Story image

Impersonation attacks rise 400% as email security struggles to keep up

12 Jun 2017

20% of all risky emails are bypassing security in systems worldwide, despite efforts to deal with the problem, according to Mimecast's quarterly Email Security Risk Assessment.

The company says that both unknown and known attacks are on the rise. Those attacks are continuing to get through 'incumbent' email systems.

Impersonation attacks grew 400% quarter over quarter. These attacks involve social engineering emails that appear to be from a trusted C-level executive, employee or business partner.

Business email compromise (BEC) scams are a particularly worrying trend because they contain no malware -- instead they fool victims into sending money or sensitive data. In addition, there were 8605 impersonation attacks.

The report analysed 44,000 items of inbound email over 287 days. Over that period, there were 8.9 million spam items, 8318 dangerous file types, 1669 known malware attachments and 487 unknown malware attachments.

Most of those emails had already made it through organisations' email security systems.

“Cybercriminals are constantly adapting their attack methods. For instance, this latest ESRA analysis reflects how impersonation attacks are getting through existing email security defenses at an alarming rate. If a CISO isn’t reviewing its current email security solution on a 12-18 month basis, they may be surprised at what threats are now getting into employees’ inboxes,” comments Ed Jennings, chief operating officer at Mimecast.

According to US statistics from the FBI, BEC scams cost businesses more than US$5.3 billion in fewer than three years. Between January 2015 and December 2016, identified exposed losses shot up by 2370%.

“Email security providers need to ensure they’re doing their due diligence to protect customers from new attacks, whether they be advanced or simple. The Mimecast ESRA results show a clear need for the security industry to come together in the fight against email-borne threats," Jennings says.

Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.