Big Phish
Hackers use spear phishing tactics to bait employees.
November 30, 2008 at 07:00 PM
6 minute read
In October, 10,000 users of the professional social-networking site LinkedIn.com received what appeared to be a legitimate e-mail from a member of LinkedIn's technical support team. The e-mail claimed to include an attachment containing a “list of business contacts” and enticed recipients to open it. Despite its official appearance, however, the attachment actually contained a piece of malware.
The incident was one of the most prominent spear phishing attempts to date. Unlike phishing, where a hacker SPAMs thousands of recipients with a generic, fraudulent e-mail to trick users into divulging personally identifiable information, spear phishing is much more ingenious. These types of attacks target a specific group of people, often employees at a company, with malicious e-mails that appear to be sent from an authority or company executive.
Although specific numbers are difficult to pinpoint because few companies openly report such attacks, there have been at least 66 reported spear phishing attacks within the past year and a half, according iDefense Labs, a provider of security intelligence. These spear phishing attempts have affected roughly 15,000 employees, with the majority of attacks striking Fortune 500 companies, government agencies, financial institutions and law firms.
Because these types of attacks are so targeted, SPAM filters do little to stop them. Instead, in-house counsel must work with IT security and HR to educate employees about this new threat.
“If there is a reason to break into your organization, hackers will use spear phishing because it has a high success rate,” says Rohyt Belani, managing partner and co-founder of Intrepidus Group Inc., a provider of security consulting services. “You could have millions of dollars of technology to protect your systems, but once one of these e-mails hits someone's inbox, that is all thrown out the window.”
Baiting the Hook
According to MarkMonitor Inc., an enterprise brand protection company, there was a 20 percent increase in the number of organizations phished in the second quarter of 2008, compared to the first quarter (see “Phish Facts”). According to MarkMonitor, this signals that hackers are increasing their level of sophistication.
“The criminals are going after customer data, trade secrets and sales projections,” says Frederick Felman, chief marketing officer at MarkMonitor. “Oftentimes they're not only going after personal employee data, but also personnel data, so they can access administrative capabilities to compromise servers and install software to steal this internal information.”
And spear phishing attacks are quickly replacing the old model of phishing. The way a spear phishing attack works is fairly simple. Hackers will choose a company to target and begin researching its key executives, oftentimes collecting their e-mail addresses from the company Web site. The hackers will then test the e-mail addresses to ensure they're active by sending out a test e-mail to see whether it bounces back. Then attackers begin scouring the corporate Web site for press releases and company news. They incorporate this information into the subject line and body of an e-mail, pose as an executive and send the message to employees. Because the e-mail appears to be from an executive and cites recent, relevant information, the likelihood that someone opens it is much greater.
“Oftentimes once you click on a link, or sometimes as soon as you open the message, a piece of malware, such as a keystroke logger or a Trojan, will automatically install on your machine,” says Brian Dykstra, senior partner at Jones Dykstra & Associates, a consulting firm specializing in computer security training.
Once the malware is on the system, hackers can gain access within 15 minutes and steal corporate information, virtually undetected.
Cutting the Line
Because spear phishing e-mails don't look like SPAM, security software does little to prevent these attacks. IT should continually update anti-SPAM and phishing software on mail servers as a preventive measure. In addition, experts recommend that in-house counsel, IT security and HR band together to educate employees.
“You can tell your employees this is real, it happens and that people can lose money out of their bank accounts, but nothing works as well as running an actual phishing exercise,” Dykstra says.
Companies may implement a service that allows them to run spear phishing exercises on their employees. These services create customizable, prepopulated e-mail content and fake phishing sites. When the test attack is launched, in-house counsel can track key metrics to benchmark the effectiveness of a real attack.
“It will give you the percentage of people who opened the e-mail, who entered data and the timeframe it would take for people to fall for a real phishing attack,” says Belani, whose company provides this type of service.
None of the data entered into the forms is actually collected. At the end of such an exercise, in-house counsel may provide educational materials on spear phishing to employees who fell for the attack.
Plugging Holes
Yet even in companies that install anti-phishing software, run phishing exercises and educate employees, phishing attacks can still be successful. If IT detects that the corporate network has been compromised and can pinpoint the e-mail, in-house counsel need to work fast to mitigate any risk to the company and ensure no further damage is done.
“One of the best things you can do is check to see if anyone else got the e-mail because there could be other copies,” Dykstra says. “Phishing attacks most often strike multiple users.”
It is also important to inform employees that a phishing attack has been detected so that if such an e-mail is lying dormant in someone's inbox, they won't open it.
Finally, IT and in-house counsel should work together to gauge what damage has been done. This could entail contracting specialized forensic experts to weed through the IT system and sniff out any malware that may have been installed on the network.
“The sophistication of the malware is getting better all the time as is the process of delivery and target selection,” Dykstra says. “However, some are set up so you can't reverse engineer and figure out what the software was even doing.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All'A Warning Shot to Board Rooms': DOJ Decision to Fight $14B Tech Merger May Be Bad Omen for Industry
Exits Leave American Airlines, SiriusXM, Spotify Searching for New Legal Chiefs
2 minute read'Incredibly Complicated'? Antitrust Litigators Identify Pros and Cons of Proposed One Agency Act
5 minute readTrending Stories
- 1Uber Files RICO Suit Against Plaintiff-Side Firms Alleging Fraudulent Injury Claims
- 2The Law Firm Disrupted: Scrutinizing the Elephant More Than the Mouse
- 3Inherent Diminished Value Damages Unavailable to 3rd-Party Claimants, Court Says
- 4Pa. Defense Firm Sued by Client Over Ex-Eagles Player's $43.5M Med Mal Win
- 5Losses Mount at Morris Manning, but Departing Ex-Chair Stays Bullish About His Old Firm's Future
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250