Security Manager's Journal: Spam makes a comeback
Out of the blue, phishing attacks previously caught in the spam filter are getting through to employee inboxes.
Computerworld - How could spam be an issue for a security manager in 2013? It's been years now since we all started subscribing to services that do a phenomenal job of filtering out advertisements for prescription medications and exotic vacations and dumping them into spam folders, where they usually accumulate and never bother anyone.
Until this past week, I likely hadn't spent five minutes in 10 years thinking about spam -- a testament to the effectiveness of spam filters. After all, about 98% of our incoming email is spam. If we didn't have effective spam-filtering engines, every employee would receive an extra 40 to 50 emails per day. That would hit productivity.
Probably because real spam has long been out of sight and out of mind for our employees, our general counsel was dismayed when he recently started regularly receiving emails that he deemed to be spam. He forwarded some of them to me, wondering what was going on. The emails purport to be from organizations such as ADP, FedEx and eFax, and at first glance they look legitimate. Only an inspection of the email headers would tell you otherwise.
Some of the emails contain links to questionable sites in places like China and Russia. Some include attachments that are supposedly required certificates or e-fax documents but in reality are zip files containing an .exe file. In short, these are not ordinary spam -- which is annoying and clogs networks but is generally benign. No, these are phishing attacks.
Soon, others in the company began to complain about an increase in spam. Why, I wanted to know, weren't these phishing attacks being intercepted and shuttled away from employees' inboxes?
I was aware that we have been migrating users to a managed Microsoft email service and that there had been talk of saving money by dropping our current spam provider in favor of Microsoft's spam prevention system, which is bundled with the mail service. I figured that was likely the root of the problem, and sure enough, my suspicions were right.
We previously had not only inspected attachments, but also restricted the types of attachments authorized to be delivered. We also had what is called Sender Policy Framework checking enabled, which verifies that senders are really who they say they are. When the email team migrated our email, they neglected to enable these critical security functions. And thus spam has become an issue of concern for me in 2013. Now, employees potentially could click attachments or links and execute malicious programs.
Luckily our endpoint protection software prevented most of the attachments from causing harm, but there wasn't 100% detection. As a result, I'm having my security team analyze the suspicious email attachments and links that have been identified and build rules in our security incident and event management tool to look for evidence that employees have clicked on any of them or downloaded nefarious software.
We have also recently enabled a really cool feature within our Palo Alto Networks firewalls called Wildfire, which redirects executable files to a secured sandbox, where it evaluates the program to determine whether it is malicious. Unfortunately, since this is a new functionality, we're simply monitoring the events and haven't yet enabled blocking.
We've had to take action a couple of times, but we've been lucky so far. For example, one attachment that was executed by several employees proved upon evaluation to be programmed to reach out to a server in China to download additional software. Luckily, the server in China had been taken down.
Now, we have to continue to monitor for suspicious activity, and I need to ensure that our current email architecture is deployed in a secure manner.
This week's journal is written by a real security manager, "Mathias Thurman," whose name and employer have been disguised for obvious reasons. Contact him at firstname.lastname@example.org.
Join in the discussions about security! computerworld.com/blogs/security
More by Mathias Thurman
- Security Manager's Journal: A ransomware flop, thanks to security awareness
- Security Manager's Journal: Taking steps to better lock down the network
- Security Manager's Journal: Dealing with the heartburn of Heartbleed
- Security Manager's Journal: A deal that's too good to be true
- Security Manager's Journal: Virtual machines, real mess
- Security Manager's Journal: Stopping vendors from making us a Target
- Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
- Security Manager's Journal: Another step toward eliminating data loss
- Security Manager's Journal: Siccing MDM on personal mobile devices
- Security Manager's Journal: An admin surfing on a server? That's a big no-no
Read more about Security in Computerworld's Security Topic Center.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!