the humanity of phishing attack and defense 2016 alabama ... · the humanity of phishing attack and...

83
© Copyright 2015 PhishMe, Inc. All rights reserved. The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee @phishme

Upload: others

Post on 31-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved. © Copyright 2015 PhishMe, Inc. All rights reserved.

The Humanity of Phishing Attack and Defense

2016 Alabama Cyber Now

Aaron Higbee

Co-Founder & CTO of PhishMe

@higbee @phishme

Page 2: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

What you are in for…

• A LOT of slides – don’t worry, they will be on Slideshare.

• Is Phishing easy? The operation examined from the Attackers perspective

• Multiple data points – Highlights from our Enterprise Susceptibility Report

– Examples of effective and popular phishing themes

– How much time do users spend consuming phishing education?

• Does it matter?

– New data from recent survey. Do we have an awareness problem?

• Why do humans fall for phishing?

Page 3: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

A TALE OF WOE

OPM

Page 4: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Notice anything interesting?

Page 5: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

What likely caused the breach…

Page 6: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

The DHS Response…

“The campaign will feature short videos,

posters and literature on the do’s and

don’ts for better cyber hygiene”

Page 7: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

OPM Needs an extra 21 million (for encryption)

Page 8: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Page 9: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

2002

• Incident Response

• Penetration Testing

• Taught a lot of Ultimate Hacking Classes

– Hands on, learn by doing

• Met a lot of these types

Page 10: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Attackers Perspective: Is phishing easy?

The classic Attackers vs. Defenders arguments seem to

gloss over the effort involved…

Page 11: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Phishing operations examined: Recon

• Reconnaissance for targeting

– Email addresses from simple internet searches

– Mining social networks

– Spam lists

– Paid private lists

*Image created by Seculert

Page 12: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Phishing operations examined: Weaponization

• Exploit writers

• JavaScript expertise

• Code packers and obfuscation

• Remote Administration Tools – Custom or Modified

• Data-Entry credential stealing phishing?

*Image created by Seculert

Page 13: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Phishing operations examined: Delivery

• Send email collect shells. Easy right?

• Brand protection & site take down. E.g. login.peypal.net

• Spoofing still viable? SPF, DKIM, …

• Attachment delivery? Zip it? Password zip it?

• Anti-Spam products are a problem…

– Attackers using gmail.com, yahoo.com, hotmail.com, etc..

• Time of day?

• Mobile devices?

*Image created by Seculert

Page 14: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Phishing operations examined: Exploit

• x86 Win32 – time of day matters

• Advances in end-point protection

• Application whitelisting

• Email scanning gateways

• URL detonation

• Sandboxes

• Phishing with only links? – Site categorization

– Evolving browser protections

*Image created by Seculert

Page 15: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Phishing operations examined: Recap

Let’s recap…

We found targets, prepared our email sending environment to ensure delivery and we’ve overcome the problems of exploitation. We can either get exploit attachments in, or lure phishing victims to our prepared, whitelisted, categorized site designed to deliver the payload. We are either defeating sandboxes or our malware is designed in such a way that analysis either takes too long or provides inconclusive results in the sandbox to set off alerts. Game Over?...

*Image created by Seculert

Page 16: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Phishing operations examined

… But you are still not done.

Plant backdoors, connect outbound, exfiltration

*Image created by Seculert

Page 17: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Page 18: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Now let’s look at some Crimeware examples

Common themes: – Faxes, Voicemails, ACH notices, Package Delivery

– The PhishMe blog has many examples

– Cryptolocker

Page 19: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Locky Message

Page 20: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Notice the variations

Page 21: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

MOST USED AND HIGHEST

SUSCEPTIBILITY

Page 22: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Introduction – Study Demographics • 400 PhishMe customers

• Fortune 500 and public sector organizations across 23 verticals

• 8 million simulation emails over a 13-month span

• 75% of organizations training 1000+ employees

Page 23: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Questions Asked • Are certain themes or levels of complexity more difficult than others for

employees to recognize?

• What is the impact of emotional motivators on the likelihood of phishing

responses?

• Does timing of the phish influence user vulnerability?

• Can we see positive trend success metrics over time?

• What makes a phishing simulation program successful?

Page 24: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Key Findings

• 87% of the employees who opened a phishing simulation email

opened it the SAME DAY it was sent.

• Most employees responded to a phishing email in the morning hours,

particularly at 8:00 AM local time.

• Employees who open a phishing email are 67% more likely to

respond to another phishing attempt.

• The most effective phishing emails contain a business communication

theme.

• Behavioral conditioning decreased susceptible employees’

likelihood to respond to malicious email by 97.14% after just 4

simulations.

Page 25: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Scenario Themes and Complexity

What is a Phishing

Theme? PhishMe’s term for a collection of email

scenario templates that use the same context,

motivation, or topic to elicit user action.

– Office Communication

– Employee Wellness

– Computer Updates

Page 26: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Theme Averages and Benchmarks

Page 27: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Top Emotional Motivators

The strongest emotional motivators (above 20% average) were related to connection and reward (e.g.,

winning a prize).

Top Motivators: • Connection

• Reward

• Curiosity

• Urgency

• Fear

Page 28: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Most Popular Simulations…

Type % Popularity Primary Motivators

Sent From Phone Attach (DB) 13.9 High Curiosity, Urgency

Package Delivery Click (BM) 18.43 High Curiosity

Inbox Over the Limit Click 19.7 High Fear, Urgency

eCard Alerts Click 25.98 High Curiosity, Reward, Social

File from Scanner Click 24.05 High Curiosity

Order Confirmation Click 17.38 High Curiosity, Fear

Unauthorized Access Data 29.16 High Curiosity, Fear, Urgency

Password Survey Data 16.58 Medium Fear, Urgency

Awards Season Click 5.6 Medium Entertainment

Scanned File Attach

(BM)

16.95 Medium Curiosity

Page 29: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Highly Susceptible Themes

Type % Popularity Primary Motivators

Manager Evaluation Data 31.55 Low Curiosity, Fear, Reward

Time Off Request - Negative

Balance

Click 30.92 Medium Fear, Urgency

Unauthorized Access (Adult-

Oriented)

Data 30.02 Low Curiosity, Fear, Urgency

Unauthorized Access Data 29.16 Medium Curiosity, Fear, Urgency

Browser Update Required Data (DB) 26.8 Low Fear, Urgency

eCard Alerts Click 25.98 High Curiosity, Reward, Social

Employee Raffle Data 25.85 Low Reward

Financial Information Attach 25.5 Medium Curiosity

Page 30: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Unauthorized Access 29.16% - Popular

Page 31: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Unauthorized Web Use: 30% - Low popularity

Page 32: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

eCard Alerts – 29.58% - Popular

Page 33: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Manager Evaluation 31.55% - Low popularity

Page 34: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

CREATING PHISHING AWARENESS

Page 35: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

“Sit down, let me aware you about Phishing…”

Page 36: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Dear Awareness Professional, it’s not you…

Page 37: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

PhishMe Content Team

Page 38: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Too Chinese…

Page 39: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Too Alluring…

Page 40: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Too American…

Page 41: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

27 seconds…

Page 42: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Time spent improving “Awareness”

Page 43: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

How is it that susceptibility rates decline?

• People don’t read the education

• Yet there is a consistent reduction in susceptibility

Page 44: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

How is it that susceptibility rates decline?

• People don’t read the

education

• Yet there is a consistent

reduction in susceptibility

• People respond to emails

quickly

• Empowered and encouraged

users report

• IR & SOC teams get relevant

and timely threat intelligence

Potential threat intelligence

Can resilient humans be threat detectors?

Page 45: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

What customers tend to focus on

Page 46: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Results: Conditioning vs. Awareness

Page 47: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Yes!

Page 48: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

IS PHISHING AWARENESS THE

PROBLEM?

A survey conducted on the basics of Phishing…

Page 49: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Introduction – Survey Demographics • PhishMe carried out a contracted survey in March 2016

• Sample: 216 US office workers who use email (outside of the IT & Security department)

Opening Question: Phishing is a term used to describe a deceptive email designed to infect your computer or steal your passwords. Were you already aware of that before reading this definition?

– Four follow-up questions about phishing tactics • Did you know that clicking a misleading link in an email has the potential to infect your

computer?

• Did you know an email taking you to a deceptive website designed to trick you into entering your username and password is also known as phishing?

• Did you know opening an attachment has the potential to infect your computer?

• How far do you agree / disagree with the following statement? ‘Mobile devices are equally susceptible to phishing as PCs’

Page 50: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Spoiler: They are aware of phishing

‘Phishing’ is a term used to describe a deceptive email

designed to infect your computer or steal your passwords.

Were you already aware of that before reading this

definition?

0 10 20 30 40 50 60 70 80 90 100

6%

94%

Yes

No

94.4% aware

5.6% not

Page 51: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Based on your knowledge of phishing emails today, please answer the following:

Did you know that clicking a misleading link in an email has the potential to infect your computer?

– Yes 98.1%

– No 1.9%

Did you know an email taking you to a deceptive website designed to trick you into entering your username and password is also known as phishing?

– Yes 91.2%

– No 8.8%

Did you know opening an

attachment has the potential

to infect your computer? – Yes 97.2%

– No 2.8%

Page 52: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Bonus Question

How far do you agree / disagree

with the following statement?

‘Mobile devices are equally

susceptible to phishing as PCs’ – Strongly agree 58.8%

– Slightly agree 31.5%

– Slightly disagree 9.3%

– Strongly disagree .5%

90.3%

Page 53: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Key Findings: Aware, but vulnerable

• 94.4% are aware of phishing – Some confusion remains about mobile and other attack vectors

Awareness is not the problem

Page 54: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

What do phishing simulations accomplish?

So you do awareness, but better?...

Page 55: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Changing Behavior Ain’t Eazy…

Page 56: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

K3wp doesn’t like me… reddit/r/netsec

Aaronhigbee wrote: If you think that conditioning humans to avoid phishing should be part of every organizations security hygiene.... I'll raise a beer and toast you. Not everyone agrees.

K3wp responds:

I absolutely do not agree. You should be designing systems and networks that cannot be compromised via phishing attacks vs. trying to train a bunch of useless meat tubes to be competent.

Page 57: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Security Engineers want to Engineer

Page 58: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Behave Humans!

• For many it’s an intellectual challenge

– When the human doesn’t conform to the system as designed, they

want to fix their Engineering mistake. They want to contain it.

When they can’t, they get upset. They blame the human. Not their

system.

Page 59: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

What does history say?

Page 60: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Page 61: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Optical Sensors

Defeating coin optical sensors: Shaved Coins

Page 62: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Defeating Optical sensors

Light Wand aka Monkey Paw

Page 63: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

• File.exe

• File.scr

• File.zip

• File.cab

• …

• http://Dropbox.com/file.exe

Page 64: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Consider the malware sandbox…

Page 65: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

My Reaction

(sure you do)

“We STOP Phishing!”

Page 66: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

How does your security sandbox stop this?

Or This?

Page 67: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Predictable response

After the tantrum is over… they blame the user

“the human is the weakest link”

“PEBKAC”

Page 68: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Thinking Fast and Slow

• Nobel Prize Winner in Behavioral Economics

• System 1: Intuitive brain process

– Operates automatically

• System 2: Deliberate thinking process

– Requires effort

*Not Bernie Sanders

Page 69: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

How many emails do we process daily? • Receive ~71 legit emails

• Send 41 emails

• Must mentally discard 13 emails

• Assume 2 hours of meetings and 1 hour lunch break

• We perform 33 email related tasks per hour

• Source: http://www.radicati.com/wp/wp-content/uploads/2014/01/Email-Statistics-Report-2014-2018-Executive-Summary.pdf

Page 70: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Consider the following…

2+2 = ? 10 x 2 = ?

1+8 = ?

7+4 = ?

5+5 = ?

85 x 97 = ?

Page 71: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Another example…

LEFT

LEFT LEFT

LEFT

LEFT

Right

Right Right

Right

Right

Page 72: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Another example…

LEFT

LEFT

LEFT

Right LEFT

Right

Right LEFT

LEFT

Right

Page 73: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

System 1 and 2 are always active

Page 74: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Page 75: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

This should not trigger System 2

Page 76: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

This should trigger System 2

Page 77: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

System 1 to System 2 Success!

Page 78: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

So what you are saying is…

Simulations creates experiences using tactics similar to real

phishing emails to jolt repetitive lazy intuitive cognitive

functions into a deliberate thinking process that requires

effort!

Page 79: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

System 1 Recently Failed Me

Page 80: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Failure in System 1

• Wow, This is a nice hotel! The bathroom is so clean.

• (washing my hands now)

– Hrm, no urinals?

• Hrm, what is this thing for?

• I have made a critical mistake

Page 81: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

You admit some useless meet

tubes will fail!

Page 82: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

“Can’t fix stupid” “The weakest link”

Page 83: The Humanity of Phishing Attack and Defense 2016 Alabama ... · The Humanity of Phishing Attack and Defense 2016 Alabama Cyber Now Aaron Higbee Co-Founder & CTO of PhishMe @higbee

© Copyright 2015 PhishMe, Inc. All rights reserved.

Conclusions

• Good news! Phishing Awareness is solved

• Bad news! We are still susceptible to phishing -

• Somewhere, some technology vendor is creating an

Advanced Machine Learning - Hadoop clustering

engine to perform User Behavior Analytics to end the

Phish Du Jour.

• Or you could consider conditioning the user to avoid

and detect tomorrows attacks, today.