[url=http://meincmagazine.com/civis/viewtopic.php?p=29718833#p29718833:19ztl2yz said:Perphenazine[/url]":19ztl2yz]Their example isn't really spear phishing, it's just regular phishing. Spear phishing is highly targeted. It mentions you specifically and is "from" a person you know. A well crafted campaign (the type that would target government employees with security clearances) might appear to be a message from your boss, mentioning a current project/activity and asking for your feedback on an attached document by the end of the day. Even better ones come up with an approach that wouldn't trigger any suspicious follow-up and go undetected (you might tell your boss the prior attachment wouldn't open).
Advanced spear phishing techniques are hard for users to notice even with good training. Who inspects the headers of an email that looks like every other one they get from their boss?
The goal with most phishing awareness training is, and should be, for users to catch the basic phishing messages using techniques like the ones shown in the video. Those working in industries with valuable data (PII, IP, TS, etc.) then take steps to mitigate the impact of stolen credentials (two-factor authentication, automated monitoring/alerting systems, audit trails, air-gap networks, etc.).
[url=http://meincmagazine.com/civis/viewtopic.php?p=29718775#p29718775:ikthgk9h said:Dilbert[/url]
My proposal, which was unfortunately shut down, was anyone with a virus gets their computer taken away immediately (to wipe and reimage) and replaced with a hand-me-down older/slower computer. There's an incentive however meager. But that too was apparently too much to adopt.
[url=http://meincmagazine.com/civis/viewtopic.php?p=29719073#p29719073:2gm5j5oz said:Quiet Desperation[/url]":2gm5j5oz]Multiple hull breaches. Dilithium crystals shattered. Warp core in process of ejecting. One nacelle broken off and drifting away. Other nacelle bent into a pretzel. Command crew dead or MIA. Romulans boarding at multiple incursion points. Food processor full of tribbles.
But, yeah, raise shields now.
[url=http://meincmagazine.com/civis/viewtopic.php?p=29718993#p29718993:30373zy9 said:LuDux[/url]":30373zy9][url=http://meincmagazine.com/civis/viewtopic.php?p=29718775#p29718775:30373zy9 said:Dilbert[/url]
My proposal, which was unfortunately shut down, was anyone with a virus gets their computer taken away immediately (to wipe and reimage) and replaced with a hand-me-down older/slower computer. There's an incentive however meager. But that too was apparently too much to adopt.
Wow, fuck you.
Sorry, I don't have a better comment, but I don't honestly know a more constructive or useful response to that.
My assumption is that he's talking about computers that are actually owned by the organization that employs those users, not the personal property of the public at large.
If that's what he's saying, then I agree with him. If your tax or investment dollars were regularly being spent replacing, recovering, and repairing organization vehicles for employees who couldn't be bothered to not leave the cars unlocked and idling in high-crime neighborhoods, you'd probably have an issue with it, too. Even moreso if controlling a single one of those cars gave the thieves access to the entire fleet.
[url=http://meincmagazine.com/civis/viewtopic.php?p=29718993#p29718993:2rixhqrp said:LuDux[/url]":2rixhqrp][url=http://meincmagazine.com/civis/viewtopic.php?p=29718775#p29718775:2rixhqrp said:Dilbert[/url]
My proposal, which was unfortunately shut down, was anyone with a virus gets their computer taken away immediately (to wipe and reimage) and replaced with a hand-me-down older/slower computer. There's an incentive however meager. But that too was apparently too much to adopt.Wow, fuck you.
Sorry, I don't have a better comment, but I don't honestly know a more constructive or useful response to that.
I, totally, regret typing f* in a front page thread; I slapped a horse out of the barn..
My bad, infinity; or until its last typed..
[url=http://meincmagazine.com/civis/viewtopic.php?p=29719161#p29719161:1nt5b0k7 said:Carpetsmoker[/url]":1nt5b0k7]The fix is so easy: just sign the emails with a signature.
PGP/GPG and S/MIME are well known, and have been around for decades. S/MIME will work *RIGHT NOW* in almost all mail clients. PGP requires more work, but an OS-distributed set of keys is very feasible (in fact, many Linux package managers already do this), and within an organisation (like, say, a government branch) you can do your own key distribution.
Both solutions are also 100% backwards-compatible, and can be set up in a day for many email systems. Sure, there will probably be some challenges along the way in wide-spread roll-out, but we're talking about millions being stolen and even national security threats. The gain vs. effort ratio is very large.
That Paypal, Amazon, banks, etc. don't sign their e-mals with S/MIME is a disgrace. I am a software developer who wrote 2 emaiil clients and did lots of other stuff with email over the years. I'd like to think that I know more about email than most. But on occasion a phising mail still comes through the spam filter, and I really have to *look* very carefully to see if it's real or fake. The days of phising mails with bad spelling and other obvious errors are over (and even those fooled many people). The assholes have stepped up their game, and so should we.
"Educating the public" is a non-fix, and even harmful.It somehow implies that you, as a person, are responsible when you're a phising victim. Sure, there are plenty of people being a bit silly, but that's in the human nature, and in this case you need to be very vigilant and don't have to be all that silly to make a mistake.
The responsibility is with *us*, the IT folk, in providing a system where you can *easily* see if a mail is genuine.
IMHO, this is something a government should just mandate like the "EU cookie law" (except that it actually makes a difference and doesn't annoy everyone, plus the retarded EU cookie law probably took a lot more effort to implement than signed emails).
[url=http://meincmagazine.com/civis/viewtopic.php?p=29718929#p29718929:1p6byoaq said:seanmgallagher[/url]":1p6byoaq][url=http://meincmagazine.com/civis/viewtopic.php?p=29718833#p29718833:1p6byoaq said:Perphenazine[/url]":1p6byoaq]Their example isn't really spear phishing, it's just regular phishing. Spear phishing is highly targeted. It mentions you specifically and is "from" a person you know. A well crafted campaign (the type that would target government employees with security clearances) might appear to be a message from your boss, mentioning a current project/activity and asking for your feedback on an attached document by the end of the day. Even better ones come up with an approach that wouldn't trigger any suspicious follow-up and go undetected (you might tell your boss the prior attachment wouldn't open).
Advanced spear phishing techniques are hard for users to notice even with good training. Who inspects the headers of an email that looks like every other one they get from their boss?
The goal with most phishing awareness training is, and should be, for users to catch the basic phishing messages using techniques like the ones shown in the video. Those working in industries with valuable data (PII, IP, TS, etc.) then take steps to mitigate the impact of stolen credentials (two-factor authentication, automated monitoring/alerting systems, audit trails, air-gap networks, etc.).
This is how ODNI classifies spear phishing with regard to employees on their personal systems. They believe that foreign intel will use some bulk approach to send tailored messages to millions of feds based on data culled from credit card, bank and OPM breaches , going after their home computers as well as their work accounts. Most agencies have at least begun to implement two factor, but the Joint Chiefs had two factor and got clobbered by a simple credit card alert spearphish that was barely a spearphish.
I'm not saying the definition is right...
Imagine that. The government doesn't know what spearphishing is, and just uses the term because it is new and popular. Go figure.[url=http://meincmagazine.com/civis/viewtopic.php?p=29718929#p29718929:cg0vpx30 said:seanmgallagher[/url]":cg0vpx30][url=http://meincmagazine.com/civis/viewtopic.php?p=29718833#p29718833:cg0vpx30 said:Perphenazine[/url]":cg0vpx30]Their example isn't really spear phishing, it's just regular phishing. Spear phishing is highly targeted. It mentions you specifically and is "from" a person you know. A well crafted campaign (the type that would target government employees with security clearances) might appear to be a message from your boss, mentioning a current project/activity and asking for your feedback on an attached document by the end of the day. Even better ones come up with an approach that wouldn't trigger any suspicious follow-up and go undetected (you might tell your boss the prior attachment wouldn't open).
Advanced spear phishing techniques are hard for users to notice even with good training. Who inspects the headers of an email that looks like every other one they get from their boss?
The goal with most phishing awareness training is, and should be, for users to catch the basic phishing messages using techniques like the ones shown in the video. Those working in industries with valuable data (PII, IP, TS, etc.) then take steps to mitigate the impact of stolen credentials (two-factor authentication, automated monitoring/alerting systems, audit trails, air-gap networks, etc.).
This is how ODNI classifies spear phishing with regard to employees on their personal systems. They believe that foreign intel will use some bulk approach to send tailored messages to millions of feds based on data culled from credit card, bank and OPM breaches , going after their home computers as well as their work accounts. Most agencies have at least begun to implement two factor, but the Joint Chiefs had two factor and got clobbered by a simple credit card alert spearphish that was barely a spearphish.
I'm not saying the definition is right...
[url=http://meincmagazine.com/civis/viewtopic.php?p=29718775#p29718775:2fm9gd69 said:Dilbert[/url]":2fm9gd69]Nope. Users don't know how to 'raise their shields". Computer security is a highly abstract topic and as such is very hard to understand. Add to that the basic human willingness to help out (oh you want me to give you my password / open this file / fill this form? SURE! ) and the breaches will keep on happening.
Besides the inability to get secure, there's also the element of apathy at play. We are talking about employees whose sole reason for showing up every morning is the paycheck. They don't care. They could be made to care through disciplinary action (stick) or reward (carrot). But there are usually no consequences to picking up a virus on a computer, or responding to a phishing e-mail. No disciplinary action. Why would there be when malware is perceived as IT dept problem? Often seen as just a normal part of owning and using computers? :facepalm: Simply put, users aren't incentivized to keep their computer secure. Asking them "pretty please" simply does not work. It never has.
Here's an analogy we used in a meeting recently. Compare computer security to a common parking garage with a broken gate. "Please get out of your car and make sure the gate is securely closed behind you." HAHA yeah right. Hardly anyone is going to do that. All it takes is one driver leaving the gate open and everyone's car gets broken into.
My proposal, which was unfortunately shut down, was anyone with a virus gets their computer taken away immediately (to wipe and reimage) and replaced with a hand-me-down older/slower computer. There's an incentive however meager. But that too was apparently too much to adopt.
[url=http://meincmagazine.com/civis/viewtopic.php?p=29721627#p29721627:bimhorvh said:p3t3rk3y5[/url]":bimhorvh]Let's keep in mind that the jokers briefing this did a *worse* job securing the details of everyone in the US with a clearance than Ashley Madison did securing passwords. Ashley Madison at least tried to encrypt passwords. These guys pointing fingers at someone else clicking a link didn't even try to encrypt any of this info right here --> https://www.opm.gov/forms/pdf_fill/sf86.pdf
What I want to hear is who is getting prison time for this?
[url=http://meincmagazine.com/civis/viewtopic.php?p=29721627#p29721627:39j04mh4 said:p3t3rk3y5[/url]":39j04mh4]Let's keep in mind that the jokers briefing this did a *worse* job securing the details of everyone in the US with a clearance than Ashley Madison did securing passwords. Ashley Madison at least tried to encrypt passwords. These guys pointing fingers at someone else clicking a link didn't even try to encrypt any of this info right here --> https://www.opm.gov/forms/pdf_fill/sf86.pdf
What I want to hear is who is getting prison time for this?
[url=http://meincmagazine.com/civis/viewtopic.php?p=29722245#p29722245:2gvworkz said:ReaderBot[/url]":2gvworkz][url=http://meincmagazine.com/civis/viewtopic.php?p=29721627#p29721627:2gvworkz said:p3t3rk3y5[/url]":2gvworkz]Let's keep in mind that the jokers briefing this did a *worse* job securing the details of everyone in the US with a clearance than Ashley Madison did securing passwords. Ashley Madison at least tried to encrypt passwords. These guys pointing fingers at someone else clicking a link didn't even try to encrypt any of this info right here --> https://www.opm.gov/forms/pdf_fill/sf86.pdf
What I want to hear is who is getting prison time for this?
Let's not keep that in mind at all, because it's completely wrong.
The National Counterintelligence and Security Center has nothing to do with OPM, except that their HR is probably handled by OPM. And all of their PII was released too.
That's like lambasting something the President said because it contradicts what a Supreme Court Justice did.