Part of the issue is that "they" is truly they as in plural. InfoSec trains people about security best practices. A green IT staffer is hired that doesn't know much and does things against this training. HR onboards an app themselves and doesn't include IT or follow security requirements. I can't speak for non-American companies, but here everything is about productivity and deadlines of yesterday or new people coming on that don't know the normal processes in place.My employer recently started phishing us, as a way of educating us about phishing. It has really upped m paranoia. Because, if we get phished, we have to take classes on not getting phished. (Shiver).
Same here.
Yet, they use cryptic shortened URLs in their employee emergency broadcast alert SMS -- exactly the type they are training us NOT to click on.
¯\_(ツ)_/¯
A friend of mine got phished a number of years ago in such a specific way that I never expected the bad guys were doing.
Some black hat got his email login password from him having logged into webmail on a compromised computer in a hotel (his company switched to 2FA after this). Those credentials ended up sold/transferred someone smart/patient enough to do the following:
1) Notice that my friend was the CFO of his company.
2) Notice that he handled large invoices (hundreds of thousands of dollars) that were sent to him in email, and forwarded to his accounts payable through email.
3) Wait until my friend was out of town and in a meeting. Since it was an Exchange account, they had access to his email and calendar.
Then while he was in the meeting:
4) Set Exchange to automatically move new emails to a newly created folder, so that new emails would no longer show up on his phone. This stopped him from seeing any confirmation replies sent in response to emails going out from his account.
5) Doctored a real and unpaid invoice (hundreds of thousands of dollars) from his Inbox to change the wiring instructions to the bad guys’ account at a Mexican bank.
6) Sent the doctored invoice to the accounts payable guy who usually gets sent such invoices, with a note to pay it immediately, as the vendor had just called impatiently asking for payment. The note was worded similarly to previous notes he had sent with invoices.
7) With the following addition: “And don’t worry, I already checked with them about the Mexican bank account. It’s kosher.” (Not the actual quote, but something like that.)
8) Companies often have a setup process for a new vendors that might raise alarms if a fraudulent invoice were from a new vendor, so the attacker seems to have specifically made sure this was a repeat payee.
9) Accounts payable dutifully paid the invoice immediately.
Not much later:
10) My friend gets out of his meeting, calls his office to chat about something else. “Oh, just so you know, I paid that invoice you sent me” … pause … “What invoice?”
They managed to get the money back, but only because they called their bank fast enough for them to call the Mexican bank and freeze the receiving account. But it took the whole rest of the day to get it straightened out and his bank told him that if he’d called much later enough time would have passed for the trail to that money to have essentially disappeared, with no recourse. Those kinds of moneys gets swept right away to another bank, to another bank, etc., in a process where following it eventually hits a dead-end.
My surprise at all that is that, besides the initial process of getting my friend’s login from a compromised computer, nothing about the attack was automated or even generic. Someone read through his emails/calendar to develop a specific attack targeting his workflow.
I got an email once informing me they had captured video of me masturbating; in fact it was split-screen with the webcam footage of me on one side, and the pR0n I was watching on the other. If I didn't pay up they would inform all my contacts. I knew it was bogus because at the time I didn't even have a computer in my home, and I certainly don't masturbate at work. Also, the email account this was sent to was on a headless system, and so didn't even have a webcam.It's true, the "act now!" has caused me to jump a few times. Phone calls don't work, that IRS "we're coming to your house" I replied "I'll clean my gun, what time you coming?" [scammer told me to F off and hung up]
But I did get an email once that made my hair stand up. It was a scam, I even knew it was. They claimed to have something embarrassing on me (which I knew wasn't true). The hook was that they'd email everyone I knew if I didn't pay up. I knew they had nothing on me, but I didn't want to explain it to family & friends.
Then I took a breath and realized that 100+ people with names starting with R had been cc'd. They didn't know who I was, much less who I knew. But for a brief few minutes I was mildly panicked.
Sometimes you have fun. Be prepared, I actually practice my responses for real emergencies or scams. I love live calls. Once I received the "grandpa, I'm in trouble, help me" a) my children are under 10. So I replied, "call your no good father. I know he's in jail, but that no-good-such-n-such is the responsible party. And YOU, you need to get a legit job so you don't end up like him."
My employer recently started phishing us, as a way of educating us about phishing. It has really upped m paranoia. Because, if we get phished, we have to take classes on not getting phished. (Shiver).
It's true, the "act now!" has caused me to jump a few times. Phone calls don't work, that IRS "we're coming to your house" I replied "I'll clean my gun, what time you coming?" [scammer told me to F off and hung up]
But I did get an email once that made my hair stand up. It was a scam, I even knew it was. They claimed to have something embarrassing on me (which I knew wasn't true). The hook was that they'd email everyone I knew if I didn't pay up. I knew they had nothing on me, but I didn't want to explain it to family & friends.
Then I took a breath and realized that 100+ people with names starting with R had been cc'd. They didn't know who I was, much less who I knew. But for a brief few minutes I was mildly panicked.
Sometimes you have fun. Be prepared, I actually practice my responses for real emergencies or scams. I love live calls. Once I received the "grandpa, I'm in trouble, help me" a) my children are under 10. So I replied, "call your no good father. I know he's in jail, but that no-good-such-n-such is the responsible party. And YOU, you need to get a legit job so you don't end up like him."
This is actually fairly common.A friend of mine got phished a number of years ago in such a specific way that I never expected the bad guys were doing.
Some black hat got his email login password from him having logged into webmail on a compromised computer in a hotel (his company switched to 2FA after this). Those credentials ended up sold/transferred someone smart/patient enough to do the following:
1) Notice that my friend was the CFO of his company.
2) Notice that he handled large invoices (hundreds of thousands of dollars) that were sent to him in email, and forwarded to his accounts payable through email.
3) Wait until my friend was out of town and in a meeting. Since it was an Exchange account, they had access to his email and calendar.
Then while he was in the meeting:
4) Set Exchange to automatically move new emails to a newly created folder, so that new emails would no longer show up on his phone. This stopped him from seeing any confirmation replies sent in response to emails going out from his account.
5) Doctored a real and unpaid invoice (hundreds of thousands of dollars) from his Inbox to change the wiring instructions to the bad guys’ account at a Mexican bank.
6) Sent the doctored invoice to the accounts payable guy who usually gets sent such invoices, with a note to pay it immediately, as the vendor had just called impatiently asking for payment. The note was worded similarly to previous notes he had sent with invoices.
7) With the following addition: “And don’t worry, I already checked with them about the Mexican bank account. It’s kosher.” (Not the actual quote, but something like that.)
8) Companies often have a setup process for a new vendors that might raise alarms if a fraudulent invoice were from a new vendor, so the attacker seems to have specifically made sure this was a repeat payee.
9) Accounts payable dutifully paid the invoice immediately.
Not much later:
10) My friend gets out of his meeting, calls his office to chat about something else. “Oh, just so you know, I paid that invoice you sent me” … pause … “What invoice?”
They managed to get the money back, but only because they called their bank fast enough for them to call the Mexican bank and freeze the receiving account. But it took the whole rest of the day to get it straightened out and his bank told him that if he’d called much later enough time would have passed for the trail to that money to have essentially disappeared, with no recourse. Those kinds of moneys gets swept right away to another bank, to another bank, etc., in a process where following it eventually hits a dead-end.
My surprise at all that is that, besides the initial process of getting my friend’s login from a compromised computer, nothing about the attack was automated or even generic. Someone read through his emails/calendar to develop a specific attack targeting his workflow.
I feel bad for anyone who feels they have something to hide ( my first thought was closeted gay people, but there are a plenty of others we sex shame or shame in other ways) and isn’t tech savvy. It kinda makes me think email clients should highlight the from address.
I’m pretty sure they got my email/passwordfrom the Dropbox hack.
No, I don’t think you read it wrong. But look at the speed at which I took a screenshot and tweeted it. I acted on it before I had fully read it. I’d like to think there’s no way I would have actually sent the info to Twitter, even if I had really wanted the verification, but if I can twee out a screenshot, I can probably do other, worse things on impulse too....but you weren't, ultimately, phished, from what I can tell. You're defenses, even with this much social engineering, withstood the assault. Or have I read the article wrong?
But you said you didn't apply for the blue checkmark. Isn't that a sign that the scammers somehow applied for you, rather than just scanning to see when unpredictable things happened?The person behind the DM almost certainly relied on a script that either monitored new Twitter verifications or my timeline and swooped in almost immediately after the verification went into effect, probably with the use of an automated script.
I feel bad for anyone who feels they have something to hide ( my first thought was closeted gay people, but there are a plenty of others we sex shame or shame in other ways) and isn’t tech savvy. It kinda makes me think email clients should highlight the from address.
I’m pretty sure they got my email/passwordfrom the Dropbox hack.
The big thing for me is even if they HAD video of me flogging the bishop, I'd be vastly less embarrassed about people seeing that than I would be embarrassed about people finding out I gave such an attacker money. So that grift is a complete no-op for me.
The first one I got, I shared on Facebook and Twitter and joked "if you don't wanna see that video, I guess you better give this guy some Bitcoin, cause I'm not gonna."
Only one? I've gotten 20, at least. But, there must be some people who does video sex stuff, and fall for it. Otherwise, why would they continue sending them out..I got an email once informing me they had captured video of me masturbating; in fact it was split-screen with the webcam footage of me on one side, and the pR0n I was watching on the other. If I didn't pay up they would inform all my contacts. I knew it was bogus because at the time I didn't even have a computer in my home, and I certainly don't masturbate at work. Also, the email account this was sent to was on a headless system, and so didn't even have a webcam.It's true, the "act now!" has caused me to jump a few times. Phone calls don't work, that IRS "we're coming to your house" I replied "I'll clean my gun, what time you coming?" [scammer told me to F off and hung up]
But I did get an email once that made my hair stand up. It was a scam, I even knew it was. They claimed to have something embarrassing on me (which I knew wasn't true). The hook was that they'd email everyone I knew if I didn't pay up. I knew they had nothing on me, but I didn't want to explain it to family & friends.
Then I took a breath and realized that 100+ people with names starting with R had been cc'd. They didn't know who I was, much less who I knew. But for a brief few minutes I was mildly panicked.
Sometimes you have fun. Be prepared, I actually practice my responses for real emergencies or scams. I love live calls. Once I received the "grandpa, I'm in trouble, help me" a) my children are under 10. So I replied, "call your no good father. I know he's in jail, but that no-good-such-n-such is the responsible party. And YOU, you need to get a legit job so you don't end up like him."
First, for clarity, a quick explanation. My Twitter account really <em>was</em> verified. I still don't know why. It may be that Twitter did it unilaterally, possibly because the company wants to verify journalists or wants to increase the number of verified users it has. It's also possible that someone at my employer Conde Nast made this happen and somehow this didn't get communicated to me. The main thing is my account really did get verified. The phisher, either using a bot that monitors new verifications or seeing my tweet, quickly capitalized on this.
So, congratulations, I guess.Lots of confusion about whether my account really was verified and if yes, why. I just added the following paragraph:
First, for clarity, a quick explanation. My Twitter account really <em>was</em> verified. I still don't know why. It may be that Twitter did it unilaterally, possibly because the company wants to verify journalists or wants to increase the number of verified users it has. It's also possible that someone at my employer Conde Nast made this happen and somehow this didn't get communicated to me. The main thing is my account really did get verified. The phisher, either using a bot that monitors new verifications or seeing my tweet, quickly capitalized on this.
The frustrating thing is when your employer does use external surveys… are you going to get in trouble for clicking on that link because it’s a phishing test, or for not clicking on the link because it’s a real survey that’s hosted on a site you’ve never heard of.I got caught in one of my employer's phishing tests last year. It was one of those 'external surveys' that referenced an official recent activity. Originally I wasn't sure it was authentic so I just let it be. Later I completely forgot about it, saw the email, and clicked away.
My lessons?
1. Flag suspicious stuff right away when I'm alert and don't let any time bombs linger.
2. Don't use Twitter.
My employer recently started phishing us, as a way of educating us about phishing. It has really upped m paranoia. Because, if we get phished, we have to take classes on not getting phished. (Shiver).
The frustrating thing is when your employer does use external surveys… are you going to get in trouble for clicking on that link because it’s a phishing test, or for not clicking on the link because it’s a real survey that’s hosted on a site you’ve never heard of.I got caught in one of my employer's phishing tests last year. It was one of those 'external surveys' that referenced an official recent activity. Originally I wasn't sure it was authentic so I just let it be. Later I completely forgot about it, saw the email, and clicked away.
My lessons?
1. Flag suspicious stuff right away when I'm alert and don't let any time bombs linger.
2. Don't use Twitter.
I’ve never fallen victim to a phishing attack. Send me your social security number, a credit card number with expiration date and security code, and your home address and I’ll tell you my secret to success.
$ ping twitter.com
PING twitter.com (127.0.0.1) 56(84) bytes of data.
64 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.032 ms
$ ping facebook.com
PING facebook.com (127.0.0.1) 56(84) bytes of data.
64 bytes from localhost (127.0.0.1): icmp_seq=1 ttl=64 time=0.018 ms
My employer recently started phishing us, as a way of educating us about phishing. It has really upped m paranoia. Because, if we get phished, we have to take classes on not getting phished. (Shiver).
My last one did that too. Although the company they engaged to send the notes did a good job of creating different type of phishing / scam emails, they did use a single domain to send them from. So it was easy enough, in Outlook, to just create a rule that looked at the internet headers and flagged any from that domain to be colored red and to have a flag reading "fake phishing" on them. This made sure I couldn't goof up - as we had the same deal. The first time a class, the second time they turn off your internet access (which would have ended my job).
My employer recently started phishing us, as a way of educating us about phishing. It has really upped m paranoia. Because, if we get phished, we have to take classes on not getting phished. (Shiver).
KnowBe4? Your description sound very similar to the service we use. It's effective, except for one issue:The frustrating thing is when your employer does use external surveys… are you going to get in trouble for clicking on that link because it’s a phishing test, or for not clicking on the link because it’s a real survey that’s hosted on a site you’ve never heard of.I got caught in one of my employer's phishing tests last year. It was one of those 'external surveys' that referenced an official recent activity. Originally I wasn't sure it was authentic so I just let it be. Later I completely forgot about it, saw the email, and clicked away.
My lessons?
1. Flag suspicious stuff right away when I'm alert and don't let any time bombs linger.
2. Don't use Twitter.
At my company, it is a button added into Outlook. If you click the button and it was one of the test emails, you'll get an instant notification that you passed. If you clicked on the link, I assume you get some instant notification of failure.
If I click the button and it wasn't a test email, I'll get a message that the email has been forwarded to some group in IT and that they'll review it.
If it turns out to be OK (like a link to a valid company sponsored survey), I imagine I'd eventually get a reply to go ahead and follow the link.
I feel bad for anyone who feels they have something to hide ( my first thought was closeted gay people, but there are a plenty of others we sex shame or shame in other ways) and isn’t tech savvy. It kinda makes me think email clients should highlight the from address.
I’m pretty sure they got my email/passwordfrom the Dropbox hack.
The big thing for me is even if they HAD video of me flogging the bishop, I'd be vastly less embarrassed about people seeing that than I would be embarrassed about people finding out I gave such an attacker money. So that grift is a complete no-op for me.
The first one I got, I shared on Facebook and Twitter and joked "if you don't wanna see that video, I guess you better give this guy some Bitcoin, cause I'm not gonna."
Yeah, I’m the same way. I wouldn’t care.
Hooo boy, my company used to do this. Our own IT dept did the pen testing. The first few were obvious phish emails. Then they decided to make one that looked exactly how our receiving dock delivery notifications. They had access to past shipments, so they populated the email with one of those. And they didn’t spoof they email address, they sent it directly from there. Honestly, you couldn’t tell. Everyone had to retake the course.
My employer recently started phishing us, as a way of educating us about phishing. It has really upped m paranoia. Because, if we get phished, we have to take classes on not getting phished. (Shiver).
My last one did that too. Although the company they engaged to send the notes did a good job of creating different type of phishing / scam emails, they did use a single domain to send them from. So it was easy enough, in Outlook, to just create a rule that looked at the internet headers and flagged any from that domain to be colored red and to have a flag reading "fake phishing" on them. This made sure I couldn't goof up - as we had the same deal. The first time a class, the second time they turn off your internet access (which would have ended my job).
I think every company needs to find the right compromise between never having any negative results from failing the tests and too severe punishment causing people to be afraid to report things/ask questions. Obviously, having someone repeatedly fail every test with no interest in improving because there is no consequence for not doing so it not safe for the company. They will get phished eventually. It's not a matter of if it happens if they fail every phishing test. It's just a matter of when and how much damage it causes.
Thank you for saying that, because my company has done the same thing and that was my response as well. "If the attackers made it as far as controlling our email, then the security problem is not me, it's you."Hooo boy, my company used to do this. Our own IT dept did the pen testing. The first few were obvious phish emails. Then they decided to make one that looked exactly how our receiving dock delivery notifications. They had access to past shipments, so they populated the email with one of those. And they didn’t spoof they email address, they sent it directly from there. Honestly, you couldn’t tell. Everyone had to retake the course.
Well, that's not really fair. If they are in the role of a bad actor who has control over the actual email account, that's hacking, not phishing. Which is why trying to do such testing from actual email accounts/official sources is damn stupid. "Gotcha! You did everything right. Therefore you fail."
Yep, the best protection against phishing & malware is to always be paranoid. Even if you truly are boring, you may still be targeted. Phishing/malware/spam is often a numbers game, they target huge amounts of people hoping a tiny fraction will fall for it and make them money. They absolutely target boring people as well."Think you're too smart to be fooled by a phisher?"
... I'm also not interesting enough for a spear phishing effort.
Careful with this. The one time I got thoroughly owned (~~2009-ish), it was in part because I still relied on an outdated, no-longer-accurate self-identification as "not interesting enough to warrant direct attack."
I'm not saying you're wrong, mind you. Just that there's a very real human tendency not to re-assess your own threat profile promptly when your circumstances have changed.