO at GreatHorn

"We look at the IP address of the sending domain, the age of the domain, the DNS servers that are being used, all those elements," he said.

The average cost of a spear phishing attack is $1.6 million, according to a survey released earlier this year by security firm Cloudmark and research firm Vanson Bourne, and 73 percent of respondents said that spearphishing was a significant threat.

Over the past 12 months, 27 percent of organizations received a targeted spearphishing attack, according to a report released today by Osterman Research. And 11 percent of organizations were successfully tricked.

"That's a little sobering," said Tim Helming, director of product management at DomainTools, the company that sponsored the research.

Join the CSO newsletter!

Error: Please check your email address.

More about BillCloudmarkCSOGoogleMicrosoftO'BrienOsterman ResearchPayPal

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Maria Korolov

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place