October 30, 2018 By David Bisson 2 min read

A new research paper warned of phishing threats in which malicious actors abuse trusted web services to evade detection.

According to the report by Cofense, fraudsters are getting creative in their efforts to make sure their emails make it through email gateways and firewalls. Specifically, threat actors are using web services such as Google Drive, SharePoint, Dropbox and others to host files containing embedded links that redirect to credential-stealing websites.

Email Remains a Top Attack Vector

Many common email gateways are unable to detect and block the malicious links included within those files. Some perform better when the body of the email contains a malicious link to a phishing page. However, Cofense found several instances in which those gateways failed to rewrite a malicious URL completely, which allowed the attack email to get through. The security firm also noted one instance in which an email security platform successfully rewrote a URL but failed to block it.

This is particularly concerning because email is one of the most popular attack vectors in use today. Verizon recorded 1,192 email phishing incidents over the course of the year in its “2018 Data Breach Investigations Report,” and a Symantec survey found that 1 in 9 users encountered email malware during the first half of 2017. This made users twice as likely to encounter malware through email than through exploit kits. By the end of 2017, Symantec observed that the number of malware-laden emails received by users had nearly doubled in six months to 16.

How to Protect Against Phishing Attacks

Security professionals can protect their organizations against phishing attacks by conducting a simulated phishing engagement to test the organization’s incident response processes. They should also adopt a layered approach to email security that includes perimeter protection, email security solutions and cyber awareness training for all employees.

Sources: Cofense, Verizon Enterprise, Symantec, Symantec[1]

More from

How I got started: Incident responder

3 min read - As a cybersecurity incident responder, life can go from chill to chaos in seconds. What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role?With our How I Got Started series, we learn from experts in their field and find out how they got started and what advice they have for anyone looking to get into the field.In this Q&A, we spoke with IBM’s own Dave Bales, co-lead X-Force Incident Command…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally.The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets.Who is exploiting the NGFW zero-day?As of now, little is known about the actors behind the…

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today