02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DID: 4046925<br />

UNCLASSIFIEDflFOR OFFl61AL l:J5E ONLY<br />

no Col. Robert Melville at West Point. Aaron Ferguson, a computer-security expert<br />

with <strong>the</strong> National Security Agency who teaches at West Point crafted <strong>the</strong> email. The<br />

gullible cadets received a 'gotcha' email, alerting <strong>the</strong>m <strong>the</strong>y could easily have<br />

downloaded spyware, 'Trojans' or o<strong>the</strong>r malicious programs and suggesting <strong>the</strong>y be<br />

more careful in <strong>the</strong> future. Mr. Ferguson, who runs similar exercises each semester,<br />

said many cadets have been victimized by real online frauds.,,192<br />

The problem with this approach is that it can undermine company trust. Who would<br />

ever trust ano<strong>the</strong>r company email after being caught in a fake spear phishing attack?<br />

The fact remains, users must be extraordinarily vigilant and never provide personal<br />

information that is solicited by anyone without taking steps to verify <strong>the</strong> au<strong>the</strong>nticity<br />

of that request. Sometimes a phone call is <strong>the</strong> best way to ensure that an email<br />

request from <strong>the</strong> HR person for your personal data really came from that department<br />

and not from a spear phisher.<br />

How do you protect yourself from more and more sophisticated phishing scams?<br />

~ never, ever under any circumstances click on a link in an unsolicited email,<br />

especially one that asks you to click on <strong>the</strong> link to confirm or update personal<br />

or financial information.<br />

~ instead, type <strong>the</strong> address directly into <strong>the</strong> browser yourself and <strong>the</strong>n check to<br />

see if that company has any security alerts about phishing scams.<br />

~ always make sure that <strong>the</strong> SSL is enabled before entering any personal or<br />

financial data; <strong>the</strong> browser will show a locked padlock: ~ or ~<br />

~ learn how to view and interpret <strong>the</strong> message source code of an email<br />

message; when in doubt about <strong>the</strong> true source, assume <strong>the</strong> worst.<br />

~ stay on top of <strong>the</strong> news about scams; frequent <strong>web</strong>sites such as <strong>the</strong> one run<br />

by <strong>the</strong> Anti-Phishing Working Group.<br />

~ when in doubt, contact <strong>the</strong> source by telephone to make sure <strong>the</strong> request is<br />

legitimate.<br />

For anyone concerned about phishing attacks (and that should be all of us), <strong>the</strong>re<br />

are several free online tools to help you tell if a uri in an email or on a <strong>web</strong>page is<br />

legitimate (that is, is it what it says it is, or is it something entirely different?). These<br />

"uri decrypters" are designed to reveal <strong>the</strong> real addresses of obfuscated uris.<br />

Nothing could be simpler to use: just copy <strong>the</strong> obfuscated uri from an email or from a<br />

192 David Bank, "'Spear Phishing' Tests Educate People About Online Scams," The Wall Street<br />

Journal Online, 17 August 2005, (14 November 2006).<br />

UNCLASSIFIEDf..'FQR QFFISIAb b1S~ QNbY 553

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!