A new research experiment conducted by Web security firmTrusteer found that eveneducated email users click on links that can potentially lead towebsites containing malware, the company said.

|

New York-based Trusteer’s findings shed light on the potentialconsequences of the recent security breach at marketing firmEpsilon, a subsidiary of Alliance Data Systems Corp., whichreported this month that an unauthorized entry into its emailsystem resulted in the compromise of approximately 2% of itsclients’ customer names and email addresses.

|

The marketing firm manages customer email databases for morethan 2,500 clients including large financial institutions andretailers.

|

Security experts say they expect the breach to result intargeted email phishing attacks, and while credit unions were notamong the reportedly affected Epsilon clients, several CUs postedmessages on their websites warning members that they could betargeted if they opted in to an Epsilon client email marketinglist.

|

The Trusteer experiment entailed sending emails that listed thesocial networking site LinkedIn as the sender to 100 friends andfamily members of Trustee researchers. The emails contained a linkthat claimed to lead users to a new job alert, but instead directedthem to an outside website – a common strategy used by attackers,Boodaei said. Within seven days, Trusteer found that 68 of the 100subjects had followed the link.

|

The company posted a blog detailing the experiment on itswebsite, which states, “This research clearly demonstrates thatsocial engineering makes it easy to drive corporate users to fakewebsites that could potentially download malware onto theircomputer. Education is always recommended and can certainly help,but in this case education did not prevent the attack.”

|

Trusteer customized the emails crafted for the experiment bycreating a new identity on LinkedIn and gathering information aboutrecipients’ LinkedIn connections and their connections’ profiles,the company said. Researchers used Gmail to create the fakeLinkedIn email account and included photos of victims’ connectionsdownloaded from LinkedIn.

|

Since mail programs typically only display thename of the sender – not the sender’s full email address – foolingrecipients was simple, Trusteer CEO Mickey Boodaei said.

|

“It’s very easy to create a convincing email and attack anemployee’s desktop,” Boodaei said. “Since it is so easy to execute,I believe this will be the No. 1 attack vector in the next coupleof years.”

|

The lesson learned from the experiment, Boodaei said, is thatcompanies should concentrate on implementing technology that canprevent malware installation, not educating employees about how tospot malicious emails.

|

“Enterprises should assume employees will click on the links,”he said. “Then they should focus on how to prevent the links frominfecting the software, and that comes down to technology.”

|

Todd Thiemann, senior director of product marketing for SanJose, Calif.-based data security provider Vormetric, said he agrees educatedemail users can be tricked.

|

“Human beings are fallible,” he said. “Even a savvy person canmake a mistake.”

|

Thiemann added credit unions can draw two lessons from theEpsilon breach: First, to implement an in-depth data defensestrategy, and second, to re-think the definition of “sensitivedata.”

|

“Data is considered sensitive when you’re talking aboutthousands of client names and email addresses,” Thiemann said.“There’s a high probability of success for the fraudster who hasthat information.”

|

An “in-depth” defense strategy should include the followingactions, Thiemann said: Only allow certain individuals access tosensitive data and then only via proper encryption, performdatabase activity monitoring, develop a strong system for securityinformation management, implement a host intrusion preventionsystem, and run up-to-date antivirus software from a reputablevendor.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.

Natasha Chilingerian

Natasha Chilingerian has been immersed in the credit union industry for over a decade. She first joined CU Times in 2011 as a freelance writer, and following a two-year hiatus from 2013-2015, during which time she served as a communications specialist for Xceed Financial Credit Union (now Kinecta Federal Credit Union), she re-joined the CU Times team full-time as managing editor. She was promoted to executive editor in 2019. In the earlier days of her career, Chilingerian focused on news and lifestyle journalism, serving as a writer and editor for numerous regional publications in Oregon, Louisiana, South Carolina and the San Francisco Bay Area. In addition, she holds experience in marketing copywriting for companies in the finance and technology space. At CU Times, she covers People and Community news, cybersecurity, fintech partnerships, marketing, workplace culture, leadership, DEI, branch strategies, digital banking and more. She currently works remotely and splits her time between Southern California and Portland, Ore.