WEBINAR: Live Date: December 14, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Modernizing Authentication — What It Takes to Transform Secure Access REGISTER >
People sending spam are trying to sell you something. People sending phishing attacks are trying to steal something from you. One type of communication is from a marketer -- whether legitimate or not. The other is from a thief. Further, spam is quite obviously spam, but phishing is getting increasingly difficult to detect. According to Word Spy, phishing is defined as: 'Creating a replica of an existing Web page to fool a user into submitting personal, financial, or password data.'
Despite what's at stake, many are ill prepared to deal with the increasing phishing threat. A common mistake that IT administrators make is to assume their spam solutions are equipped to handle phishing.
Though phishing comes through traditional email channels, it often bypasses gateways and spam filters by exploiting trusted domains and relationships. If you rely on authentication, a phisher who hijacks a trusted Web site can easily penetrate your system. If you operate with white lists and black lists, a hacker who has harvested those lists can send phishing attacks from a white list address. The Anti-Phishing Working Group (APWG) reports that more than 3,326 phishing sites were operating as of May 2005, with more than 107 trusted brands having been hijacked to perpetrate attacks.
''For that reason, they have a lot more to lose, and move between systems quickly. They're a lot more sophisticated in taking advantage of security vulnerabilities, whereas spammers are trying to direct you to someone's Web site to buy something.''
It becomes an even more daunting threat when you consider that a majority of corporate IT and security administrators must defend more than one source of email.
Companies that allow users to access their personal email through free email service providers must ensure that they've also added protective measures to that avenue of communication. The transient and seemingly invisible nature of phishing makes it a highly effective method of getting by generic spam solutions.
''Unlike spam, it's not something that you're going to be able to measure in terms of mail flow and volume and complaints,'' says Ritter. ''When you get stung with a phishing attack, you don't really know it. It's not an easy thing for the enterprise to measure. However, it's still a very real problem and when it relates to security, instead of simply mail administration, the corporation has a lot more to lose by not protecting its users. From that aspect, it's perhaps a greater liability for them.''
Clearly, traditional spam solutions aren't enough. Without obvious traces of the incidents, and the sophistication of the attacks increasing, what measures can a company take to effectively avoid becoming a victim?
''Anti-phishing is the newest area of Internet security,'' says the APWG's Dave Jevans. ''There are a number of companies providing innovative products and services in this area, but it's still a new and evolving science. Also, internal education can be an important factor. This is especially true when educating employees about avoiding internal phishing, i.e., attacks designed to spoof IT administrators and steal access credentials to internal systems.''
Over the past few years, it's been shown that layered security provides the highest form of defense in depth. The same is true when dealing with organizational phishing. Taking a proactive approach to bolstering the email infrastructure makes it much more difficult to find a way into your network.
The IT director of a popular Northern California Web services portal (who declined to be identified) provides a good example of having implemented this methodology.
''As a company, there are about four steps that we take,'' says the IT director. ''The first is corporate-wide user education to define phishing and what it looks like. The second thing we do is subscribe to some of the phishing notification newswires, and when we receive word of the latest phishing attacks, we'll assess them to see if we need to notify the entire staff. Third, we are actively evaluating several vendors' anti-phishing related plug-ins in the lab.
''Lastly, though it's really the front of the architecture, implementation of appropriate tools is critical,'' the IT director adds. ''While we have drawn a distinction between spam and phishing, one of our installed vendor products has the ability to catch them both. When I look at my personal email, outside of our network system, I see plenty of phishing. When I look at my mail inside our network, it's apparent that we do not get phished in the corporate system. We have indeed built a number of different layers behind that, but I can't remember the last time a phish got through our system.''
Approaching the threat from various avenues provides a more unified defense mechanism against a shape-shifting enemy. Through a combination of policy, process, education, and tools, it is possible to build a better fortress. Yet with every security challenge, there is no magic bullet.
Unfortunately for corporate America, there always will be so much out there for criminals to take advantage of.