Hackers exploit human vulnerabilities more than software flaws

PrivacyWatch: High cost of ransomware; Apple's Tim Cook on Facebook and privacy

Cybersecurity firms and analysts have been sounding the alarm on vulnerabilities in most web-based systems, pointing to loopholes and lapses in security. But a recent report from Proofpoint, a cybersecurity firm, said most cyberattacks are designed to take advantage of human error instead of flaws in hardware or software.

In their 2018 Human Factor Report, Proofpoint analyzed cyberattacks throughout 2017, looking into attempted attacks on nearly 6,000 organizations across the world. They found that almost every industry suffered from a growth in the number of attacks, ranging from phishing to ransomware and cloud application breaches.

"Email remains the top attack vector...Attackers are adept at exploiting our natural curiosity, desire to be helpful, love of a good bargain, and even our time constraints to persuade us to click," the report said.

Some 50 percent of all clicks on malicious emails occurred within an hour of it showing up in the victim's inbox. And 30 percent happened within 10 minutes of receiving the email. Hackers, either working on their own, with a group, or with a state-sponsored entity, attempted to take advantage of human trust in most cases. Nearly 55 percent of social media attacks that impersonated customer-support accounts were aimed at financial institutions.

"Many of these attacks rely on social engineering," the report noted. "Others simply take advantage of inclinations for immediate gratification, improved status, or even the reward of 'getting something for nothing.'"

The report continued: "But as the old adage goes, there is no such thing as a free lunch. The hidden costs of a bargain in social media channels can often be credential loss to phishing, coin mining through browser hijacking, and malware infections."

Surprisingly, phishing emails purporting to be from Dropbox were far and away the most common lure hackers used, followed by fake DocuSign emails, which had a higher rate of success, the report said. Of all malicious emails searched in the survey, ransomware and banking Trojans accounted for more than 82 percent.

How to protect yourself from cyberattacks like WannaCry

The study had a number of interesting observations and tidbits concerning when and how hackers attempt to infiltrate our lives. Europe and Japan had higher-than-usual proportions of banking Trojans, at 36 percent and 37 percent respectively, while the rest of the world suffered mostly from ransomware.

Proofpoint said education, consulting, and entertainment firms suffered from the largest number of email fraud attacks, with each organization averaging about 250 attacks.

Crimeware was specifically used when attacking the tech and healthcare industries, and the manufacturing industry was repeatedly hit with phishing attempts along with the construction industry.

"As the threat landscape continues to evolve, new tools and approaches are emerging regularly. But one thing remains constant: the human factor," the report said. "More than ever, cyber criminals rely on people to download and install malware or send funds and information on their behalf."

Last year, there were massive spikes in hacking attempts related to cryptocurrency, with instances of "cryptojacking" rising and falling with the price of Bitcoin. Cloud computing also could not keep users safe, with every major tech companies' cloud service suffering from an attack, the report said.

"Attackers are opportunistic and adaptable. They take advantage of new options, vectors, and tools to increase their chances of success," the report noted. "These opportunistic attacks extend to social media channels and cloud-based tools as well. Fraudsters and other attackers capitalize on major events and trends and leverage legitimate services to trick defenders and victims."

Proofpoint also named multiple groups that experts know are behind many of the attacks that were done last year, including the North Korea-backed Lazarus Group, Fin7, and the Cobalt Group. Many of those organized into groups were going after government, defense contractors, and financial institutions, but some had begun to attack individuals as well.

Kevin Epstein, vice president of Threat Operations for Proofpoint, told Computing Magazine that organizations had to focus on stopping attacks before they could even reach people's' inboxes or networks.

"Reducing initial exposure minimizes the chances that an organisation will experience a confidential data breach, business disruption, or direct financial loss," Epstein said said.

This article originally appeared on TechRepublic as "Why human vulnerabilities are more dangerous to your business than software flaws."

f

We and our partners use cookies to understand how you use our site, improve your experience and serve you personalized content and advertising. Read about how we use cookies in our cookie policy and how you can control them by clicking Manage Settings. By continuing to use this site, you accept these cookies.