{"id":10755,"date":"2017-12-07T12:30:09","date_gmt":"2017-12-07T20:30:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/07\/news-4527\/"},"modified":"2017-12-07T12:30:09","modified_gmt":"2017-12-07T20:30:09","slug":"news-4527","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/12\/07\/news-4527\/","title":{"rendered":"What is spear phishing?"},"content":{"rendered":"<p><strong>Credit to Author: Marvin the Robot| Date: Thu, 07 Dec 2017 20:06:55 +0000<\/strong><\/p>\n<p>If this is not your first visit to our blog, you probably already know what phishing is. If you don&#8217;t, be sure to check out <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/\">this post<\/a>. Basically, phishing is a type of fraud that aims to extract personal data: logins, passwords, wallet numbers, and so forth. It&#8217;s essentially digital <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/social-engineering-hacking-the-human-os\/3386\/\">social engineering<\/a>.<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2017\/12\/07101400\/20171201_spearphishing-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-20413\" \/><\/p>\n<p>There&#8217;s a variety of phishing known as <em>spear phishing<\/em>. What distinguishes spear phishing from other types of phishing is that it targets a specific person or employees of a specific company.<\/p>\n<p>That targeting makes spear phishing more dangerous; cybercriminals meticulously gather information about the victim to make the &#8220;bait&#8221; more enticing. A well-produced spear phishing e-mail can be very difficult to distinguish from a legitimate one. So, spear phishing makes it easier to hook the victim.<\/p>\n<p><strong><\/p>\n<h3>Who uses spear phishing, and why<\/h3>\n<p><\/strong><\/p>\n<p>Two motives lie behind spear phishing: stealing money and\/or getting secrets. In either case, the first task is to penetrate the corporate network. The usual approach is sending employees e-mails with malicious documents or archives attached. For example, that&#8217;s how the group behind the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/silence-financial-apt\/\">Silence attacks<\/a> operated.<\/p>\n<p>A document can be weaponized by using macros in Microsoft Word or JavaScript code \u2014 basically tiny, no-frills programs built into standard files with the sole purpose of downloading far more serious malware onto a victim&#8217;s computer. This malware then spreads over the target network or just intercepts all the information it can get hold of, helping its creators to find what they&#8217;re looking for in the network.<\/p>\n<p>Spear phishing is not for small-time scammers, who try to cast their net as wide as possible. Bog-standard fraudsters don&#8217;t have the time or means to customize their weapons.<\/p>\n<p>Spear phishing is a tool for major attacks on large enterprises, banks, or influential people. It is deployed in large APT campaigns, like <a target=\"_blank\" href=\"https:\/\/securelist.com\/the-great-bank-robbery-the-carbanak-apt\/68732\/\">Carbanak<\/a> or <a target=\"_blank\" href=\"https:\/\/securelist.com\/blackenergy-apt-attacks-in-ukraine-employ-spearphishing-with-word-documents\/73440\/\">BlackEnergy<\/a>. Spear phishing was also used in the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/bad-rabbit-ransomware\/\">Bad Rabbit<\/a> attacks, which began with an e-mail infection.<br \/> <input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\" \/><\/p>\n<p><strong><\/p>\n<h3>Who might get speared<\/h3>\n<p><\/strong><\/p>\n<p>The most common targets of spear phishing are either high-level employees with access to potentially juicy info, or departmental staff whose work involves opening lots of documents from outside sources.<\/p>\n<p>Take, for example, HR departments. They get many resumes in all kinds of formats. Receiving e-mails with attachments from unknown sources isn&#8217;t the least bit surprising or suspicious. PR and sales are also vulnerable, as are many other areas.<\/p>\n<p>Accounting departments are in a special risk zone. To begin with, they deal with contractors, regulators, and heaven knows who else. And, of course, they work with money and banking software. For cash-hungry hackers, accounting is ripe for the picking.<\/p>\n<p>Spies, meanwhile, are interested in people with inside access to systems \u2014 system administrators and IT staff.<\/p>\n<p>But don&#8217;t be fooled into thinking that spear phishing is only aimed at large companies. SMBs are every bit as interesting to intruders. It&#8217;s just that whereas large enterprises are more likely to get spied on, SMBs are more likely to suffer from theft.<\/p>\n<p><strong><\/p>\n<h3>Protection measures against spear phishing<\/h3>\n<p><\/strong><\/p>\n<p>In general, the most effective techniques to guard against spear phishing are roughly the same as for the other types of phishing. See our <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/\">post with 10 tips<\/a> for maximum protection against this threat. The only difference is that spear fishing demands an even more eagle-eyed approach.<\/p>\n<p>Ideally, phishing e-mails should not reach your mailbox at all. In a business infrastructure, such messages should be filtered out at the corporate mail server level. Special software packages can assist. For example, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/small-to-medium-business-security\/mail-server?redef=1&amp;THRU&amp;reseller=gl_kdailypost_acq_ona_smm__onl_b2b_kasperskydaily_lnk____ksms___\">Kaspersky Security for Mail Server<\/a> uses cloud technologies to block malicious attachments and phishing links.<\/p>\n<p>However, for better results, the security system should be multilayered. After all, it&#8217;s possible in theory (and practice) for employees to use third-party mail services or receive a phishing link in an instant messenger. Therefore, it&#8217;s better to equip workstations with a solution capable of detecting malicious activity in applications that attackers usually exploit. One such solution is Kaspersky Endpoint Security for Business.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-spearphishing\/20412\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Marvin the Robot| Date: Thu, 07 Dec 2017 20:06:55 +0000<\/strong><\/p>\n<p>What is spear phishing, and how can you stay safe from it?<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,3924,10510,11727,10438],"class_list":["post-10755","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-phishing","tag-social-engineering","tag-spear-phishing","tag-threats"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10755"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10755\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}