#Spearphishing Attacks are headed your way even though they appear to be messages from your boss!

20 November 2015 Internet, IT & e-Discovery Blog Blog
Authors: Peter Vogel

Infoworld recently highlighted spearphishing which is “a targeted approach to phishing that is proving nefariously effective, even against the most seasoned security pros.”  The November 9, 2015 report was entitled “10 reasons why phishing attacks are nastier than ever” including the fact that spearphising is sent by some you know which is very different that the Nigerian prince:

They often appear to be from a boss, team leader, or some other authority figure up the management chain to ensure the victim opens the email and is more likely to do whatever the email says.

The email could be from an outside, sound-alike email account meant to resemble the authoritative person’s personal email account. After all, who hasn’t received a work-related email from a co-worker who accidentally used his or her personal account? We accept it as a common mistake.

It might arrive from a sound-alike account name from a popular public email server (Hotmail, Gmail, and so on), with the sender claiming to be using this previously unknown account because they are locked out of their work email. Again, who hasn’t been through this before?

But more likely than not, the fake phishing email appears to arrive from the other person’s real work email address, either because the phishing organization is able to send fake email origination addresses from the outside, or it has successfully compromised the other person’s email account. The latter is becoming the most popular attack method — who wouldn’t click on a link sent by their boss?

The better prepared and educated the less likely that employees will fall prey to phishing and spearphishing, but when you read the list maybe training will not help:

  1. The attack is handcrafted by professional criminals
  2. The attack is sent by someone you know
  3. That attack includes a project you are working on
  4. Your attacker has been monitoring your company’s email
  5. Your attacker can intercept and change emails as needed
  6. Your attacker uses custom or built-in tools to subvert antivirus software
  7. Your attacker uses military-grade encryption to tunnel your data home
  8. Your attacker covers their tracks
  9. Your attacker has been in your environment for years
  10. Your attacker is not afraid of getting caught

Phishing and spearphishing are growing so being better educated is critical to protect all businesses.

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Authors

Related Services

Insights

California Statute Offers Dramatic Change to Independent Contractor, Franchise-Franchisee Relationships
20 September 2019
Legal News: Distribution & Franchise
AI Ouch! AI Job Interview Law Starting in 2020!
20 September 2019
Internet, IT & e-Discovery Blog
RCE PTA Carve-Out Resumes After Interference
18 September 2019
PharmaPatents
The Ninth Circuit Expected to Rule that Doctors Can Be Wrong in the Winter v. Gardens False Claims Act Case
18 September 2019
Legal News: Government Enforcement Defense & Investigations
Lacktman, Ferrante Cited in mHealth Intelligence About Ryan Haight Act
19 September 2019
mHealth Intelligence
Vernaglia Comments on AHA v Azar Decision
18 September 2019
MedPage Today
Tinnen Discusses How Viewpoint Diversity Helps Businesses Thrive
18 September 2019
InsideTrack
Lach Comments on Launch of New Group
16 September 2019
BizTimes Milwaukee
MedTech Impact Expo & Conference
13-15 December 2019
Las Vegas, NV
Review of 2020 Medicare Changes for Telehealth
11 December 2019
Member Call
BRG Healthcare Leadership Conference
06 December 2019
Washington, D.C.
CTeL Telehealth Fall Summit 2019
04-06 December 2019
Washington, D.C.