GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    cR0w :cascadia: (cr0w@infosec.exchange)'s status on Thursday, 11-Jan-2024 07:18:56 JST cR0w :cascadia: cR0w :cascadia:

    To prove the point that users will continue to click links, regardless of how obvious it is that they shouldn't, I worked with the person in charge of the monthly phishing trainings at $dayjob last month. Historically, they have used the hated ruses like fake gift cards, and I wanted to try to get away from that, especially during the holidays. We ended up using something to the effect of the following:

    ---
    Hello <first name>,

    Happy Holidays. This is the monthly phishing test. Yes, really. It's not a trick. Use the <phishing reporting function> to report this as phishing. If you do not know how to use <phishing reporting function>, feel free to ask a colleague. If you still have questions, search for <phishing reporting function> on <internal docs site>.

    Do not click the following link as it is there for metrics and will cause you to be assigned phishing awareness training: <phishing training 'malicious' link>

    Sincerely,
    IT Security Team
    ---

    I don't know how well it was received by users, but I do know that we still had more clicks than two other months in 2023, despite being explicitly told not to click the link. Users will always click links with their link-clicking machines. Relying on their discretion is either ignorant, or I expect in some cases, malicious in that there will always be a scapegoat to blame for the inevitable breach.

    #phishing #infosec

    In conversation Thursday, 11-Jan-2024 07:18:56 JST from infosec.exchange permalink
    • Haelwenn /элвэн/ :triskell: and Pleroma-tan like this.
    • Matthew Lyon repeated this.
    • Embed this notice
      cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 12-Jan-2024 02:20:57 JST cR0w :cascadia: cR0w :cascadia:
      • Matthew Lyon

      @mattly This is the kind of malicious compliance I am here for.

      In conversation Friday, 12-Jan-2024 02:20:57 JST permalink
    • Embed this notice
      cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 12-Jan-2024 09:31:45 JST cR0w :cascadia: cR0w :cascadia:
      in reply to

      Phishing testing should be testing your security systems, controls, and processes, not bypassing them to test and blame the users.

      #phishing #infosec

      In conversation Friday, 12-Jan-2024 09:31:45 JST permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/111/738/739/737/461/437/original/5c885c25a0900382.jpg
    • Embed this notice
      cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 12-Jan-2024 09:31:46 JST cR0w :cascadia: cR0w :cascadia:
      in reply to

      If your org uses a third-party solution for phishing training, it is likely that all of the testing emails contain a specific header. Mail filtering is generally configured to allow them to bypass rules and make it to all inboxes as intended. It is also often used to prevent rewriting the URLs in links if your org has a system that does so ( Proofpoint, Barracuda, etc. ).

      As an employee, if you don't want to bother with the regular phishing training, look at the message details and see if you can find the header used to bypass protections in your org. Some of the common ones are:
      X-Phishtest
      X-ThreatSim-Header
      X-ThreatSim-ID
      X-PhishMeTracking
      X-PhishMe

      Then in your mail client, set up a rule to take whatever action you wish. You can create an alert, move the message to a specific folder, or even execute a program or script if IT hasn't disabled that function.

      I fully support those of you of a chaotic persuasion to take the URLs from your org's phishing messages and fully enumerate the unique identifier section. Just brute force it and see if everyone gets assigned phishing training.

      It used to be that as an attacker, you could put all of those headers in and likely bypass filters due to the org setting a basic allow rule for one of them for phishing training. However, more orgs have finally either moved to third-party mail service that usually does a better job at filtering, or they are getting around properly configuring SPF, DKIM, and DMARC with strict rules that specify sending domains that are allowed with the header mentioned above. YMMV, of course.

      #phishing #infosec

      In conversation Friday, 12-Jan-2024 09:31:46 JST permalink

      Attachments


      Jake Hildreth (acorn) :blacker_heart_outline: and Matthew Lyon repeated this.
    • Embed this notice
      cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 12-Jan-2024 09:31:48 JST cR0w :cascadia: cR0w :cascadia:
      in reply to

      This got more responses than I'm used to, which is brilliant, but I don't think I can respond to them all. And based on some of the responses, I don't think I was entirely clear, so here's a bit of a follow-up:

      It's possible there is a baseline of clicks recorded by previews, scanners, and users attempting to be careful in how they approach the link ( i.e. curl | less ). However, this is an enterprise product that has been in use for a while, including by this org, and if it was assigning users training that didn't click, I would think it would have been addressed. I don't know for sure though since I don't run that software.

      Several people mentioned potential reasons for users clicking: They're curious, they don't care about the org, they're trying to get a new laptop, the training makes for an easy workload for part of a day, etc. The thing is, I don't care. At all. My point in this was to prove that links will continue to get clicked, regardless of how well users are trained or informed. Intent and blame are meaningless here. What matters is that systems are built with that expectation in mind from the start. And while basic user training is beneficial, beyond checking a compliance checkbox, it provides no security benefit.

      As far as metrics in relation to other months of "training" in 2023 go, the number of views were roughly the same as other months, the number of reported emails were above average, but not as high as some months with attempted ruses, and the number of clicks was higher than two of the other months. Read into that what you will, but my only takeaway from that is that links get clicked.

      I also didn't mention that a big part of why I approached the phishing trainer when I did is because of the human element. End of year with the holidays and layoffs all over the place are a stressful time on their own. Creating a false hope for something like a bonus or gift in the name of security or training is an idea that needs to die. Users, otherwise known as the people who actually keep the org running, are already stressed. Don't make things worse.

      In conversation Friday, 12-Jan-2024 09:31:48 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: benefit.As
        benefit.as is parked
    • Embed this notice
      cR0w :cascadia: (cr0w@infosec.exchange)'s status on Friday, 12-Jan-2024 21:10:13 JST cR0w :cascadia: cR0w :cascadia:
      in reply to
      • James 🌈💜

      @shaknais I don't think either of those is bad. What was bad was how confident management was that there would be zero clicks because everyone has had training and "knows better."

      In conversation Friday, 12-Jan-2024 21:10:13 JST permalink
      Haelwenn /элвэн/ :triskell: likes this.
    • Embed this notice
      James 🌈💜 (shaknais@mastodon.social)'s status on Friday, 12-Jan-2024 21:10:15 JST James 🌈💜 James 🌈💜
      in reply to

      @cR0w I don't know what is worse - that it worked, or that I expected it.

      EDIT: worker/worked

      In conversation Friday, 12-Jan-2024 21:10:15 JST permalink
    • Embed this notice
      Ryan Castellucci :nonbinary_flag: (ryanc@infosec.exchange)'s status on Saturday, 13-Jan-2024 19:09:28 JST Ryan Castellucci :nonbinary_flag: Ryan Castellucci :nonbinary_flag:
      in reply to

      @cR0w This is Art.

      In conversation Saturday, 13-Jan-2024 19:09:28 JST permalink
    • Embed this notice
      Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 19-Nov-2024 10:09:56 JST Zimmie Zimmie
      in reply to
      • Rich Felker
      • Jørn
      • The_Turtle_Moves

      @cR0w @jornane @The_Turtle_Moves @dalias I share this every time “user education” is brought up as a solution to phishing. It’s the first two lines of an email sent by the security team at my company at the time.

      In conversation about 6 months ago permalink

      Attachments


      1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/506/230/462/216/282/original/594140e7e54058cf.jpeg
    • Embed this notice
      cR0w :cascadia: (cr0w@infosec.exchange)'s status on Tuesday, 19-Nov-2024 10:09:57 JST cR0w :cascadia: cR0w :cascadia:
      in reply to
      • Rich Felker
      • Jørn
      • The_Turtle_Moves

      @jornane @The_Turtle_Moves @dalias "You must click this link to learn why you must never click links."

      In conversation about 6 months ago permalink
      Rich Felker and Paul Cantrell repeated this.
    • Embed this notice
      Jørn (jornane@ipv6.social)'s status on Tuesday, 19-Nov-2024 10:09:58 JST Jørn Jørn
      in reply to
      • Rich Felker
      • The_Turtle_Moves

      @The_Turtle_Moves @cR0w @dalias We get Nanolearning links, which contain our mandatory security training.

      I couldn’t help roll my eyes when the topic was “don’t click links in emails”

      In conversation about 6 months ago permalink
    • Embed this notice
      The_Turtle_Moves (the_turtle_moves@mastodon.online)'s status on Tuesday, 19-Nov-2024 10:09:59 JST The_Turtle_Moves The_Turtle_Moves
      in reply to

      @cR0w the thing that pisses me off is that we do all this 'learn the three signs of phishing' crap (links, a grammatical error, from an external address), but then every quarter we are required, immediately, to open the employee satisfaction email, from an external sender, click the link, and enter our credentials.

      Stop requiring us to 'get faux-phished' by management, but also not 'get test-phished' by security and also not 'get real phished' by phishers.

      In conversation about 6 months ago permalink
    • Embed this notice
      Rich Felker (dalias@hachyderm.io)'s status on Tuesday, 19-Nov-2024 10:15:20 JST Rich Felker Rich Felker
      in reply to
      • Jørn
      • Zimmie
      • The_Turtle_Moves

      @bob_zim @cR0w @jornane @The_Turtle_Moves We Need To Stop Making Computer Systems With Clickable Elements That Can Do Harm.

      In conversation about 6 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.