Why Phishing Works
I've been asked many times why old attacks like phishing or use of stolen credentials still work. It's a good, simple, question. We are fully aware of these types of attacks and we have good ways of solving them. Unfortunately, there's just as simple an answer:"The reason attackers use the same methods of attack is we assume they won't work."We conduct phishing training. We install mail filters. And when something gets through, we treat it as an anomaly. A trouble ticket. Yet, from the 2016 DBIR, about 12% of recipients clicked the attachment or link in a phishing email. Imagine if that happened in airplanes; for example, if 12% of bolts in an airplane failed every flight. They wouldn't simply take the plane in for repairs when bolts failed. They'd build the plane to fly even if the bolts failed.
This leads to a fundamental tenant of information security:
When you assume anything will work perfectly and treat failures as a trouble ticket, you cede an advantage to the attacker. They are well aware that if they fire off 100 phishing emails, 10 will hit the mark."Your security strategy CANNOT assume perfection. Not in people. Not in processes. Not in tools. Not in defended systems."
What To Do
Do what engineers have been doing for generations, engineer resilience and graceful degradation into the system. Assume phishing, credential theft, malware, and other common attacks WILL succeed and plan accordingly. Build around an operational methodology. Work under the assumption that phishing has succeeded in your organization, that credentials have been stolen, that malware is present, and that your job is to find the attacker before they find what they're looking for.
Attackers are just some other guy or gal, sitting in their version of a cube, somewhere else in the world. They want their attacks to happen quickly and with as little additional effort as possible. They take advantage of the fact that we treat their initial action succeeding as an anomaly. If we assume that initial action will be partially successful and force them to exert additional effort and actively work to remain undetected, we decrease their efficiency and improve the economics of infosec in our favor.
No comments:
Post a Comment