{"id":6991,"date":"2017-03-15T11:50:02","date_gmt":"2017-03-15T19:50:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-782\/"},"modified":"2017-03-15T11:50:02","modified_gmt":"2017-03-15T19:50:02","slug":"news-782","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-782\/","title":{"rendered":"Why you should put your staff to the test with phishing drills"},"content":{"rendered":"<p><strong>Credit to Author: Bill Brenner| Date: Wed, 15 Mar 2017 18:56:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"33183\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/03\/15\/why-you-should-put-your-staff-to-the-test-with-phishing-drills\/pt-copy\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/03\/pt-copy.png\" data-orig-size=\"151,151\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"PT copy\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/03\/pt-copy.png?w=151\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/03\/pt-copy.png?w=151\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/03\/pt-copy.png?w=150&#038;h=150\" alt=\"\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-33183\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/03\/pt-copy.png?w=150&amp;h=150 150w, https:\/\/sophos.files.wordpress.com\/2017\/03\/pt-copy.png 151w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>When <a href=\"https:\/\/blogs.sophos.com\/2017\/01\/25\/introducing-sophos-phish-threat-the-worlds-easiest-to-use-attack-simulator\/\">Sophos Phish Threat<\/a> was released in January,\u00a0we pointed out that:<\/p>\n<ol>\n<li>Email remains one of the most problematic sources of infection; and<\/li>\n<li>It\u2019s the ordinary, well-meaning people who often let poisonous emails into their organizations.<\/li>\n<\/ol>\n<p><span id=\"more-33173\"><\/span><\/p>\n<p>Phishing\u00a0is an old problem, but news stories continue to show that\u00a0people remain easy prey.<\/p>\n<p><strong>New attacks, old tactics<\/strong><\/p>\n<p>A recent Naked Security article outlined the bad guys\u2019 efforts to infect their prey using <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/02\/21\/watch-out-for-phishing-scams-when-preparing-your-tax-return\/\">scams centered around\u00a0tax season<\/a>, with the\u00a0Internal Revenue Service (IRS) warning of fresh\u00a0email schemes targeting tax professionals, payroll staff, human resources personnel, schools and average taxpayers.\u00a0In another scam, <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/01\/11\/beware-phishing-scams-in-amazon-listings\/\">attackers polluted Amazon listings<\/a> with links that\u00a0redirected victims to a very convincing Amazon-looking payment site.<\/p>\n<p>Now come fresh reports that attackers are using malicious PDF attachments and messages that appear to be from their company&#8217;s HR departments, as well as bogus Facebook friend requests. [For the full story, read <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/03\/15\/latest-phishing-tactics-infected-pdfs-bogus-friend-requests-fake-hr-emails\/\">Latest phishing tactics: infected PDFs, bogus friend requests, fake HR emails<\/a>.]<\/p>\n<p>Microsoft Malware Protection Center team member\u00a0Alden Pornasdoro <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/01\/26\/phishers-unleash-simple-but-effective-social-engineering-techniques-using-pdf-attachments\/\" rel=\"nofollow\">warned of the malicious PDF files<\/a>. Unlike in other spam campaigns, he wrote, the PDF attachments in question\u00a0don&#8217;t contain malware or exploit code. Instead, they rely on social engineering to lead people\u00a0to phishing pages where they are\u00a0asked to divulge sensitive information.<\/p>\n<p>In another case, ZDNet reported that\u00a0<a href=\"http:\/\/www.zdnet.com\/article\/phishing-would-you-fall-for-one-of-these-scam-emails\/\" rel=\"nofollow\">sending a bogus friend request<\/a> was the best way to get someone to click on a link \u2013 even when the email was being sent to a work email address.<\/p>\n<p>In one simulation conducted by\u00a0MWR Infosecurity, a quarter of users who were tested clicked the link to be taken through to a fake login screen, with more than half going on to provide a username and password. Four out of five then downloaded the sinister file. Meanwhile, a spoof email claiming to be from the HR department referring to an appraisal system also proved\u00a0effective.<\/p>\n<p><strong>Successful attacks through social engineering<\/strong><\/p>\n<p>Recent\u00a0developments show that the ancient technique of <a href=\"https:\/\/blogs.sophos.com\/what-is\/social-engineering\/\">social engineering<\/a> is alive and well. Understanding it is the first step in mounting a better defense. We previously wrote:<\/p>\n<p style=\"padding-left:30px;\"><em>Social engineering is the act of manipulating people into taking a specific action for an attacker\u2019s benefit. You might think it sounds like the work of a con artist \u2013 and you\u2019d be right. Since social engineering preys on the weaknesses inherent in all of us, it can be quite effective. And without proper training it\u2019s tricky to prevent. If you\u2019ve ever received a phishy email, you\u2019ve seen social engineering at work. The social engineering aspect of a phishing attack is the crucial first step \u2013 getting the victim to open a dodgy attachment or visit a malicious website.<\/em><\/p>\n<p>As the blog post noted, phishing can\u2019t work unless the first step \u2013 the social engineering \u2013 convinces you to take an action.<\/p>\n<p>To help raise awareness, security vendors have offered a number of products and services companies can use to launch simulations \u2013 essentially phishing fire drills \u2014 which can show employees up close how easy it is to be duped by social engineering.<\/p>\n<p>For Sophos customers, that product is\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/factsheets\/Sophos-Phish-Threat-Datasheet.pdf?la=en\">Phish Threat<\/a>.<\/p>\n<p><strong>How it works<\/strong><\/p>\n<p>With Phish Threat, users choose a campaign type, select one or more training modules, pick a simulated phishing message, and decide which users to test. Reporting tells you how many messages have been sent out, who\u2019s clicked, and, of those, who\u2019s gone through the required modules.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/products\/phish-threat.aspx?cmp=70130000001xKqzAAE\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"32877\" data-permalink=\"https:\/\/blogs.sophos.com\/2017\/01\/25\/introducing-sophos-phish-threat-the-worlds-easiest-to-use-attack-simulator\/screen-shot-2017-01-25-at-18-34-46\/#main\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png\" data-orig-size=\"1606,858\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"screen-shot-2017-01-25-at-18-34-46\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=640\" class=\"aligncenter size-large wp-image-32877\" src=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=640&amp;h=342\" alt=\"screen-shot-2017-01-25-at-18-34-46\" width=\"640\" height=\"342\" srcset=\"https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=640&amp;h=342 640w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=1280&amp;h=684 1280w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=150&amp;h=80 150w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=300&amp;h=160 300w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=768&amp;h=410 768w, https:\/\/sophos.files.wordpress.com\/2017\/01\/screen-shot-2017-01-25-at-18-34-46.png?w=1024&amp;h=547 1024w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Security awareness programs are not new, and <a href=\"https:\/\/blogs.akamai.com\/2015\/02\/security-awareness-programs-better-than-nothing.html\">some security experts have questioned their effectiveness<\/a>, since users continue to make the same mistakes.<\/p>\n<p>In our opinion, simulations give awareness programs more teeth. The more employees get caught on the phishing hook during a simulation, the less likely they are to forget the lesson.<\/p>\n<p>That may sound like\u00a0a self-serving statement. But the proof is in the never-ending avalanche of news headlines.<\/p>\n<p>Filed under: <a href='https:\/\/blogs.sophos.com\/category\/corporate\/'>Corporate<\/a>, <a href='https:\/\/blogs.sophos.com\/category\/enduser\/'>Enduser<\/a> Tagged: <a href='https:\/\/blogs.sophos.com\/tag\/security-tips-2\/'>security tips<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/social-engineering\/'>Social engineering<\/a>, <a href='https:\/\/blogs.sophos.com\/tag\/sophos-phish-threat\/'>Sophos Phish Threat<\/a> <br \/><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/4H4LaNeLdk8\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Bill Brenner| Date: Wed, 15 Mar 2017 18:56:42 +0000<\/strong><\/p>\n<p>When Sophos Phish Threat was released in January,\u00a0we pointed out that: Email remains one of the most problematic sources of infection; and It\u2019s the ordinary, well-meaning people who often let poisonous emails into their organizations. Phishing\u00a0is an old problem, but news stories continue to show that\u00a0people remain easy prey. New attacks, old tactics A recent [&#8230;]<img loading=\"lazy\" decoding=\"async\" alt=\"\" border=\"0\" src=\"https:\/\/pixel.wp.com\/b.gif?host=blogs.sophos.com&#038;blog=834173&#038;post=33173&#038;subd=sophos&#038;ref=&#038;feed=1\" width=\"1\" height=\"1\" \/><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379,10401,10406,10510,11061],"class_list":["post-6991","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate","tag-enduser","tag-security-tips","tag-social-engineering","tag-sophos-phish-threat"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6991"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6991\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}