Sextortion highlighted in Cofense Report

Sextortion highlighted in Cofense

JOHANNESBURG – June 24, 2019

Report reveals weaknesses in secure e-mail gateways and illustrates imperative role of human intelligence in phishing defence

“Your device has been compromised with malware. We’ve stolen passwords or other personal data. We’ve been watching you and have webcam footage from visits to dubious sites. Pay up in Bitcoin or another cryptocurrency and your secret is safe.”

These arresting words appear on page 10 of the recently-released Cofense report, ‘Phishing Threat and Malware Review 2019[1]’, amid a section of the report outlining the top four most common types of e-mail phishing threats. The chances are, though, that if you have an e-mail address, you have already seen a similar version of this in your own mailbox, and it was more than likely personally addressed to you.

Cofense notes that sextortion e-mails often include usernames, passwords and other personal information, which cybercriminals have gleaned from legitimate sites or the dark web to make the e-mails look credible[2]. Over 2018 and this year, South Africans were not exempt from the sweeping global trend of ‘sextortion’ by cybercriminals. For most people, it is disconcerting – to say the least - to receive such an e-mail.

Cofense says that sextortion, which is the practice of extorting money or sexual favours from someone by threatening to reveal evidence of their sexual activity, ‘pushes two buttons, fear and urgency, that cause people to act before they think…[3]’. And this makes the practice of sextortion via e-mail one of the top four types of phishing threats getting through to people’s mailboxes – the other three being outlined in the report as credential phishing, business e-mail compromise, and bomb threats[4].

Cofense says that although e-mail filtering catches many sextortion phishing e-mails, many are still getting through to people’s mailboxes. Also, cybercriminals are no longer using only text-based e-mails, but other methods too. These include Base64 encoded HTML message content; body text as embedded images rather than plain text, to minimise the risk of content scanning; and the use of an embedded QR code image for the bitcoin address. Cofense also believes that automation is being used to prepare and deliver such sextortion campaigns[5].

“This just shows how phishing threat actors continue to evolve their campaigns in an increasingly sophisticated and effective manner,” comments Stefan van de Giessen, general manager: cyber security at value-added distributor Networks Unlimited Africa, a distribution partner with Cofense in sub-Saharan Africa.

“This latest Cofense report reveals how threat actors have an ever-growing repertoire of tactics and techniques, allowing them to breach the perimeter controls to users’ inboxes and deliver malware into a network system, or extort money from individuals. The report – which featured data from 1,400 customers in 50 countries - found that between October 2018 and March 2019, over 31,000 malicious e-mails were reported by end users after delivery to the inbox, and of these, 90 percent were found in environments running one or more secure email gateways (SEGs).”

The 2019 report showed that threat actors are innovating relentlessly, including using public, open source tools to evade detection, as well as genuine Office 365 accounts to harvest credentials and increase their chances of reaching the victims’ inboxes and deliver malware[6].

Additionally, it revealed that SEGs play a role in phishing defence, but are not infallible. The report shows that SharePoint, OneDrive and ShareFile have been abused by threat actors to enable malware to slip through an SEG’s defences[7].

“As Cofense outlines in this report, human intelligence is vital to phishing defences. It is absolutely critical to educate users through a phishing awareness program, and this should include a focus on threats that are using the latest tactics, techniques and procedures (TTPs). This allows employers to make employees their best defence against phishing, rather than being the weakest link – even in the alarming face of a sextortion attempt,” concludes Van de Giessen.

To learn more about Cofense’s phishing incident solutions, please visit: https://networksunlimited.africa/products/security/cofense

[1] https://cofense.com/phishing-threat-malware-review-2019/

[2] https://cofense.com/phishing-threat-malware-review-2019/

[3] https://cofense.com/phishing-threat-malware-review-2019/

[4] https://cofense.com/phishing-threat-malware-review-2019/ (pages 8 to 11 of report)

[5] Cofense all rights reserved

[6] Cofense all rights reserved

[7] Cofense all rights reserved

To download the Cofense Phishing Threat and Malware Review 2019, please visit: https://networksunlimited.africa/promos/301-phishing-threat-and-malware-review-2019

About Cofense  

Cofense™, formerly PhishMe®, is the leading provider of intelligent phishing defence solutions world-wide. Cofense delivers a collaborative approach to cybersecurity by enabling organisation-wide engagement to active email threats. Our collective defence suite combines timely attack intelligence sourced from employees with best-in-class incident response technologies to stop attacks faster and stay ahead of breaches. Cofense customers include Global 1000 organisations in defence, energy, financial services, healthcare and manufacturing sectors that understand how changing user behaviour will improve security, aid incident response and reduce the risk of compromise. To learn more, visit https://cofense.com/.

About Networks Unlimited Africa

Networks Unlimited Africa is a value-added distributor, offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes. The company distributes best-of-breed products, including Attivo Networks, Cofense, Carbon Black, Fortinet, F5, Hypergrid, Mellanox Technologies, NETSCOUT, NETSCOUT ARBOR, ProLabs, RSA, Rubrik, SevOne, Silver Peak, Thales and Uplogix. The product portfolio provides solutions from the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN optimisation, application performance management, application delivery networking, Wi-Fi-, mobile- and networking security, load balancing, data centre in-a-box, and storage for virtual machines.

Since its formation in 1994, Networks Unlimited Africa has continually adapted to today's progressively competitive and evolving marketplace, and has reaped the benefits by being a leading value-added distributor (VAD) within the Sub-Saharan Africa market.

Contacts

Networks Unlimited Africa
David Wilson
+27 (0) 11 202 8400
This email address is being protected from spambots. You need JavaScript enabled to view it.

icomm
Vivienne Fouché
+27 (0) 82 602 1635
This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Subscribe now to receive our latest updates and promotions

Networks Unlimited
Offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes.

Copyright 2019 Networks Unlimited | The Key to IT Security & Networking Communications.