Phishing: The future is zero tolerance

 

Connecting state and local government leaders

After years of data, the numbers are in: You're letting me hack you every time.

Phishing has long been the proverbial thorn in an organization’s side. It doesn’t have the glitz and glamor of many other headline-grabbing hacks, such as the latest zero-day or ransomware attack. It’s been around so long it has become old news, pushed aside and nearly forgotten in a world where security professionals, the media and enterprises alike are engaged in a constant battle of extinguishing cyber fires and worrying about the newest malware variant.

Government agencies, however, should be particularly concerned about phishing. They make great targets, since they often have considerable amounts of attractive personally identifiable information and, too often, poor cyber defenses.

From my experience as a penetration tester and social engineer, it appears that most agencies view phishing awareness training as a necessary evil that is conducted yearly at best with some computer-based exercises. It is almost always an afterthought -- something agencies must do, rather than want to do. In most instances, the only time a phishing awareness campaign is run is during the annual compliance test for the  Federal Risk and Authorization Management Program, meaning employees may not have seen a phish since the last time an audit was performed.

Yet this threat vector has been shown to be the first step in over 90 percent of recorded breaches. Government is increasingly at risk; according to Symantec’s 2018 Internet Security Threat Report, Volume 23, the public administration sector received more email-borne malware -- 1 out of 120 emails received -- than any other sector. Despite its devastating impact, phishing still fails to command the respect and attention it deserves as a formidable threat to every organization.

A common question -- and one that has a place in most certifications such as FedRAMP -- is, “What is an acceptable failure rate for phishing?” For years, the prevailing sentiment and some professional guidance has been that anything under 10 percent would be trending in the right direction. While this guidance is, in my view, misguided, many industry professionals and consultancies have given out the same improper, or perhaps we should say “severely outdated,” guidance, however well intentioned.

After three years of gathering data from multiple phishing campaigns launched at government agencies and business -- from the top Fortune 500 companies all the way down to sole proprietorships -- one metric stands above all the others: a 62.5 percent compromise rate. We have tested over 100 organizations that have, in their opinion, “stellar phishing programs,” those that have a single test campaign once a year and those that do relatively nothing from year to year.

While the quality of phishing testing programs has a broad range, the fact of the matter is, if a person clicks on a phishing email link -- and 26.2 percent do, on average, in our data -- there is a 62.5 percent chance on average that person will either share working credentials to their account or  download a payload that will give the malicious actor control of the host. Are there security measures that can help with some of that? Of course there are; but the metrics are still clear -- even if the threat actor doesn’t compromise the host, over half the time an active username and password is now in the hands of the bad guy.

These results are staggering in their implications. Using the “old” acceptable rate of a 10 percent click through, that leaves a 6 percent compromise rate. Let’s look at what that might look like for a large agency with, say, 50,000 employees. A 26.2 percent click rate equals 13,100 clicks. If this agency were to fall into the “average” compromise rate, that would be 8,187 compromises! Even the industry-standard 10 percent click rate would yield 3,125 compromises.

I believe that all organizations should be striving for zero clicks. While this may well be unattainable, we humans tend to be complacent in coming close to our goals. A goal of 10 percent will probably mean 12 percent. A goal of 2 percent will likely achieve a result of 5 percent, and with a 62.5 percent compromise rate, will still likely open an enterprise network to an unacceptable level of risk. Granting not only the important role phishing plays as an entryway to significant breaches but the likelihood of compromise per click, the industry should be shouting “zero tolerance” from the roof tops. The days of acceptable risk should be long behind us.

I think it is clear that we are unlikely to eliminate the human element and the risks that brings. There will always be mistakes or problems as long as people are involved. But by setting far more aggressive goals, standing up progressively better phishing defense programs to train employees, rewarding them for improvement, incentivizing them for doing the right thing and demonstrating what “good” looks like, agencies can both set and meet more aggressive goals to better protect the enterprise.

While phishing isn’t the most interesting, headline-worthy topic in tech news today, it should be the No. 1 topic of concern for nearly every agency's cybersecurity team. The cultural norm must shift to zero tolerance, and until it does, phishers couldn't be happier. As a social engineer and fake criminal in my day job, I know that every single phishing campaign I run will get me into your system. Thank you for making access to your agency so very easy.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.