{"id":9913,"date":"2017-10-16T11:10:15","date_gmt":"2017-10-16T19:10:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/16\/news-3686\/"},"modified":"2017-10-16T11:10:15","modified_gmt":"2017-10-16T19:10:15","slug":"news-3686","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/16\/news-3686\/","title":{"rendered":"Phishes, pseudophishes, and bad email"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Mon, 16 Oct 2017 18:00:49 +0000<\/strong><\/p>\n<p>Everyone knows about phishing. We\u2019ve all heard that the solution to phishing is to educate the user as, after all, it must be the user\u2019s fault for stupidly clicking on the thing. But what about when perverse incentives make clicking the phish seem logical? What about the enterprise pseudophish\u2014when design-by-committee language, lack of attribution, and over broad requests for personal information make something look like a phish?<\/p>\n<p>Users will frequently be inundated with corporate requests for information; requests they are often required to comply with. When companies that don\u2019t think these things through end up with something that apes the style of a phish, they can be training their users to click on actual phishes that come their way. Let\u2019s check out a recent example pertinent to the Anthem breach settlement a few months back.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-20093 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/settlement-600x288.png\" alt=\"\" width=\"600\" height=\"288\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/settlement-600x288.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/settlement-300x144.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/settlement.png 1344w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This legitimate email relies fairly heavily on the style and tone favored by phishes for decades. First of all, the email includes a lengthy \u201cClaim ID\u201d string without explaining what that means to the user. Next is the all-caps appeal to authority of a \u201ccourt-approved legal notice.\u201d The sender then includes an urgent call to action bounded with a deadline to induce anxiety. Lastly, they provide links with no indication of content and no direct connection to Anthem that the user is expected to click on.<\/p>\n<p>Stylistically, the whole thing is a mess of odd margins and shifting formatting for no particular reason.\u00a0 Most concerning is that nowhere in the email does it address who the sender is, how they got your email, or what their connection to Anthem is.<\/p>\n<p>Are there other ways to <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener\">verify the legitimacy of the email<\/a>, like examining headers, running the URL provided in a test VM first, or searching on the provided number? Of course. But can we realistically expect the user to do that for every ill-thought out communication?<\/p>\n<h3>User education<\/h3>\n<p>The presumption of many security professionals is that clicking a malicious link is a lapse in judgment or temporary insanity on the part of the user. But given the above legitimate message that the user is required to read and act upon, is it unreasonable that they would click on a Dridex malspam using the same pitch? Would we as network defenders be shocked to see a phish that looked like this? And finally, given the absurdly high volume of email most end users deal with in an office environment, aren\u2019t we really educating them to go ahead and click?<\/p>\n<h3>Please don&#8217;t do this<\/h3>\n<p>How do you stop phishing your own users? Before you hit send, make sure of the following:<\/p>\n<ul>\n<li>Use consistent text formatting, spacing, and justification.<\/li>\n<li>Don&#8217;t use third-party assets unless you know the user can display them in the same way you can.<\/li>\n<li>Identify yourself, and provide a backchannel to verify who you are outside of the email. Faceless entities engaged in unsolicited contact to spur the user with an urgent call to action is a textbook phishing pitch.<\/li>\n<li>Provide the full URL to links you want clicked. One of the most basic tricks in a phish is to hide or obfuscate an URL to discourage vetting by the user.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threats\/malspam\/\" target=\"_blank\" rel=\"noopener\">Malspam<\/a> mitigation comes with many technical fixes: disabling office Macros, blocking unnecessary outbound traffic on a given user group\u2019s profile, or blocking local execution of scripts, to name a few. But if the ultimate fix for phishing and malspam is the user who simply deletes the offending message, a simpler (and cheaper) fix is to stop flooding them with pseudophishes. Some additional time and forethought on user experience can create incentives leading to better security outcomes for everyone.\u00a0 When we send a clear, consistent message on security, we all stay safer.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/phishes-pseudophishes-and-bad-email\/\">Phishes, pseudophishes, and bad email<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/phishes-pseudophishes-and-bad-email\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Mon, 16 Oct 2017 18:00:49 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/phishes-pseudophishes-and-bad-email\/' title='Phishes, pseudophishes, and bad email'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/shutterstock_572643571.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Everyone knows about phishing. But what about pseudophishing? When companies use poor design, no attribution, and broad requests for personal info, their legit emails look like a phish.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/business-security-world\/\" rel=\"category tag\">Business<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/email\/\" rel=\"tag\">email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/enterprise\/\" rel=\"tag\">enterprise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phish\/\" rel=\"tag\">phish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pseudophish\/\" rel=\"tag\">pseudophish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/phishes-pseudophishes-and-bad-email\/' title='Phishes, pseudophishes, and bad email'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/phishes-pseudophishes-and-bad-email\/\">Phishes, pseudophishes, and bad email<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,11222,12177,10511,3924,15821,3985,10497],"class_list":["post-9913","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-email","tag-enterprise","tag-phish","tag-phishing","tag-pseudophish","tag-scam","tag-security-world"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9913"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9913\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9913"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}