Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Attackers Targeting Lower-Level Management, Proofpoint Reports

    Written by

    Sean Michael Kerner
    Published November 28, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Cyber-attackers aren’t continuously going after the same executive and high-level management; they are actually shifting targets to other individuals within organizations, including lower management, according to a report from Proofpoint released on Nov. 28.

      The Proofpoint third-quarter 2018 Protecting People report found that a staggering 99 percent of the most targeted email addresses in the quarter were not even ranked in the second quarter. Additionally, Proofpoint reported that 67 percent of highly targeted malware and phishing attacks are now aimed at lower-level management and individuals.

      “While the speed at which cyber-criminals move to lure new and unsuspecting victims has always been quick, we were surprised to see a 99 percent shift over the past quarter in the top targeted individuals within companies,” Ryan Kalember, senior vice president of Cybersecurity Strategy at Proofpoint, told eWEEK. “By targeting primarily lower-level employees with access and privilege rather than senior staff, attackers are also widening their pool of potential targets and increasing their chances at successfully infiltrating a company.”

      The shift toward lower-level management and individuals for attacks doesn’t mean that upper-level management shouldn’t be concerned. In some cases, attackers are simply looking for a way into an organization so they can move laterally afterwards.

      “Lateral movement is certainly very common,” Kalember said. “In addition to traditional local privilege escalation and lateral movement via the network, we’ve seen a major increase in compromised accounts being used to send out further phishing or BEC [Business Email Compromise] messages.”

      BEC are attacks where a fraudster aims to impersonate a legitimate partner or executive to solicit a payment request. Kalember said that when attackers compromise accounts via a BEC attack, they can easily impersonate a trusted employee or partner and slip through security teams’ defenses that are network- and endpoint-focused.

      Ransomware on the Decline

      Another big shift observed by Proofpoint is the precipitous decline in ransomware over the past year.

      “Ransomware appeared in less than 1 percent of email messages bearing a malicious payload, either via a link or attached document,” Chris Dawson, threat intelligence lead at Proofpoint, told eWEEK. “A year ago in Q3 2017, ransomware made up 64 percent of the malicious payloads we observed.”

      While ransomware is fading, web-based social engineering attacks were up by 233 percent year-over-year. Dawson said the majority of these attacks are fake antivirus, bogus browser updates, fake font packs, etc. For example, a user may browse to a web page and be presented with a modal dialog informing them that they need a Flash update to view content on the page. When they click to download the update, they are actually downloading malware. 

      DMARC

      Attackers are also apparently taking notice of the protective measures in place that organizations have for email security, particularly the use of the DMARC (Domain-based Message Authentication, Reporting and Conformance). DMARC has been mandated for use by the U.S. government and includes email authenticity and integrity check to help limit fraud.

      “When implemented, DMARC is a significant barrier to cyber-criminals who launch email fraud attacks that spoof a company’s trusted domains,” Ryan Terry, product marketing manager at Proofpoint, told eWEEK. “In our experience, attackers that encounter DMARC protection ultimately move on to more vulnerable targets.”

      That said, Terry commented that fraudsters can also leverage other fraud tactics such as display name spoofing and lookalike domains, which are tactics that DMARC does not protect against. Proofpoint recommends a solution that includes the implementation of DMARC authentication as well as security controls to help stop the additional fraud tactics, according to Terry. 

      Protecting People

      Protecting people within organizations from cyber-threats requires a combination of technology and training. Kalember commented that 90 to 95 percent of advanced attacks begin with the email vector, which underscores the importance of stopping these attacks before they ever reach the inbox. 

      “Advanced threat solutions and having visibility into your most attacked employees on a regular basis are essential components within a successful people-centric security strategy,” he said. “That said, in addition to technology, it is critical that organizations prioritize educating their employees to spot socially engineered attacks across email, social media and the web and run phishing simulations (fake attacks that use real-world tactics) to understand who in their organization is most likely to fall victim.”

      What’s Next

      Looking forward to 2019, Kalember said he expects that 2019 will be the year where targeted individuals in organizations will take center stage in the cyber-security threat landscape. 

      “We expect to see a sustained increase in the targeting of people, rather than infrastructure, as attackers continually find new ways to manipulate unsuspecting individuals into becoming unwitting accomplices,” Kalember said. “2019 may also be the first year in which we don’t see a single technical vulnerability (i.e. CVE) actively exploited in targeted phishing attacks, given how few we saw in 2017 and 2018. Until organizations shift to better protect its people, cyber-criminals will continue to exploit human vulnerability for financial gain.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.