Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

11/10/2017
04:10 PM
Curtis Franklin
Curtis Franklin
Curt Franklin
50%
50%

New Research: Phishing Is Worse Than You Thought

A new report led by Google researchers shows that phishing attacks are incredibly effective at stealing useful credentials from users.

The stolen credentials problem is bad. Now, thanks to a team of researchers from Google, the University of California, Berkely, and the International Computer Science institute, we have a much better idea of just how bad the situation has become.

In a paper titled "Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials," the research team of Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis and Elie Bursztein looked at billions of stolen credentials to understand how they were taken, how they were used, and whether the former had any impact on the latter.

First, to size: Just how big is the problem? In the introduction to the paper, the team writes, "Over the course of March, 2016 – March, 2017, we identify 788,000 potential victims of keylogging; 12.4 million potential victims of phishing; and 1.9 billion usernames and passwords exposed by data breaches." They then point out that this is far from the total universe of victims -- it's simply a subset that they could easily identify. Since the earth's population is a bit over 7.5 billion, that means that the subset of victims is more than one-quarter of the world's population.

When it comes to the credentials in the research population, how the credentials came to be stolen had a profound impact on whether or not they were used in a successful breach. According to the researchers, "Using Google as a case study, we observe only 7% of victims in third-party data breaches have their current Google password exposed, compared to 12% of keylogger victims and 25% of phishing victims."

Now, the critical question is just how much more likely that makes an individual account to be compromised if the credentials are taken by any of these methods. And that's where the statistics reported in the paper become truly eye-opening. The paper reports, "We find victims of phishing are 400x more likely to be successfully hijacked compared to a random Google user. In comparison, this rate falls to 10x for data breach victims and roughly 40x for keylogger victims."

So for this population, falling victim to a phishing attack makes an account 400 times more likely to be compromised than the general user population. While this result is for a specific user community, it is reasonable to assume that at least the range of the difference will be similar for other user communities such as, for instance, the users of your enterprise network.

All of this works together to suggest that the most productive credential safety efforts would be those that target phishing attacks. And while there are certainly technology solutions that can aid in slowing phishing attacks, the most important defense mechanism is an educated user.

The one technology reponse that the authors suggest is a move to some sort of multi-factor authentication -- something that steps beyond the classic name and password combination. They discuss the possibility of some sort of behavioral or location-based factor, though they admit that there are advanved methods for spoofing many of those.

The next factor discussed is some sort of token-based solution, whether a dedicated hardware key, a key generator on a mobile device or a passphrase sent via message to a mobile device. While effective, these, too, have practical limitations to their adoption in mnay organizations. Which brings us back to user training.

Advanced user training on recognizing and not responding to phishing attacks should be considered a crucial part of any IT security program. Another piece, related to training, should be the knowledge that users can ask the IT security group to inspect and verify any request for information that has even the slightest whiff of suspicion about it.

As the authors write in the conclusion of their report, "Our findings illustrate the global reach of the underground economy surrounding credential theft and the need to educate users about password managers and unphishable two-factor authentication as a potential solution."

What's your plan?

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/17/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5421
PUBLISHED: 2020-09-19
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
CVE-2020-8225
PUBLISHED: 2020-09-18
A cleartext storage of sensitive information in Nextcloud Desktop Client 2.6.4 gave away information about used proxies and their authentication credentials.
CVE-2020-8237
PUBLISHED: 2020-09-18
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
CVE-2020-8245
PUBLISHED: 2020-09-18
Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11....
CVE-2020-8246
PUBLISHED: 2020-09-18
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-W...