Most of the data breaches we hear about on the news are executed to extract money or personal information from its targets. In 2016, the Democratic National Committee was hacked by the Russian government, resulting in the release of tens of thousands of emails and the manipulation of our country’s democratic elections. This act didn’t take an army of hackers, hurriedly typing, attempting to break through one firewall after another. Russian hackers simply crafted and sent emails to specific people, for example, Chairman John Podesta, tricking them into believing that the email was from Google. This allowed hackers to obtain their login and password credentials. This breach was enacted through a tactic called spear-phishing. And this is just one type of social engineering tactic used to con millions of dollars annually.
Phishing is a social engineering tactic used by hackers to obtain sensitive data, such as financial information or login details. Attackers send fraudulent emails, disguised as legitimate emails from a trustworthy institution, in order to deceive targets into giving personal information. Smishing, vishing, and spear-fishing are derivatives of phishing, each utilizing either different means of communication or different targeting schemes. Smishing uses SMS messages and texts to mislead targets, and vishing uses communication via phone to trick victims. Both use the guise of legitimate organizations to cheat their targets.
Hackers use these types of attacks because they have higher success rates than typical methods of hacking, while typically requiring less expertise to execute. For these reasons, the frequency of phishing attacks, as well as smishing, vishing, and spear-phishing attacks are increasing.
Hackers have placed great emphasis on smishing because text messages have approximately a 98% open rate and a 45% response rate, statistics much higher than other mediums of communication. According to the Verizon 2020 Mobile Security Index report, 39% of companies suffered a mobile-related security compromise, and 85% of attacks seen on mobile devices now take place via mediums other than email. Proofpoint's 2020 State of the Phish Report indicates that approximately 84% of organizations faced smishing attacks.
Vishing attacks have also been on the rise recently. CSO Online reports that in 2018, vishing calls represented roughly 30% of all phone calls. Though the website notes that only 6% of victims lose money, the average amount is almost $1000. Vishing can be particularly persuasive though. The same report comments that 75% of scam victims said that vishers, or the perpetrators of vishing attacks, have key pieces of personal knowledge, which allow them to target and exploit the victims.
Spear-phishing has become increasingly inviting as well, as spear-phishing campaigns targeting employees increased by 55% in 2016 as reported by the 2016 Symantec Internet Security Threat Report. The same report states that even now, 65% of attackers use spear-phishing as a primary mode of infection. Targeting specific people, oftentimes people with great power, influence, or wealth, can allow for great benefits.
Overall, these forms of phishing can result in chaos and require significant sums to rectify. Successful phishing attacks cost an average of $3.86 million according to Norton. Spear-phishing emails can sometimes cost more. Small Business Trends says that spear-phishing payouts average $7.2 million. Some have to pay more. In 2015, 78.8 million health plan records were stolen from Anthem as a result of an employee responding to a spear-phishing email. Anthem had to pay 16 million dollars to the Office for Civil Rights (OCR) and settle a class-action suit for $115 million.
Businesses should train their employees to recognize the hallmarks of classic social engineering strategies. Employees should always have a healthy level of suspicion when reading their emails and texts, or while answering the phone.
For SMS messages and texts, employees should:
Regarding phone calls, employees should:
Regarding spear-phishing, employees should:
Essentially, smishing, vishing, and spear-phishing are becoming increasingly popular tactics for hackers to breach companies’ critical systems. Though typical phishing strategies are still very commonly used, many companies have properly trained employees to recognize and avoid phishing emails. For this reason, attackers are relying more and more on smishing, vishing, and spear-phishing. Though these attacks appear to be difficult to detect, it is quite the opposite. There are some clear indications that a message, call, or email is a social engineering attack. Businesses should train their staff to recognize the hallmarks of smishing, vishing, and spear-phishing, and implement procedures to reduce the probability of a successful social engineering attack.
Cybersecurity awareness training should not only be about providing classroom or virtual training to employees once in a year or once in 6 months, but should also include periodic reminders, tips, quizzes, etc. to keep cyber attacks and protection top of mind for employees.