With business email compromise racking up some of the largest financial theft associated with cyber-crime, and the relentless use of phishing as a means to trick users into handing over user credentials and other personal and sensitive data to bad actors, security organizations need to take a hard look at how their email security solutions are protecting against these issues.Between the move to cloud-delivered email solutions and the general belief that email security has become commoditized, few are prioritizing email security as a top investment priority for the coming year. Yet there’s a ton of innovation happening in email security to help fight phishing, business email compromise (BEC) attacks, and leakage of the sensitive data that lives within the vast array of email mailboxes.Malware payloads/attachments - leading to ransomware delivery and botnet drone delivery, and used as an entry for more complex attacks that start with simple reconnaissance and lateral movement. Phishing attacks - leading to credential theft, PII theft, and business email compromise. Most include spoofed urls leading to fake copycat sites that capture credentials and other sensitive data (especially popular with Microsoft O365, Exchange, and OneDrive). Once stolen, credentials are often used in botnet-driven credential stuffing/replay attacks, counting on the reuse of the same username and password for multiple applications or websites. Impersonation attacks (sender spoofing) Impersonation of third-party, popular services like Dropbox, Office365, and others often catch people off guard. These attacks can involve multiple, related emails, in the form of a campaign, used to establish trust, but ultimately are used for phishing, BEC, or other fraudulent activities. Business email compromise BEC is often comprised of highly targeted, multi-step deceit, beginning with credential theft to provide context for criminals as they orchestrate believable conversations that ultimately lead to the fraudulent transfer of money and/or assets. Impersonating supply chain vendors is common here, as the transfer of large sums of money are commonplace. Sensitive data leakage (intentional and unintentional) Intentional – Typically includes the theft of intellectual property and other sensitive data. Email is often used as the transport, forwarding company emails to personal email accounts. Unintentional – Email clients make it easy to misaddress emails that result in sending sensitive data to the wrong person. Also commonplace is accidentally sending the wrong attachment that may include sensitive data. Credential theft – When credentials are stolen, impostors gain access to email accounts where they can search for and easily exfiltrate sensitive data by forwarding or auto-forwarding emails to other locations.
Dave Gruber is a senior analyst at Enterprise Strategy Group (ESG). Read more ESG blogs here.