Connect with us

Hi, what are you looking for?

Business

Why businesses need extra vigilance to combat phishing attacks

According to researchers at Virginia Tech, a new generation of hackers can easily spoof the email address of a co-worker or seemingly from a business, and use this to send forged emails to victims. To work well this not only requires computer skills, since the words need to appear genuine too. Trials show that with the right amount of social engineering, it is relatively straightforward to obtain sensitive information from an unsuspecting recipient.

Many users of business email are cognizant about strange email addresses, especially emails containing links or attachments. People are less vigilant when an email appears to come from a trusted source. People also tend to be cautious of emails written poorly.

However, hackers are becoming more sophisticated. Writing has, in many cases improved and when this is coupled with a hacker obtaining the email address of a co-worker or from corporate, then it is much easier to fall for a scam.

According to Professor Gang Wang: “These kinds of phishing attacks are especially dangerous. Technology changes so quickly, and now a hacker can obtain your information easily.”

He explains further: “This information can be used to commit cyberattacks that run the gamut from being mildly annoying, like having to deal with a checking account that has been hacked, to serious consequences of physical life and death if information, for example, to a hospital’s computer mainframe is obtained.”

He adds that most email systems (which use the international Simple Mail Transfer Protocol) were designed without spoofing in mind, and this leaves them vulnerable. Even with no protocols, there are vulnerabilities.

In his research Professor Wang has assessed SMTP extensions, such as SPF (sender policy framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication), and found almost half to be poorly configured and hence vulnerable to phishing attacks.

To show this, Wang and his team set up user accounts under the target email services as the email receiver and then used an experimental server to send forged emails, with a fake sender address, to the receiver account. The study used 35 popular email services, such as Gmail, iCloud, and Outlook. The click through rate from recipients was up to 26 percent.

From this Professor Wang has recommended tighter security protocols. The findings will be presented to the 27th Annual USENIX Security Symposium in Baltimore, Maryland, in August 2018.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

Taiwan's eastern Hualien region was also the epicentre of a magnitude-7.4 quake in April 3, which caused landslides around the mountainous region - Copyright...

World

A Belgian man proved that he has auto-brewery syndrome (ABS), which causes carbohydrates in his stomach to be fermented, increasing ethanol levels in his...

Tech & Science

Middle-earth Enterprises & Friends will manage the intellectual property rights Embracer has for "The Lord of the Rings" and the "Tomb Raider" games -...

Business

Honda hopes to sell only zero-emission vehicles by 2040, with a goal of going carbon-neutral in its own operations by 2050 - Copyright AFP...