27
Organizational Phishing Education Nicholas Davis, CISA, CISSP November 15, 2016

Organizational Phishing Education

Embed Size (px)

Citation preview

Page 1: Organizational Phishing Education

Organizational Phishing EducationNicholas Davis, CISA, CISSP

November 15, 2016

Page 2: Organizational Phishing Education

Overview• Phishing Background• Threat to IT on within universities• Phishing education• Tricks employed• Sample educational phishing emails sent• Spotting the phish, after the click• Q&A

05/02/2023 2

Page 3: Organizational Phishing Education

Phishing DefinedPhishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication, usually email.

05/02/2023 3

Page 4: Organizational Phishing Education

Why Phishing Is Such a Threat

• IT infrastructure is designed to protect the campuses computing assets with many technical controls

• However, this persuades hackers to pursue access via alternate means, often choosing to exploit the human factor

05/02/2023 4

Page 5: Organizational Phishing Education

Your Password Is the Key to the Kingdom

If an attacker can persuade you to give them your password, they can evade all the controls put in place to protect sensitive systems

05/02/2023 5

Page 6: Organizational Phishing Education

Higher Education Proprietary Research Interests Phishers

Consider the value of an organization’s intellectual property

05/02/2023 UNIVERSITY OF WISCONSIN 6

Page 7: Organizational Phishing Education

I am Too Smart to Fall For a Trick Like Phishing

Most large organizations have a phishing participation rate of around 10%This rises when the population become the subjects of Spear Phishing, which is phishing email designed specifically for the recipient

05/02/2023 7

Page 8: Organizational Phishing Education

Phishing Relies Upon Social Engineering

The practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional. Social engineering techniques are considered con games which are performed by con artists. The targets of social engineering may never realize they have been victimized.

05/02/2023 8

Page 9: Organizational Phishing Education

Tricks Used By Expert Phishers

Socially Aware: Mining of information about the target from publicly available resources, such as Facebook, property records, or even CCAPContext Aware: Make reference to an activity you are likely to engage in, such as Amazon.com, or UPS package receipt

05/02/2023 9

Page 10: Organizational Phishing Education

Specific Examples of Complex Phishing Attempts

Baiting: Placing a USB flash drive or CD, with malware on it, in a public place

05/02/2023 10

Page 11: Organizational Phishing Education

Specific Examples of Complex Phishing Attempts

QR Code Curiosity: Embedding malicious code within a QR code, on a printout posted to a community bulletin board

05/02/2023 11

Page 12: Organizational Phishing Education

Specific Examples of Complex Phishing Attempts

Out of Office, Out of Control: Taking advantage of an autoresponder, leveraging specific knowledge to exploit co-workers

05/02/2023 12

Page 13: Organizational Phishing Education

What Would Happen If You Received This Email?

05/02/2023 13

Page 14: Organizational Phishing Education

What Would Happen If You Received This Email?

05/02/2023 14

Page 15: Organizational Phishing Education

Tips To Spot Social Engineering Within a Phishing Attempt

• Asks you to verify a sensitive piece of information

• A sense of urgency is implied in the message• An overt or implied threat may be present• Flattery is used to get you to drop your guard• Use, and sometimes overuse of organizational

knowledge in employed• A bribe or reward for your “help” may be

offered

05/02/2023 15

Page 16: Organizational Phishing Education

Spotting the Phish After the Click

• Website address looks odd or incorrect• IP address shows in address bar• Multiple pop-ups appear on top of legitimate

website window• Website contains spelling or grammar errors• No SSL lock is present on what should be a

secure site

05/02/2023 16

Page 17: Organizational Phishing Education

Can You Spot the Issue Here

05/02/2023 17

Page 18: Organizational Phishing Education

How can you protect yourself?

• Try to remember that lurking behind every innocent-looking email could be a giant shark waiting to make its move. This is true whether it's work or personal email, so you must treat every email with a basic level of caution.

Page 19: Organizational Phishing Education

Protect Your Information• Do not send sensitive information such as bank details, social security

number, etc. over email. If you really need to, make sure you know who you are sending it to and start a new email rather than replying to a thread. Check the email address carefully.

Page 20: Organizational Phishing Education

Check the Address• Be mindful of who is emailing you. Check email addresses for

accuracy and look for signs of suspicious activity, for example if an email is not in the format you'd expect or a name appears to be spelt incorrectly. Email addresses made up of seemingly random combinations of letters and numbers may also be suspicious.

Page 21: Organizational Phishing Education

Don’t Click on Links• Hover over links WITHOUT CLICKING — the destination will show in

the bottom left of your screen and you can see whether it looks right. If in doubt, Google the address you need rather than clicking on a link.

Page 22: Organizational Phishing Education

Don’t Open Suspicious Attachments• Treat any attachment that you didn't request as highly suspect.

Contact your organizational help desk if you're not sure whether its safe and they will check it out for you.

Page 23: Organizational Phishing Education

If In Doubt, Contact Your Help Desk• If in doubt, email your organizational Help Desk. They will let you

know whether something is safe to open or click on. It's better to be safe than sorry.

Page 24: Organizational Phishing Education

Combat Phishing Attempts

• Never give away personal information, especially username and password

• Don’t let curiosity get the best of you• Look for the tell-tail signs we have discussed

today• There are no situations which justify

exceptions• If something sounds too good to be true…

05/02/2023 24

Page 25: Organizational Phishing Education

If You Think You Have Been Phished• This stuff isn't complicated, but it is incredibly easy to get caught out

by a well-crafted phishing campaign. If you should accidently succumb to a phishing attempt, please do not feel ashamed or fearful. It can happen to everyone, eventually. • In such a situation, the worst thing you can do is keep quiet. Instead,

contact your organization’s Help Desk immediately. Your machine may have been infected with malware, or your user credentials may be compromised. The very best way to remedy such a situation is to contact the Help Desk.

Page 26: Organizational Phishing Education

If You Think You Have Been Phished• You should not be reprimanded or punished in any way when you

come forward with information about potential phishing incidents. The Help Desk of your organization is there to assist, and help triage the situation after a successful phish occurs

Page 27: Organizational Phishing Education

Curiosity Killed the Cat!Lack of Curiosity Killed the Phish!

Nicholas Davis, CISA, CISSPChief Information Security OfficerUniversity of Wisconsin System

05/02/2023 27