Compromized E-mails Grow as Hackers Double Down on Employees’ Bad Clicks

  by    0   0

As the cyber threat spreads its tentacles, a new report sheds light on a rising risk, with the number of business e-mail compromises growing at an increasing rate.

The report by Beazley Breach Response Services, part of specialist insurer Beazley P.L.C., found that the e-mail threat is greater for organizations that use Office 365, Microsoft’s cloud-based package of popular software like Word, Excel and Outlook, the e-mail platform.

The study found that hack and malware breaches via Office 365 accounted for 13% of incidents during the first quarter of 2018.

The report should set off alarm bells at all organizations since e-mail is central to how we get business done these days.

Financial services, health care and professional services are the top sectors targeted by attempts to compromise e-mail as a way to gain entry into an organization’s systems.

 

What’s happening?

Employees are usually the weakest link in an organization’s chain. Anybody with e-mail in an organization can let in hacks and malware by clicking on a link in a phishing e-mail, but also on a HelpDesk message or Microsoft survey. Once they click on these links, the employee is directed to a website that appears legitimate, with the Microsoft logo and a general “look” that mimics the company’s own website.

There they are asked for e-mail credentials, including a password. Once those details are supplied, the malware does its stuff and infects the system or the hacker starts harvesting the user’s credentials and logs into the mailbox undetected.

 

What happens when hackers gain access to e-mail?
After getting access, hackers can:

  • Run searches to steal personally identifiable information.
  • Steal bank information to send e-mails requesting fraudulent wire transfers.
  • Search the inbox to determine what HR and benefits self-service portal the employer uses, and then request a password reset for the user in that system. Once in the self-service portal, the attacker redirects the employee’s paycheck to one of their accounts.
  • Send spam e-mails to all of the user’s contacts in an attempt to get others to give up their credentials as well.

 

The top two causes of data breaches reported to Beazley Breach Response Services were hack or malware (42%) and accidental disclosure (20%). Social engineering and disclosure by insiders were the next highest causes of incident, each at 9%.

Other threats that also gain entry when employees click on bad links are ransomware that can shut down an organization’s entire system. Hackers then demand a ransom to unlock it.

 

What you can do

There are a number of simple ways to thwart infiltrators:

  • Change passwords regularly
  • Have dual-factor authentication
  • Remove auto-forwarding or auto-delete rules
  • Teach your employees how to detect bogus-looking e-mails. If unsure, one of the best ways is to look at the sender’s full e-mail address and see if it comports with the e-mail address of a known entity, like a bank.

 

Office 365 tips

For organizations that use Office 365, Beazely recommends that they:

  • Require two-factor authentication for access to Office 365.
  • Use the Secure Score tool. This Microsoft tool can be used by anyone who has administrative privileges for an Office 365 subscription. It assists not just in analyzing, but also with implementing best practices regarding their Office 365 security.
  • Enforce strong password policies. Educate employees about the risks of recycling passwords for different applications.
  • Alert employees who have access to accounts-payable systems or wire transfer payments about these types of scams.
  • Train all employees to beware of phishing attempts.
  • If you use cloud-based platforms, investigate what logging is available and make sure it is enabled. For instance, if you’ve migrated from on-premises Exchange to Office 365, audit your security settings, which are reset to default settings during migration. In Office 365, you must turn on audit logging in the Security & Compliance Center.
  • Work with your cloud provider’s technical team to determine what activities are logged and ensure you have the visibility you need, for the monitoring period you need.

 


Related Posts

Rating Agency Calls for 7.2% Workers’ Comp Rate Cut

Thanks to reforms enacted in 2014, California’s workers’ comp rating agency is recommending that the average benchmark rate be cut by 7.2% for policies effective July 1 and onward. The filing made by the Workers’ Compensation Insurance Rating Bureau is for the state’s pure premium rates, which are essentially the base rates to cover expected […]

READ MORE →

Protecting Your Important Data When Employees Leave

When is a business most susceptible to losing data, intellectual property and important records? No, not during a cyber attack or a break-in, but during lay-offs. With employees maybe feeling disgruntled after being let go, it’s common for some of them to pocket important company data – usually client lists, old e-mails, vendor contacts and […]

READ MORE →

Top 10 Wage and Hour Law Mistakes by Employers

California’s wage and hour laws are not always easy to conform to and often employers are confused about how to comply with statutes. Employers have cause to worry: often, failure to follow the law can leave a company open to lawsuits and/or regulatory action. To keep you informed about the laws that are most easily […]

READ MORE →

California High Court Upends Independent Contractor Test

The California Supreme Court has handed down a decision that rewrites the state’s independent contractor law by adopting a more stringent test for determining whether or not someone is an employee for wage order cases. The new test is similar to Massachusetts independent contractor law, which is considered the strictest in the country. The new […]

READ MORE →

Most Disaster-hit Firms Have Wrong Type of Insurance

A new report by four Federal Reserve Banks found that small businesses affected by large disasters had failed to secure the right type of insurance, and that there was a mismatch between damages suffered and their insurance coverage. While some businesses suffered actual property damage, the majority that were affected by hurricanes, other major storms, […]

READ MORE →

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to Top