Microsoft Copilot: 5 steps to secure data access
Lire l'article[NEW] MYDATAMANAGEMENT TO CLEAN UP YOUR OBSOLETE, UNUSED AND VOLUMINOUS DATA
Solutions
Effective response to six major challenges in data security
#1 user-interacting platform for detection
Discover the platformBest practices to improve Microsoft Teams security
Download the infographicOur resources
Check out our useful resources for improving data protection
Security
11 September 2018
BEC is perhaps the latest, or maybe hottest, security scare acronym – Business Email Compromise. It’s a catchall term which reflects the fact that ‘email is still the number one threat vector facing organisations’1.
And that’s for two reasons: it’s constantly used for broad sharing of information within and outside of the business, and it’s also your digital identity – if I can access your email, I can be you. But… this has all been true for decades. So what’s new?
I think it’s this: typically, when people think about email security they think about viruses, malware, and phishing. And when we think about email scams, the most high profile ones are phishing related. The level of sophistication can be phenomenal – just look at how detailed this attacker got in order to extract substantial funds.
So here’s the new bit (yes, I’m finally getting there): in a substantial number of cases, attackers are actually compromising a corporate mailbox. I don’t mean they are sending really, really good fake emails, I mean they’ve actually got the credentials to log into the CEO’s email, or someone else in the business. Recent research found that 44% of organisations were victims of account takeover-based and related types of attacks2. This makes it pretty much impossible for anyone in the company to spot when the email they receive was not really from the purported sender.
In a recent example at Save the Children, ‘hackers broke into a worker’s e-mail, posed as an employee, and created false invoices and other documents, to fool the charity into sending nearly $1 million to a fraudulent entity in Japan’3. Just a few days ago, thousands of sensitive documents were stolen by hackers in a cyber-attack on the investment bank Evercore: the hackers gained access a PA’s inbox, leading to the theft of huge numbers of documents and emails4.
Some subtle attackers have a different approach: compromise the account, but don’t send any emails. Instead, simply put in place an inbox rule to forward emails from the compromised account to the attacker. Numerous customers have told me they have suffered from precisely this attack (no, not giving any names, sorry), and it’s even possible to hide the rules so they cannot be seen in an Outlook client5.
Which all leads to two really good questions:
The answer to the first is, unsurprisingly, not straightforward. Phishing of one sort or another is frequently the starting point, and there’s an increasing number of vectors which are now defeating even multi-factor authentication (MFA). That’s a bit too detailed for this article and is well worth a blog on its own, so watch this space – I’ll get right to it.
And for the second, no big surprise, no single answer. User awareness education helps (reducing the chance that your team members succumb to phishing attacks, helping them identify malicious WiFi, etc). Automated tools to identify dodgy emails and rogue websites, can be part of your armoury. And as I imply above, MFA makes it tougher, but not impossible, for the attacker.
Ultimately, though, all these approaches can be, and in many cases will be, defeated. This leaves you with perhaps the most critical defence: monitoring and detection. You need to identify immediately an attacker has compromised an email account in your environment. This can be done by accurate analysis of typical user behaviour and is at the heart of the IDECSI MyDataSecurity. I won’t say more here, but this earlier blog post gives you a good flavour.
Ben Miller is an experienced technologist and entrepreneur with a background in mathematics and software engineering. He is focused on bringing new technologies to market, which change conventional thinking. Within cyber security, we have long been used to complaining about users, and driving more work into the security team. Ben’s particular focus today is technologies which challenge this approach and instead make user empowerment a key part of the cyber discussion.
[1] https://blog.barracuda.com/2018/02/28/why-email-still-reigns-as-number-one-threat-vector-and-what-to-do-about-it/
[2] https://www.agari.com/insights/analyst-research/best-practices-against-phishing-ransomware/
[3] https://www.bostonglobe.com/business/2018/12/12/hackers-fooled-save-children-into-sending-million-phony-account/KPnRi8xIbPGuhGZaFmlhRP/story.html
[4] http://www.thetimes.co.uk/article/19866a34-061c-11e9-aef4-fa8d5c1f7f40
[5] https://blog.compass-security.com/2018/09/hidden-inbox-rules-in-microsoft-exchange/
Recent articles
Subscribe to our newsletter and receive new contents every month
Our articles
These articles may
interest you