A new threat tactic is being used to determine if sandbox environments are being used…
47% of payloadless phishing emails are able to bypass the most popular secure email gateways (SEGs), according to researchers at IronScales. These are emails that don’t contain malicious links or attachments, but instead try to manipulate the user in a more targeted manner.
“The overwhelming majority of email phishing attacks are now driven by social engineering messages aimed at prompting an action, and distributed via advanced phishing techniques such as business email compromise (BEC), VIP/CEO impersonation and other forms of email spoofing and fraud,” the researchers write. “From an attacker’s perspective, the transition from spear-phishing emails packed with malicious payloads to social engineering was a no brainer.”
The researchers explain that spear phishing is much more effective because the most popular secure email gateways “were not built to analyze the language within an email and decipher a message’s context and intent.”
“The phishing attack technique with the greatest penetration rate was sender name impersonations, which occur when an email masquerades as coming from a trusted source, such as a colleague, friend or family member,” IronScales says. “Sender name impersonations accounted for 30% of all SEG penetrations, which represents a 6% increase from our 2019 analysis. Domain name impersonations, which occurs when an email is from a similar domain, in which attackers register the domain to set the right authentication records in the DNS, accounted for 25% of penetrations. This represents a 23% increase from our 2019 research. VIP impersonations, such as CEO spoofs, and fake login pages came in at 22% and 16%, respectively.”
Technical defences are useful and have improved greatly over the years. As security technology improves, however, attackers have shifted to more targeted social engineering attacks that won’t be flagged by these defences. New-school security awareness training can address this problem by enabling your employees to recognize social engineering attacks that reach their inboxes.
IronScales has the story.
Free Phishing Security Test
Would your users fall for convincing phishing attacks? Take the first step now and find out before the bad guys do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.
Here’s how it works:
- Immediately start your test for up to 100 users (no need to talk to anyone)
- Select from 20+ languages and customize the phishing test template based on your environment
- Choose the landing page your users see after they click
- Show users which red flags they missed, or a 404 page
- Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
- See how your organization compares to others in your industry
PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/phishing-security-test-partner?partnerid=001a000001lWEoJAAW