CYBER SECURITY
PHISHING PROTECTION
HOW TO START A PROGRAM
VERSION: 1.5
DATE: 26/06/2019
AUTHOR: SYLVAIN MARTINEZ
REFERENCE: ESC17-MUSCL
CLASSIFICATION: PUBLIC
2
• Presentation goal;
• Phishing Statistics;
• Incident cost;
• Phishing protection
benefits;
• Phishing definition;
• Spear Phishing
definition;
• Phishing email – From
the outside;
• Phishing email – From
the inside;
• Phishing Website –
From the outside;
• Phishing Website –
From the inside;
• Phishing protection
program overview;
• Training overview;
• Training – Awareness
campaign;
• Training – Guidelines;
• Testing overview;
• Testing – URLS;
• Testing –
Attachments;
• Testing – Phishing
simulation planning;
• Detection overview;
• Detecting – Manual
detection;
• Detecting –
Automated detection;
• Protecting overview;
• Protecting – Warn;
• Protecting – Block;
CONTENTS
PUBLIC
CONCLUSIONDEFENCESAWARENESSPROGRAMCONTEXT
• Key Take Away;
• Get Started;
• Extra Resources.
PRESENTATION GOAL
3
LEARN HOW TO START AN
ANTI-PHISHING PROGRAM
3
LEARN ABOUT DIFFERENT TYPE
OF PHISHING PROTECTIONS
2
LEARN ABOUT DIFFERENT TYPE
OF PHISHING ATTACKS
1
TO LEARN ABOUT PHISHING PROTECTION SOLUTIONS
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
Icons: from The Noun Project unless stated otherwisePUBLIC
PHISHING STATISTICS
4Source: hostingtribunal.com - June 2019PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
ALL EMAILS
45%
ARE SPAM
SPAM
14.5 BILLION
EVERY DAY
GROWTH
65%
PHISHING IN 2018
MALWARE
92%
EMAIL DELIVERED
PHISHING EMAIL
16
MONTHLY PER USER
PHISHING OPEN
30%
BY TARGETED USERS
PHISHING CLICK
12%
BY TARGETED USERS
PHISHING SITES
1.5 MILLION
NEW EVERY MONTH
INCIDENT COST
5
ELYSIUMSECURITY INVESTIGATIONS
MAURITIUS
JANUARY 2018 – JUNE 2019
80% FINANCIAL FRAUD
20% RANSOMWARE
100% PHISHING
JAN 2018
MAY 2018
AUG 2018
APR 2019
MAY 2019
JUNE 2019
$0.5M
$1M
$2M
$0.5M
$1M
$0.5M
AVERAGE COST PER DATA BREACH
AVERAGE COST PER PHISHING ATTACK
DATA BREACHES FROM PHISHING ATTACKS
AVERAGE DETECTION TIME
$3.86M
$1.6M
95%
197 DAYS
WORLDWIDE
WORLDWIDE STATS FROM SAFEATLAST.CO AND RETRUSTER.COM – JUNE 2019PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
PHISHING DEFINITION
7PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
PHISHING IS A TYPE OF SOCIAL ENGINEERING ATTACK USED TO STEAL
SENSITIVE INFORMATION SUCH AS PASSWORDS OR FINANCIAL
DETAILS
ATTACKERS PRETEND TO BE A TRUSTED ENTITY TO PUSH VICTIMS
INTO OPENING FRAUDULENT LINKS OR ATTACHMENTS.
THIS IS A GENERIC ATTACK USING COMMON MESSAGES THAT MAY BE
RELEVANT TO THE VICTIMS CONTRIBUTING TO THEIR FALSE SENSE OF
TRUST
SPEAR PHISHING DEFINITION
8PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
SPEAR PHISHING IS AN ADVANCED TYPE OF SOCIAL ENGINEERING
ATTACK USED TO STEAL SENSITIVE INFORMATION SUCH AS
PASSWORDS OR FINANCIAL DETAILS
ATTACKERS PRETEND TO BE A TRUSTED ENTITY TO PUSH VICTIMS
INTO OPENING FRAUDULENT LINKS OR ATTACHMENTS
THIS IS A VERY FOCUSED ATTACK USING SPECIFIC MESSAGES WITH
PERSONAL AND RELEVANT INFORMATION TO THE VICTIMS
INCREASING THEIR FALSE SENSE OF TRUST
PHISHING EMAIL - FROM THE OUTSIDE
9PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
LOOKS AND
SOUNDS
LEGETIMATE
PHISHING EMAIL - FROM THE INSIDE
10PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
WARNING
SIGNS IF YOU
KNOW WHERE
TO LOOK!
PHISHING WEBSITE - FROM THE OUTSIDE
11PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
PHISHING WEBSITE- FROM THE INSIDE
12PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
YOUR CREDENTIALS ARE INTERCEPTED AND
SENT… TO THE WRONG PLACE / PERSON!
PHISHING PROTECTION PROGRAM OVERVIEW
13PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
CAMPAIGN #1
PHISHING
MOST COMMONALL STAFF
GENERIC INEXPENSIVE AUTOMATED
SIMPLE ATTACK
CAMPAIGN #2
SPEAR PHISHING
LEAST COMMONKEY STAFF
TARGET TAILORED EXPENSIVE MANUAL
COMPLEX ATTACK
TRAINING
GUIDELINES
AWARENESS
CAMPAIGN
TESTING
OPEN
ATTACHMENT
CLICK URL
DETECTING
AUTOMATEDMANUAL
PROTECTING
BLOCKWARN
{elysiumsecurity}
PHISHING PROTECTION
PROGRAM
TRAINING - AWARENESS CAMPAIGN
15PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
RELEVANT TO YOUR
CORPORATE RISK
PROFILE
1
COORDINATED
WITH CORPORATE
COMMUNICATION
2
LINKED TO WIDER
CYBER SECURITY
AWARENESS
3
MIX OF IN PERSON
AND DIGITAL
DELIVERY
4
SET AND REVIEW
KEY PERFORMANCE
INDICATORS
7
REGULAR AND
REPEATED
6
USE OF RELATABLE
EXAMPLES
5
RESULTS FEEDBACK
CAN BE A TRAINING
TOOL
8
CHEAT SHEET
10
POSTER
9
TRAINING - GUIDELINES
16PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
DO THINK BEFORE
YOU CLICK
1
DO CHECK EMAIL
PROVENANCE
2
DO CHECK EMAIL
CONTEXT
3
DO BE CAREFUL OF
DISAPEARING
EMAILS
4
DO NOT IGNORE
SECURITY
WARNINGS
7
DO NOT USE WORK
EMAIL FOR
PERSONAL PURPOSE
6
DO REPORT
SUSPICIOUS EMAILS
5
DO NOT OPEN
UNEXPECTED
ATTACHMENT
8
DO NOT ENTER
PASSWORDS FROM
URL IN EMAILS
10
DO NOT CLICK
UNEXPECTED URL
9
DO DO NOT
KEY TAKE AWAY
27
PHISHING IS THE MOST COMMON ATTACK
VECTOR TODAY
1
BE AWARE OF PHISHING VERSUS SPEAR
PHISHING
2
AWARENESS IS KEY3
IMPORTANCE OF PHISHING PROTECTION4
IMPORTANCE OF EMAIL ACCESS PROTECTION5
PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
GET STARTED
28
STAY INFORMED OF PHISHING CAMPAIGNS1
REMIND STAFF OF PHISHING RISKS2
USE SECURE EMAIL PROVIDER3
ENFORCE EMAIL PROTECTIONS4
DEFINE AND IMPLEMENT A PHISHING
PROTECTION PROGRAM
5
PUBLIC
CONCLUSIONDEFENSESAWARENESSPROGRAMCONTEXT
EXTRA RESOURCES
29
CONCLUSIONCASE STUDYHANDLINGSTRUCTURECONTEXT
TRAINING
PUBLIC
AVERAGE COST
$10 / YEAR / USER / NO CUSTOMISATION
GARTNER
COMPARE DIFFERENT OFFERINGS
https://www.gartner.com/reviews/market/security-awareness-computer-based-training/
SIMULATOR
AVERAGE COST
FREE - $10 / YEAR / USER
PHISHING READINESS
THIS IS A PRODUCT BY SYMANTEC
https://www.symantec.com/products/phishing-readiness
KNOWBE4
THIS IS A COMPANY BY KEVIN MITNICK
https://www.knowbe4.com/
MICROSOFT
ATTACK SIMULATOR – ATP PLAN 2
https://docs.microsoft.com/en-us/office365/securitycompliance/attack-simulator
GOPHISH
OPENSOURCE AND PROFESSIONAL VERSIONS
https://getgophish.com/
TREND MICRO
FREE AND PAID SUBSCRIPTION
https://cofense.com/simulator-small-business-edition
COFENSE
BOUGHT MARKET LEADER CALLED PHISHME.COM
https://cofense.com/simulator-small-business-edition
CYBERAWARE
FREE RESOURCES
https://free.thesecurityawarenesscompany.com/downloads/category/videos/
SANS
CAN BE EXPAMSIVE BUT ALSO HAS FREE RESOURCES
https://www.sans.org/security-awareness-training
ESET
CLAIMS TO BE FREE BUT MAY HAVE SOME HIDDEN COST
https://www.eset.com/us/cybertraining/
TREND MICRO
ALSO OFFERS WIDER CYBER SECURITY TRAINING
https://phishinsight.trendmicro.com/en/training
MIMECAST
ALSO OFFERS WIDER CYBER SECURITY TRAINING
https://www.mimecast.com/content/phishing-awareness