Defending Your Organization Against Whaling Phishing

Defending Your Organization Against Whaling Phishing

Do you hold a high-authority position within your organization, such as a C-level executive like CEO, CTO, CFO, CMO, and CLO? If so, this article is written to assist you in navigating through phishing attacks that target profiles of individuals in your role. It is called whaling phishing. Phishing is one of the most common ways to spread malware by tricking people to open malicious URLs or attachments. It only takes a second of tiredness and unconscious clicking on the link or attachment within our inbox. At first glance, that link or attachment might seem legitimate, but what is behind it is often what puts our organizations in chaos. In this article, we will discuss phishing attacks, with a focus on whaling attempts. We’ll cover how to identify them, how they operate, and the most effective methods to combat these attacks. Let’s start by breaking down the fundamentals.

What Is a Phishing Attack?

Phishing is the malicious practice of tricking people into revealing sensitive personal or business information (credentials, credit cards, or similar). Attackers create or design phishing emails in such a way that they are challenging to distinguish from legitimate emails. According to our research from 2023, phishing attacks remain number one on the list at 39.6%. It is very often combined with other malware such as HTML, URL, PDF, and executables.
Attack Type Usage in 2022
Also, according to Ransomware Attacks Survey 2022, nearly 6 in 10 ransomware attacks (58.6%) originated from malicious email or phishing attacks.

What are the types of phishing attacks?

There are different types of phishing attacks and their variations, but they all share one common goal: tricking us to open harmful links or attachments. The thing that sets them apart is how they spread and who they’re trying to target. That includes spear phishing, whaling phishing, angler phishing, pharming, pop-up phishing, and others. Spear phishing and whaling phishing are about who the targets are. Spear phishing targets regular employees while whaling phishing targets high-profile employees, such as C-level executives.
Phishing vs spear phishing vs whaling

What Is Whaling Phishing?

The whale is often seen as the king of the ocean, representing a symbol of high authority. In terms of phishing, a whale refers to C-level executives. C-level executives hold significant authority within an organization, and the metaphor draws a parallel between these powerful individuals and the whale in the ocean. With their authority, C-level executives become targets for whaling attacks, which aim to deceive and exploit them due to their access to sensitive information and decision-making power. When the CEO asks for an urgent request from employees, they usually get it. Isn’t it? There are two data breaches involving whaling phishing we would like to share with you. One happened at Seagate in 2016 when a group of hackers compromised the payrolls and tax information of approximately 10,000 current and former employees. In this case, the attackers targeted the HR department by impersonating a CEO. The second attack occurred in 2016 during the FACC Cyber Heist, where attackers tricked the finance department into transferring almost 42 million € to their accounts. They used the same trick, impersonating a CEO. The money was never recovered. The CEO was fired.

How Whaling Phishing Is Distributed

As with any phishing attack, whaling phishing is distributed via email, SMS, and voice. Let’s explore them through real-world examples.

Email phishing

According to our Cyber Security Report 2023, email continues to be the primary mechanism of communication for many organizations, with 333.2 billion emails sent every day. That is exactly how whaling phishing attacks are being spread. Attackers create deceptive emails, pretending to be CxO, and ask you to share payroll, tax information, or the latest project plan.
An example of whaling phishing spread via email

Smishing (SMS Phishing)

Smishing (SMS Phishing) is a type of attack where attackers use SMS text messages to trick the victim. For example, attackers impersonate a CEO and ask the Finance representative to make important payments ASAP. Here is an example of an SMS Message. “URGENT: Hey John – I’m in a meeting right now, and we need to make an important payment ASAP. Please reply with the company credit card details, including the CVV, so I can proceed. Thanks.” Never do this. Your CEO would never ask you to send credit card details via SMS.

Vishing (Voice Phishing)

Vishing (Voice Phishing) is tricking people via phone. Here is one example. Attacker (impersonating a CEO): Hello, this is Max Musterman, CEO of YYY organization. I am calling your (HR) department as I need your urgent assistance. May I know whom I am speaking to? Employee (Victim): My name is John, working as an HR representative. How can I assist you? Attacker (impersonating a CEO): We are analyzing the investments we make for salaries. As all systems are down, including email, I would like to ask you to send me the payroll report for all employees to my private email (Name.Surname@gmail.com). Would that be okay for you, please? Employee (Victim): Sure. You will have it soon in your inbox. Why do you think the employee promptly shared details with the CEO in his private email? In this voice phishing attack, the attacker gained access to legitimate information that the company had publicly disclosed. The company had a system outage due to a bandwidth issue, which they publicly shared with their customers. Taking advantage of this situation, the attacker successfully deceived the HR representative. That was a social engineering and phishing attack! There are also other variations of how phishing can be delivered, including QR code scams. Stay safe by reading more here: All You Need to Know About QR Code Scams.

How Whaling Phishing Attacks Work

There are three different phases in the phishing attack that are also applicable to the whaling attack.
  1. First, an attacker would do research about the potential target, his role in the company, and his relationship with other employees.
  2. Secondly, based on the data the attacker has found, he will create a tailored phishing email that looks like a legitimate email. Remember from the previous part, that is how HR and Finance departments from Seagate and FACC Cyber Heist were tricked.
  3. From there, the attacker will attempt to deceive and convince the target into clicking on the link or attachment to gain access to the system. Once the victim clicks on the link, the attacker will need to bypass security measures, inject a malicious payload, and ultimately steal data and sensitive information.

Examples of Whaling Attacks

When we examine the examples of whaling attacks, we can identify a few. The first one would be CEO Fraud, where the attacker impersonates the CEO and asks lower management to share sensitive information or make an urgent payment. The second example could involve an impersonated board member. The attacker might send an email to the CEO and request sensitive information about projects, financial plans, growth strategies, or other business strategies. Another type involves targeting vendors or partners. The attacker pretends to be a trusted partner with whom the organization regularly interacts and asks for the latest project plan, changes to the payment plan, account information, or similar details. Some other examples may target the legal team, finance team, HR, marketing, IT department, executive assistant, and others.

Detecting a Whaling Attack

There are two crucial factors here. The first one is to have proper IT security tools and hardened systems that follow security best practices. The second factor is to have continuous security training, which will help CxOs recognize whaling phishing attacks and forward them to the IT team for analysis. Here are some potential red flags that lead to suspicion:
Detecting a whaling attack

Check the email address

Even if the name in the email address appears to be that of a CxO, upon closer examination, you may notice that the actual email address is different, indicating a possible phishing attempt. Also, keep an eye on the domain name; for example, @Company.com is not the same as @Company.net.

Check the email content

Have you ever received this kind of request before? Pay attention to the tone and language of the email. Are there any grammatical errors? All of these can be red flags.

Urgent actions are needed

Phishing, including whaling attacks, often employs urgency to pressure you into immediate action. Don’t fall for it; take your time to verify the request before proceeding.

Flag external emails

You can use security tools to flag external emails, giving you a heads-up that you should pay attention to. This helps against partner and vendor fraud.

Report whaling attempts

You should use tools to report whaling phishing emails to IT for further analysis. This helps enhance the infrastructure, create reports, and learn from new incidents. Being aware of these red flags can help protect against whaling phishing attacks.

How to Protect Your Organization From Whaling Phishing With Hornetsecurity

Phishing is created and sent by malicious actors, but we often end up clicking on it due to human error. According to the World Economic Forum – The Global Risks Report 2022, 95% of all cybersecurity incidents are caused by human error. So, if we train CxOs and our end users, this number will definitely decrease. Do you agree? Here at Hornetsecurity, we have developed a Security Awareness Service to help you train your CxOs on how to stay safe. Our system can assist you in creating realistic whaling phishing attacks for training purposes.
You can simulate whaling phishing attacks in Hornetsecurity
You can also use the awareness dashboard to track your CxOs’ progress. The awareness dashboard can be customized based on your organization’s needs, and it provides real-time monitoring, ESI reporting with history and forecasts. ESI stands for Employee Security Index and helps determine the level of security within the organization. The Security Awareness Platform also includes a security hub with all learning materials to increase security awareness. It offers an evaluation of each user’s individual phishing simulation, a gamification approach, and learning content available in multiple languages. For an overall look at cybersecurity risks gained from analyzing 25 billion emails, see our free Cyber Security Report 2023.
To properly protect your cyber environment, use Hornetsecurity Security Awareness Service to train your employees in deterring cyber threats and securing your critical data. We work hard perpetually to give our customers confidence in their Spam & Malware Protection, Email Encryption, and Email Continuity strategies. To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Wrap Up

Phishing attack is one of the most common techniques to trick people into opening harmful links or attachments. It has different variations, and one of them is whaling phishing. Whaling phishing targets profiles of high authority, including C-executives. It is spread via email, SMS, and voice, and it sounds convincing since it comes from the higher levels in the organization. One of the best ways to prepare your CxO level against whaling phishing is to train them. You can do this by simulating whaling phishing attacks in Hornetsecurity. This article explains phishing attacks with an emphasis on whaling attacks, discussing the various ways they are spread and how you can secure your data against them.

FAQ

What is whaling phishing?

Whaling represents a prevalent cyber-attack strategy wherein attackers employ sophisticated spear phishing techniques to target prominent and significant individuals, often aiming at top-tier (C-level) executives within an organization.

What is whale vs. spear phishing?

Spear phishing is a targeted cyber-attack that singles out a particular group of individuals. In contrast, whaling directs its efforts toward key executives within an organization. Spear phishing primarily aims to pilfer login credentials and sensitive information. On the other hand, Whaling sets its sights on acquiring confidential trade secrets capable of significantly impacting a company’s overall performance.

What is an example of whaling phishing?

Here are the top three examples of whaling phishing:
  1. Unencrypted Email Conversation Interception – Cybercriminals can seize and disrupt unencrypted email exchanges to redirect substantial bank transfers.
  2. Malicious Meeting Invitation – Employing a deceptive tactic, attackers might arrange a fictitious meeting while embedding a malware link masked as a Zoom link.
  3. Deceptive Payroll Data Request – Cyber attackers could pose as legitimate sources, requesting confidential payroll details for present and former employees, potentially leading to identity theft and fraud.

What is whaling also known as?

Also recognized as CEO fraud, whaling resembles phishing as it employs techniques like email and website spoofing. These tactics are utilized to deceive a target into carrying out particular actions, such as disclosing sensitive information or executing money transfers.

What safeguards can be taken to defend against whaling phishing attacks?

  • Perform Security Awareness Training for employees
  • Utilize Two-Factor Authentication (2FA)
  • Email filtering and verification
  • Validation of email addresses
  • Exercise caution regarding urgency
  • Implement Security Policies
Understanding Supply Chain Attacks and Protecting Your Business

Understanding Supply Chain Attacks and Protecting Your Business

In today’s complex infrastructure, there are a lot of software and hardware dependencies. As a vendor, you are not always in control of all dependencies, but leverage them for your product or service to work properly.

Using third-party dependencies and integrating external components into your product opens up potential vulnerabilities and attack vectors. Attackers might exploit weaknesses in the supply chain to gain unauthorized access to customers’ networks and compromise the data.

That is what happened with the recent SolarWinds supply chain attack, a malware activity done by hackers. This article goes deep on supply chain attacks and how you can protect your infrastructure in the best way.

Let’s break down the fundamentals first.

What is a Supply Chain Attack?

Imagine you are a vendor offering your software product to your customers. In order to provide product updates, you use third-party components because it is more convenient to utilize something that is already in the market rather than developing it from scratch.

You are in control of your product and you ensure it is developed and tested by following software development best practices. However, the product you use for distributing updates on the customer side is under the control of another supplier or vendor.

Now, attackers – are sneaky, unethical people. They exploited that third-party product, found vulnerabilities, and gained remote access to your customer network. That is what a supply-chain attack is. It involves attackers targeting your customers through third-party dependencies or components you use to make your product fully functional.

Supply chain attack in practice

That is precisely what occurred in the fairly recent SolarWinds attack, the IT management platform. The attacker injected malicious code into an update of SolarWinds and gained remote access to thousands of servers, affecting both private and government institutions.

An interesting sidenote is that the attackers injected their code into the actual build pipeline, so that when the new version was signed as being an official SolarWinds update, it also contained the malicious code.

What is a Supply Chain Attack?

A supply chain attack can occur through one of the most common methods, phishing. Phishing is a malicious practice used by hackers to deceive individuals into opening malicious links or attachments, with the aim of tricking them into revealing sensitive data.

It is mostly delivered via email but also can be delivered via SMS or voice. One of the ways where people get tricked is via QR scams. Here is all you need to know about QR Code Scams.

We conducted an analysis of the impact of different malware activities and published it in our Cyber Security Report 2023 and Ransomware Attacks survey.

There are four phases of how a supply chain attack occurs, including compromising the vendor, injecting malicious code, distributing it to customers, and data theft. Here is the flow.

Four phases of how a supply chain attack occurs
  1. Compromising the vendor. Hackers compromise vendors by exploiting third-party dependencies and external update components.
  2. Injecting malicious code. Hackers inject malicious code into an external component used for distributing updates. The code acts as a backdoor to connect to remote machines.
  3. Distributing it to customers. The injected update will be distributed to customers’ sites in the next update cycle.
  4. Data theft. Now, when the update is distributed, attackers can access remote systems and make compromises and data theft.
This is the process that applies to any software or hardware supply-chain attack.

Examples of Supply Chain Attacks

There are several supply chain attacks that occurred in the past few years that helped us as cybersecurity professionals to learn, but also provided opportunities for vendors to strengthen their security. In this section, we will list some examples of recent supply-chain attacks.

One of the latest supply-chain attacks occurred just recently, in July 2023. British Airways, BBC, and UK pharmacies (along with nearly 500 other companies) suffered a supply chain attack after attackers exploited MOVEit, managed file transfer software. British Airways spokesperson confirmed it in one of their public statements told to The Register „We have been informed that we are one of the companies impacted by Zellis’ cybersecurity incident which occurred via one of their third-party suppliers called MOVEit.”

In 2019, hackers injected malicious code into Asus’ software ASUS Live Update Utility and infected over one million users worldwide. ASUS Live Update Utility comes by default installed on Asus machines and helps to update hardware and software (BIOS, drivers, etc.).

Tweet about Asus supply chain attack

We already mentioned the SolarWinds attack; it occurred in 2019 by compromising the update process.

Some other supply chain attacks happened to Kaseya (2021), Mimecast (2021), Event-stream (2018), NotPetya (2017), CCleaner Backdoor (2017), and XcodeGhost (2015).

Let’s approach the same issue with a positive outlook. Thanks to some cybersecurity researchers, they discovered vulnerabilities in a few products and communicated them with vendors to prevent supply chain attacks.

In 2020, security researchers discovered chained vulnerabilities in Atlassian apps connected through SSO (Single sign-on). It affected Jira, Confluence, GetSupport, Partners, Developers, and Training.

In 2021, cybersecurity expert Alex Birsan breached Microsoft, Apple, Tesla, and Uber, injecting harmless code and distributing it to end users. He did this to demonstrate supply chain vulnerabilities.

All vendors managed to fix the vulnerabilities and communicated them to their customers.

Diverse Sources of Supply Chain Attacks

There are diverse sources of supply chain attacks, including software dependencies, hardware dependencies, development environments and tools, updates, suppliers, marketplace, and insider threats, just to name a few. The supply chain attack may come from any of the abovementioned sources.

Software dependencies

There are different components used in software development, for example, third-party frameworks and libraries. Attackers may exploit them and inject malicious code to gain remote unauthorized access.

Now, if we extend it a bit further, we come to software development environments and tools. An attacker may compromise source code repositories, compilers, Integrated Development Environments (IDEs), version control systems, package managers, build tools, Continuous Integration/Continuous Deployment (CI/CD) tools, testing tools, issue tracking systems, documentation tools, collaboration tools, code review tools, and others. As you can see, the potential weaknesses in all these layers are huge.

Hackers might have compromised the software or hardware update mechanism, injecting a malicious piece of code, and pushing it to end users in the next update cycle. Remember, this is what happened to SolarWinds Orion.

Hardware dependencies

Physical machines are built with various hardware components manufactured by different vendors. Let’s imagine a server, it has a Dell motherboard, an Intel CPU, Broadcom and NVidia Ethernet adapters, and a Titanium power supply. These components all come from different vendors but are incorporated into a single physical unit. An attacker may target any of these hardware components and exploit them.

When you make partnerships with suppliers, you need to ensure that they follow the best security practice that helps guard against any type of attack.  If that is not the case, hackers may take advantage of their weak security. And ultimately, you also need to be aware of your supplier’s suppliers, because there can be many different levels of suppliers for a single finished hardware (or software) product.

Today many software products are sold via marketplaces. Attackers might penetrate a marketplace and inject malicious code into the software before users download and install it on their network. Once installed, the network gets compromised.

Example AWS Marketplace
Insider threats could also be potential targets of a supply chain attack. Ensure that your team is well-trained and follows the best security practices. As you can see, for a single product or service to be delivered to end users, it goes through different third-party layers. The threat surface is extensive.

Effective Strategies and Countermeasures to Prevent Supply Chain Attacks

You can harden your infrastructure by implementing proper IT Security measures. However, there are different layers we need to keep an eye on.

Firstly, you should ensure that all third-party and external components are fully patched. Install the latest available updates for every single product that plays any role in your infrastructure.

During the code development process, it is essential to promote and use secure development practices among software developers. That includes implementing secure coding guidelines, validating inputs, and encoding outputs – just to name a few.

You can also use Software Composition Analysis (SCA) to analyze third-party components and libraries for known security vulnerabilities.

After completing your code, it is crucial to conduct a thorough code review and use static analysis. Static analysis helps identify potential security vulnerabilities and common coding errors.

Additionally, make sure to implement continuous security testing to maintain the highest level of security in your development process.

How to get there? Besides implementing software and hardware security layers, security awareness training is a must-have. You should ensure that your IT teams are properly trained, with an emphasis on continuous education. Non-trained stakeholders are a threat to any organization.

Monitoring helps you stay proactive, while logging provides insights into failed and successful attempts.

Build trust with your suppliers and ensure that they strictly follow security and software development practices. Verify if they are ISO certified.

Develop a security incident response plan. Be ready just in case a supply-chain attack happens. This will help you to react and have honest communication with your partners and customers.

Securing Your Chain: Methods for Detecting Supply Chain Attacks

Detecting a supply chain attack is a challenging process since it includes not only your product but also other third-party components that are not fully in your control.

The first thing you should implement is proper monitoring. Monitoring helps you stay proactive by detecting any suspicious activities, unauthorized access, and changes in your infrastructure. Usually, monitoring goes hand in hand with SIEM (Security Information and Event Management) – which is the next important factor.

If you utilize SIEM in your infrastructure, you will be able to collect logs from different systems and analyze them accordingly. By using monitoring and SIEM, you can detect patterns in anomaly behavior.

Additionally, monitoring and SIEM, help you to analyze end-user behavior, perform network traffic analysis, and anomaly detection, and assess all potential layers of your infrastructure.

You also should implement Digital Signature Verification. That technology will help you to maintain the authenticity and integrity of software components and updates through signatures and certificates.

Remember, we mentioned security awareness training in the previous section!? The best way to get trained in IT is by experiencing things firsthand. So, you should simulate supply chain attacks in your network and challenge your organization. This practice ensures that you are well-prepared, well-educated, and able to implement security testing and enhancements.

Hornetsecurity can simulate phishing attacks

You should definitely collaborate with cybersecurity companies, professionals, and the wider community to stay informed about supply chain attacks. In the beginning, we mentioned cybersecurity researchers who discovered supply chain vulnerabilities. Having someone like Alex Birsan as your contact is of great value.

As you can see, there are various proactive approaches, and it takes utilizing all of them to stay safe and effectively mitigate potential risks from supply-chain attacks.

For an overall look at cybersecurity risks gained from analyzing 25 billion emails, see our free Cyber Security Report 2023.

To properly protect your cyber environment, use Hornetsecurity Security Awareness Service to train your employees in deterring cyber threats and securing your critical data.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

At Hornetsecurity, we are dedicated to ensuring your safety from both security and backup perspectives. We highly recommend exploring The Backup Bible, our comprehensive backup guide.

 

Wrap Up

Any software or physical product has different dependencies that are not under the control of a single vendor. Imagine a physical server where the mainboard is manufactured by Dell, but other components such as CPU, and Ethernet cards are developed by other vendors.

It is the same with software products. To develop it, you use a third-party development environment and tools developed by other vendors.

An attacker may exploit these third-party components and gain unauthorized access to your customer’s infrastructure and steal sensitive data. One of the recent supply chain attacks happened to SolarWinds. The attackers injected malicious code into the update mechanism of SolarWinds Orion, distributed it to customers in the next update cycle, and infected thousands of customers.

In this article, we covered fundamental information to get into the topic, stay safe, and mitigate it.

FAQ

What is supply chain phishing?

A supply chain attack occurs when a cybercriminal targets a trusted vendor (company or platform) to carry out cyberattacks throughout the supply chain. In such instances, they might introduce malware to shared systems or cleverly launch phishing attacks through the vendor, exploiting their trust. These attacks highlight the importance of maintaining strong security measures within your systems and across the partners you collaborate with.

Which is an example of a supply chain attack?

An example would be the following – consider a scenario where a keylogger is strategically placed on a USB drive. If this device finds its way into a major retail company, it could surreptitiously record keystrokes to gain access to sensitive account passwords. Supply chain attacks deliver viruses or malicious software via a vendor or a supplier.

What is the famous supply chain attack?

One of the most famous supply chain attacks is the SolarWinds attack, also known as the SolarWinds supply chain attack, which was perpetrated by a Russian state-sponsored hacking set called APT29 or Cozy Bear. This group is thought to be related to the Russian Foreign Intelligence Service (SVR).

How to protect against supply chain attacks?

There are several steps you can take to protect yourself from supply chain attacks. This includes implementing security awareness training, monitoring third-party activities, using digital signature verification, constantly updating and patching software and hardware, and working closely with vendors and third-party vendors to ensure they employ appropriate security practices.

Fortifying Your Fortress with Defense Tactics Against the Golden Ticket Attack

Fortifying Your Fortress with Defense Tactics Against the Golden Ticket Attack

What is Golden Ticket Attack

The concept of the Golden Ticket originated from a security researcher and developer named Benjamin Delpy, who is known for creating a powerful post-exploitation tool Mimikatz, a credential dumping utility capable of obtaining plaintext Windows account logins and passwords. A Golden Ticket Attack exploits Kerberos, the default authentication service for Active Directory, by extracting a user’s ticket-granting ticket (TGT) within the domain, ideally a domain admin. This malicious technique targets KRBTGT, a service account that exists in all domains in the Active directory that is used by the Key Distribution Center (KDC), responsible for issuing and managing Kerberos tickets, and the ultimate goal is to grant the attacker unrestricted access to the network that can last up to 10 years.

How a Golden Ticket Attack Works

1. Gaining Administrative privileges

For Golden Ticket Attack to occur, an adversary needs a foothold in your organization’s Active Directory by obtaining administrator-level privileges or access to a domain controller.

2. Extracting the hash

Once the threat actor has compromised a DC, the next step will be to dump the NTLM hash that is stored in NTDS.DIT file with the help of the Open-source tool Mimikatz from the Key Distribution Center (KDC), a service account that is responsible for creating an authentication token known as a Ticket granting Ticket (TGT) servicing user’s requests by requesting an authentication token used by Ticket Granting Service (TGS) for providing users accesses specific resources in the domain.

3. Forging the Golden Ticket

With the extracted hash from the KRGTGT service account, the attacker creates a forged ticket-granting ticket (TGT), known as the Golden Ticket. This forged TGT wields several critical attributes, including a falsified session key and a signature encrypted with the KRBTGT account’s password hash. The Golden Ticket allows the attacker to impersonate any user within the compromised Active Directory domain.

4. Gaining Unauthorized Access

Armed with the Golden Ticket, the attacker can pivot through the network without requiring the legitimate user’s credentials. They can request service tickets for various resources within the domain, granting them unrestricted access. The forged TGT provides a seemingly legitimate authorization token, enabling the attacker to move laterally across the network, compromise sensitive information, or perform undetected malicious activities.

5. Prolonged Persistence

Persistence is a threat actor favorite for a reason. The Golden ticket acts as a copy of the key that allows a thief passage to your house any time they want to. Unlike traditional attacks that rely on stolen credentials, the Golden Ticket remains valid until the domain’s password is changed. Typically attackers opt for shorter validity periods when forging the ticket to minimize the chances of being detected.

Strategies to Identify Golden Ticket Attacks

Logging is crucial in detecting malicious activity in an Active Directory (AD) environment, including Golden Ticket attacks. By enabling thorough logging and incorporating effective log analysis techniques, organizations can significantly enhance their ability to respond and thwart any attempts of criminal activities on time. Monitor and analyze Kerberos-related logs, such as security event logs (Event ID 4768, 4769, 4770) and Kerberos service ticket logs (Event ID 4769). Pay attention to anomalies like the creation of excessive TGTs, TGTs issued for unusual user accounts, or unexpected usage of TGTs by a single account. One key reason why logging is important is that it provides a detailed record of user authentication and ticket-granting activities within AD. By monitoring these logs, security teams can identify suspicious patterns or anomalies that may indicate a Golden Ticket attack in progress. For example, an unusually high number of TGT requests from a single user or repeated authentication attempts from different locations may raise red flags. In addition, logs can reveal unauthorized modifications or accesses to the domain controller, which could indicate attempts to extract the necessary information for creating Golden Tickets. Unusual account activity, such as changes to privileged accounts or modifications to security policies, can be early indicators of a potential Golden Ticket attack. Familiarizing yourself with the Open-Source tool Mimikatz and its functions can be a great advantage in defending your fortress against Golden Ticket attacks. Creating YARA rules for detecting Mimikatz activity can be crafted to identify specific strings, code patterns, or behaviors associated with the tool. These rules can target indicators such as specific function names, command-line parameters, or unique strings that Mimikatz generates during its execution.

How to Defend Against Golden Ticket Attacks

The first step for defending against Golden Ticket attacks is implementing the Zero-Trust model, the assumption that no user or device should be trusted unless their request is verified and authenticated. Since this form of attack requires the threat actor to have already compromised the Domain Controller, applying strict access controls and continuing authentication and verification is beneficial in combating Golden Ticket attacks.
Other key steps to consider:
  1. User awareness and training provide a great preventative measure against any form of attack against your organization. Promote phishing campaigns since 95% of attacks occur by opening a malicious email;
  2. Regularly patching and Monitoring Domain Controller account activity. Apply security patches promptly and perform continuous vulnerability scanning to be one step ahead of the attackers;
  3. Discover any Indicators of compromise (IoCs) of both the DC and KRBTGT accounts by detecting unusual behavior such as password resets, repeated authentication requests, or account lockouts;
  4. Monitor TGTs lifetime. Although threat actors like to keep Golden Tickets with short expiry to avoid detection, it is useful to pay attention to any excessive issuance of TGTs and the presence of forged tickets. A good practice is to compare the expiration times of TGTs with the usual values to identify any anomalies or abnormally long duration.
For an overall look at cybersecurity risks gained from analyzing 25 billion emails, see our free Cyber Security Report 2023.
To properly protect and train your employees against cyber security threats, use Hornetsecurity Security Awareness Service as we work hard perpetually to give our customers confidence in their Spam & Malware Protection and Advanced Threat Protection strategies. To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

This VIP Pass, golden ticket attack, which takes advantage of the Kerberos authentication system, poses a significant threat to security. A fake Ticket Granting Ticket (TGT) is created using stolen domain controller login information. Golden tickets allow attackers to enter the targeted domain without restriction and get around authentication safeguards. For the purpose of identifying and reducing the dangers connected with golden ticket assaults, attentiveness, robust security procedures, and continuous surveillance are mandatory.

Frequently Asked Questions

What is a golden ticket attack?

This term is used metaphorically to represent the powerful and unrestricted access that a malicious actor obtains to bypass normal security measures and exercise control over the network as if they possessed the highest level of authority. Golden ticket attack is one way to retain persistence once an attacker has gained a foothold as a domain admin in Active Directory. This “Magical” ticket is created by exploiting Kerberos, an authentication protocol that allows secure communication between different entities, such as a client and a server, over an insecure network.

What are golden ticket and silver ticket attacks?

The main difference between Golden and Silver Ticket attacks is the level of access they provide within an organization. Silver ticket does not grant full domain-level access but is rather discreet by impersonating a specific user for a particular service or resource. That means Silver Ticket attacks can be created without communicating with a Domain Controller, making them stealthier.

Is a keylogger a virus?

Detecting golden ticket creation involves monitoring event logs for Event ID 4768 (Kerberos TGT request), checking for abnormal ticket lifetimes, comparing encryption types, analyzing Kerberos traffic, monitoring domain controller activity, conducting security audits and using user behavior analytics. Observance and comprehensive monitoring are key to identifying these potent security threats.

What does a keylogger do?

For Golden Ticket Attack to succeed, the threat actor must already have established administrative-access level to a domain controller. The attacker then exploits the Kerberos authentication protocol by dumping the hash of the KRBTGT service account, which is used by the Key Distribution Center service that is responsible for creating a Ticket Granting Ticket (TGT).
Cyber Security Facts You Wish You Knew Earlier

Cyber Security Facts You Wish You Knew Earlier

The world of cyber security facts is filled with surprises. Did you know that 95% of breaches are caused by human error? Or that 70%+ of attacks are financially motivated, with less than 5% coming from espionage? It might sound unusual, but these are some of the cybersecurity facts we wish we had known sooner.

In this article we’ll dive into interesting statistics to help us understand the cyber security facts shaping business approaches to security and what you can do to protect your organization.

Cyber Security Facts

If you had to guess which cyber-attack flavor cost businesses the most money globally, most people would have said ransomware. It’s in the news (although only the gigantic ones make mainstream news nowadays), and most people remember the Colonial Pipeline attack shutting down gas access for the Eastern seaboard of the US for several days.

That particular attack seems to have been the one bringing ransomware into everyone’s awareness. Up until last year, ransomware was however NOT the biggest cash cow for the criminals, it was Business Email Compromise (BEC), and only last year (according to FBI’s latest report) was BEC overtaken by financial fraud.

Complains and Losses 2018-2022 (courtesy of the IC3 report by the FBI)

The total loss (of the reported statistics in the FBI report) for BEC was $2.7 billion in 2022, compared to $3.31 billion for financial fraud. The culprit here is clearly cryptocurrency scams, accounting for $907 million in 2021, and a whopping $2.57 billion in 2022. Total loss to all cybercrime in 2022 was $10.3 billion.

But those cyber security facts from the FBI are only the tip of the iceberg. Mandatory reporting is still far from ubiquitous globally so many crimes go unreported.

When a business falls victim to ransomware, the average cost of recovery is exceedingly high. In this scenario, simply paying the ransom won’t miraculously restore your systems to a functional state. Moreover, there’s no guarantee that the criminals will return your vital data.

How much are the bad guys making on ransomware? Chainalysis’s mid-2023 update indicates that they’ve extorted at least $449.1 million in the first half of 2023, and on track for about $898.6 million for the whole year.

A scary cyber security fact in the FBI report is the age of the victims. The most targeted are the ones less likely to be familiar with technology and cyber security overall – the older generation.

Victims by age group (courtesy of the IC3 report by the FBI)

Another surprising cyber security fact for many people is that your password doesn’t matter. For many years we’ve been advocating for long, complex passwords, that must be changed frequently. Turns out that all of that was misleading, and just incentivizes users to use the same password on every site (because who can remember a different password for each service), and then adding a number or month to the end when they are forced to change it.

This password re-use leads to considerable danger when a low security site, with no sensitive data, is breached, and the criminals then take those usernames and passwords and try them against your critical business services.

The solution here is moving away from passwords to passwordless, FIDO2 hardware keys or strong biometrics such as Windows Hello for Business. On the way to passwordless nirvana, make sure every user uses MFA, preferably with an app on their phone.

Barbarians at the gate

According to Verizon’s latest Data Breach Investigations Report (DBIR) 83% of breaches involved external actors. That means that slightly less than 1/5 of data breaches are insider jobs. This has been reflected in other reports and it’s a risk most businesses don’t take seriously enough. Having a strong insider risk program is crucial, and it needs to be based on more than just Data Loss Prevention (DLP) technical controls.

Remember, insider risks is a spectrum from someone inadvertently breaking a rule about emailing business data to a personal email address “to work at it over the weekend”, to inappropriate language, to harassment, to theft of intellectual property or sabotage.

A recent example is a UK IT security analyst whose company was hit by ransomware. He set up an email address that closely mimicked the attackers, and then changed the bitcoin address for the ransom payment.

Insider risks are real, and your organization needs to have a good program in place to manage it.

Attributing attackers to specific countries isn’t always easy but it’s no surprise that the top four are Russia, China, Iran, North Korea according to Microsoft’s Digital Defense Report 2022.

Russia Top targeted countries and industry sectors (from Microsoft’s DDR 2022)

That report also focuses on cyber influence operations – misinformation and disinformation. You’ll find two approaches here, one disseminating false or misleading information, and the other simply flooding the information space with different stories, leading to an inability to even spot the true signal in the noise.

Another interesting cyber security statistics in the DDR looked at characteristics of organizations that suffered a ransomware attack. 68% of those business didn’t have an effective vulnerability and patch management process, 60% didn’t use Endpoint Detection and Response (EDR), 60% didn’t have a SIEM, 76% lacked an effective response plan, 44% didn’t have immutable backups, and 92% didn’t have an effective DLP solution.

In our own 2022 survey we found that 1 in 20 companies had a ransomware attack, wherein 14.1% lost data, and 6.6% had to pay the ransom. The vector for initial breach was overwhelmingly email / phishing at 58.6%, followed by compromised endpoints at 16.4%. It’s crucial to combine a strong email security hygiene solution to keep most malicious emails out of users’ inboxes, with regular user training to not fall for the few that do end up in their inboxes.

An interesting find is that 86% of ransomware cases involve the threat of leaking the exfiltrated data. Often called double extortion, this combines encrypting the data in the first place, making it inaccessible to your business (unless you pay to get the decryption key), plus threatening to make the stolen data public.

There are even cases where attackers skip the encryption phase, and simply threaten to leak the data. How efficient this is a threat will vary between industries, the company that was breached and the nature of the data itself. Some businesses aren’t likely to pay, whereas others not only can’t afford to have the data leak, but they may also face legal and regulatory consequences if the data is made public.

Another interesting change we’ve seen recently is the shift from “brand name” ransomware actors, to smaller groups (it’s mostly the same people, with shifting loyalties) because those known names often end up on sanctions lists, particularly if they’re in Russia, disincentivizing businesses from paying in the first place.

The takeaway here is to apply a zero-trust approach to securing your business, verifying each connection and authentication. Also, applying policies to only allow connections from managed devices is a good idea, or at least enforce stricter policies for personal devices.

How to Protect Yourself from Cyberattacks

Given the picture these “fun” cyber security facts paints, let’s see how you can protect your business.

Since the primary vector for the initial foothold are phishing emails, ensuring that as many of those as possible never reaches your users’ inboxes is vital – using a competent, cloud based (for swift updates), machine learning-based, email hygiene solution is step one. No protection will catch 100% of all emails however, and thus you need to train your users to spot suspicious emails – improving your “human firewalls”.

This training must be ongoing, an hour once a year is soon forgotten and results in very little behavioral change, phishing simulations on the other hand are much more impactful. These are mimicked phishing emails, but instead of a compromise when a user clicks the link or opens the attachment, they get a reminder of the risks and are then scheduled for short video trainings to spot the suspicious signs next time around.

A huge benefit of Hornetsecurity’s Security Awareness Service is that it automates the targeting, and scheduling of training based on each user’s Employee Security Index (ESI), relieving an already stretched IT team from the burden of scheduling simulations and training.

Next, consider adopting a Zero Trust approach to security:
  • Verify explicitly
  • Least privilege access
  • Assume breach

In other words, check every authentication and connection against a policy engine – don’t assume that because the connection is on a trusted network, it’s safe. Once a user is connected to a service or data, they should only have the access they need.

Build your cyber security approach on the assumption that despite your great defenses and well trained “human firewalls”, sooner or later an attacker will get in. Have strong security tools in place for visibility so you can catch them before they get too far in your network.

Finally, don’t get complacent, secure is not a destination, it’s a never-ending journey, and eternal vigilance is the price of not being compromised.

For an overall look at cybersecurity risks gained from analyzing 25 billion emails, see our free Cyber Security Report 2023.

To properly protect and train your employees against cyber security threats, use Hornetsecurity Security Awareness Service as we work hard perpetually to give our customers confidence in their Spam & Malware Protection and Advanced Threat Protection strategies.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

Conclusion

That’s it, these are the well-known cyber security facts and cybersecurity statistics that you probably didn’t know. Hopefully you found some interesting cyber security facts that you didn’t know here, as well as gained some insights into how to better protect your users against threats. Stay safe out there.

FAQ

How many global cyber attacks occur per day?

Basically, 4000 new cyber attacks occur every day. Every 13 seconds, a company becomes a target of a ransomware attack, which can result in significant financial hardships, while 600,000 new malware instances are detected daily.

What are the top 3 facts about cybersecurity?

Here are the top three facts about cybersecurity:

  1. About 95 percent of data breaches are directly the result of human errors.
  2. A study called “Daily Trends and Origin of Computer-Focused Crimes” found that at least 1 Cyber-attack happens every 39 seconds.
  3. Nearly 40 percent of the businesses in the UK have experienced an attack in the year 2023.

Will AI replace cyber security jobs?

It’s early to give the proper answer, but still, AI will transform cybersecurity by enhancing threat detection, automating specific tasks, and delivering valuable insights. Yet, it is unlikely to replace the human factor in cybersecurity.

Unlocking the Secrets of Keyloggers: From Input Recording to Cyber Intrusion

Unlocking the Secrets of Keyloggers: From Input Recording to Cyber Intrusion

The Soviet Union, Plex, and the son of a mob boss don’t seem like they would be associated, but they have one thing in common: keyloggers.

A keylogger is software or hardware specifically engineered to monitor and record the keystrokes of a device. The primary intent of keylogger use is to gather sensitive information, such as usernames and passwords, and exfiltrate this information for criminal or judicial use.

There has also been a rise in using legitimate keylogging for parents monitoring their children’s devices.

History of keyloggers

Keylogging has not been contained to just computers; the earliest form of a keylogger dates back to the 1970s during the Cold War. IBM Selectric typewriters were the most common typewriter across the workforce as the transition to an electric typehead rapidly increased type speed. With the introduction of new technology comes the opportunity for the exploitation of new technology.

The Soviet Union developed a device, later known as the Selectric bug, to track the location of the printer head ball by measuring minor magnetic disturbances. The data captured by the device would then emit short bursts of radio waves to a nearby listening post. This bug was so sophisticated for the time that it was almost impossible to detect. The Selectric bug was found within 16 IBM Selectric typewriters used within the US embassy in Moscow during the GUNMAN project in the 1980’s.

With the increase in accessibility of personal computers during the ’90s and ’00s, keyloggers became more sophisticated. They no longer needed to rely on hardware-based exploitation; they could be deployed as software and relay information to the attacker over the internet. This opened the market for criminals to target home users and businesses for fraud.

In the early 00s, the FBI exploited the system of Nicodemo Scarfo Jr, the son of a prominent mob boss in Philadelphia. The agents installed the keylogging software onto his computer, recording the PGP passphrase and allowing the FBI to decrypt digital files. The use of a keylogger by authorities broke open the case they had been building against the mob, resulting in the deconstruction of a large illegal gambling and loan shark operation.

More recently and one of the most significant breaches of sensitive information via the use of a keylogger was that of LastPass. In 2022, a senior engineer at LastPass was the victim of a keylogger attack that resulted in the exfiltration of the secure access keys to the entire company’s encrypted password vault AWS backups. This engineer was one of only four employees with this level of access, demonstrating sophisticated attacks that carry dire consequences. The attacker accessed the engineer’s home network by exploiting his outdated Plex server, a home multimedia system. Once the attacker had infiltrated their network, they could implant the keylogger malware onto the engineer’s devices.

Types of Keyloggers

We can see several iterations of physical and digital keyloggers from the examples in the history of keyloggers.

Hardware-based

The hardware-based keylogger is a device that usually sits in between the computer and the keyboard. These devices have become so small that they can fit within the USB port on a computer and remain virtually undetectable. There is also an option for a keylogger keyboard, with keylogging modules embedded directly within the device. All modern hardware-based keyloggers have some form of remote access, either by Wi-Fi or Bluetooth, to extract the data captured. Some examples of these devices are:
  • USB M-F and extension cables
  • Module PCB
  • Keyboard embedded
  • Keyboard to Ethernet

Software-based

Software-Based keyloggers, or malware, do not rely on physical access to a device or proximity extraction. Legitimate keylogger software can be installed on corporate employee or parental monitoring devices. Illegitimate keylogger software is usually implanted via malware that has been executed through phishing or unintentional execution of suspicious files. In some cases, keyloggers can be challenging to detect, further enforcing a diverse prevention strategy.

How Does It Work?

The method of how the keylogger can monitor and extract information successfully will vary based on the two types above.

Hardware-based keyloggers directly intercept data through the physical layer, exploiting data as it passes through an input device to the computer. This data is usually stored as plaintext keystrokes within the memory of the small device pending the exfiltration from the attacker.

The latest version of a software-based keylogger seen is the Snake Keylogger, first detected in late 2020. Snake keylogger is usually spread through Microsoft Office document macros or weaponized PDF documents, and it will upload stolen data via SMTP, FTP, or Telegram. This is the most common method of infection for software-based keyloggers.

The payload for the infected document aims to inject an encrypted DLL file into the system. This helps the file avoid detection from most antivirus systems and allows the executable to be decrypted for content delivery. To further avoid detection, the Malware will obfuscate its code with randomly generated strings. For continued execution, the payload implements a kernel driver to inject code into startup and child processes. These processes exploit the API callback function to monitor low-level keyboard input events. This type of keylogger is considered a kernel mode keylogger, the more sophisticated software-based version. This type of exploit will allow for keylogging, clipboard data extraction, and screenshotting.

Phishing or spear phishing are the main entry points for keyloggers in the modern workplace. Having the right tools available to protect your organization proactively and consistent user education phishing campaigns are critical. We at Hornetsecurity work hard perpetually to give our customers confidence in their Spam & Malware Protection, Email Encryption, and Email Archiving strategies.

Keylogger Prevention and Remediation

How do you know if you have a keylogger, and what can you do to remove it?

The best method for detecting and removing a keylogger, or any malware for that matter, is to employ a modern antimalware solution with full Endpoint Detection and Response (EDR) capabilities—and use scheduled scanning of your system along with keeping the system up to date.

However, this solution is more reactive than proactive. The proactive method to any virus prevention is user education, modern email Spam & Malware Protection, and Web protection. Aim for at least maturity level one of the Australian Essential 8 model as a rule of thumb for corporate environments. A holistic approach like this will keep your environment keylogger free.

Prevention and detection of hardware-based keyloggers are more complex. Finding these in the wild can be challenging and often significantly more time-consuming. The best method to combat hardware-based keylogging is to intercept data exfiltration via firewall packet inspection or a Web proxy solution. Both are key to proactive prevention and detection of any malware in your environment.

Microsoft and other operating system manufacturers understand the level of identity exploitation and the increase in sensitive authentication leaks by third parties. Microsoft has implemented Windows Hello for businesses and also supports FIDO2 hardware keys to combat the monitoring of keystrokes or passwords. Both solutions allow the use of biometrics in conjunction with multifactor authentication. This significantly reduces the attack surface and the utility for the attacker of a keylogger.

Uses of Keyloggers

In summary, keyloggers are a monitoring tool that, in most cases, are associated with criminal activity. However, keyloggers have legitimate uses, especially now with modern technology.

Parental monitoring

There has been a significant increase in cyberbullying, illegal content, and communication with strangers online. Keyloggers, built into applications like Spyrix Free Keylogger and KidLoger, aim to intercept communications. These are recorded for review by parents or can be summarized to provide alerting based on specific keywords. However, be sure to investigate how the gathered data is stored, there have been cases of “parental spyware” services themselves being compromised. Also remember that both Windows and MacOS/iOS includes parental controls (but not keylogging functionality) to help parents manage children’s screentime and web access.

Corporate monitoring

Although this has become rare in the modern workplace, there is still a need for corporate keylogging. This can be found in organizations with security clearance requirements or when dealing with sensitive information. More commonly, businesses will implement less intrusive monitoring via Web proxy solutions and Information protection services.

To adequately protect your cyber environment, consider the use of Hornetsecurity Advanced Threat Protection, which has a keylogger detector function, as well as a Security Awareness Service to train your employees in deterring cyber threats and securing your critical data.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

FAQ

Can a keylogger be detected?

Yes. Most keyloggers can be detected with adequate antivirus and antimalware tools. Hornetsecurity has one specifically designed to prevent the attachment of suspicious files on corporate emails.

How do hackers install keyloggers?

Targeted hacking is rare in most cases; however, spear phishing or whaling within a corporate environment is more common. This is where a malicious actor has specifically targeted an individual (spear phishing) or a C-Level executive (whaling). The payload will usually be a well-disguised document or link for the victim to execute code. In other physical-based attacks, a hacker may gain direct access to a device and plant a hardware-based keylogger. This can be very rare, but there have been cases where this has occurred.

Is a keylogger a virus?

Yes. A keylogger is considered a virus or malware. As such, keyloggers fall into the category of prevention rather than reaction. Using a quality antivirus solution, in conjunction with user education, is the best proactive method.

What does a keylogger do?

Keyloggers monitor and record keyboard inputs to extract sensitive information like passwords or credit card information.

How do you know if someone is keylogging you?

You may notice that your computer uses an unusual amount of resources, and your mouse movement/keyboard keystrokes may be delayed. If you suspect you may have a keylogger, run a virus scan.

Unveiling Types of Spyware: A Comprehensive Exploration of Various Threats

Unveiling Types of Spyware: A Comprehensive Exploration of Various Threats

Spyware Definition – What Is Spyware?

Spyware is a type of malware that is secretly installed on a device to covertly collects users’ data, from browsing history to personally identifiable information, sets of credentials, banking details, to email addresses on the contact list of the victim’s email client. These data can then be transmitted to a threat actor who can use it to craft phishing and spoofing attacks on the individual or organization or use the victim’s personally identifiable information to carry out identity theft scams.

What are the Different Types of Spyware?

There are many different types of spyware based on how they operate on the host system. Some will modify the designed behavior of an application, while others will send data to the attacker’s servers. Most spyware could be included in one of two broad categories: system monitors and adware.

System monitors

This type of spyware collects data of the host computer and logs the victim’s usage on the device. These data is then sent to the control center servers of the threat actor. Data collected by a system monitor may include email addresses on the victim’s contacts list or lists of visited websites. Keyloggers, for example, record the victim’s keystrokes to capture credentials, banking, or personal information as the user types them on the keyboard. System monitors may include the ability to capture the position of the mouse pointer and clicks, take screenshots, or record video and audio using the built-in devices on the system. Examples of this type of spyware for computers are Olimpic Vision and Zlob, which will install on the victim’s computer to record clipboard contents and browsing history. An example of this type of spyware for mobile devices is the infamous Pegasus. This spyware was used by threat actors to spy on politicians and journalists worldwide.

Adware

This type of spyware displays unsolicited advertisements based on the victim’s web browser habits and visited sites. These data might be transferred to the command-and-control center of the threat actor. Browser hijackers are a type of adware that modify the victim’s browser settings in order to alter the functionality set by the user. For instance, a browser hijacker might change the browser’s start page or redirect searches to sites configured by the attacker. Browser hijackers are usually a third-party extension of the web browser, but also might modify the Windows registry keys or proxy settings. Examples of adware are Gator and 180 Solutions. These adwares would get installed without the users’ consent and display ads based on browsing habits. CoolWebSearch was a browser hijacker that would redirect traffic to websites different from those requested by the user.

How Does Spyware Work

The functioning of spyware could be divided into three stages: delivery, installation and control and command.

Delivery

The delivery stage refers to how the payload is sent to the victim’s device. The delivery method can be tailored to the target type of device. A common method to deliver the payload is by email. Threat actors will send phishing and spoofing emails to victims containing a URL to the payload. The payload will be downloaded and installed on the victim’s device after following the link. Another method of delivering the payload is by bundling the payload with other software. The user will download and install a software package that will install the spyware on their computer. Spyware can also be delivered as a trojan. Trojans are a type of malware that will appear to be a legitimate application, often using the same name and icon as the real one. Users will download and inadvertently install the spyware thinking they are installing a legitimate application. Spyware can also be delivered as an app on the application stores of the vendor of mobile devices. Another delivery method for spyware is links on websites or popups. These links redirect to malicious web browser add-ins, such as browser hijackers or adware, that modify the intended behavior of the web browser. A delivery method specific to mobile devices is messages sent as traditional text messages or to messaging apps, such as WhatsApp. These messages will include links to URLs with the payload.

Installation

Spyware can be installed in different ways on the host device. Some types of spyware such as keyloggers, screen captures, or mobile spyware are applications that run in the background collecting and sending personal information. Adware and web browser hijackers will install a web browser add-in to redirect traffic or show unrequested advertisements. Some variants will modify entries on the Windows registry, such as DNS or proxy settings.

Control and command

Once the spyware is installed, spyware may collect and send data to the control center of the threat actor. These data can include keystrokes, web browsing history, personal information, or text and call history from a mobile device.

Problems Caused by Spyware

Spyware will have an impact on availability and confidentiality. Spyware that runs as an executable will use system resources, such as CPU, memory, and bandwidth, which may slow down the host computer. Additionally, the continuous popups and banners and constant redirections caused by adware and web browser hijackers often render the web browser unusable.

Most spyware collects private and confidential information, which is transmitted to third parties. This compromises the confidentiality of the data stored on the system. At an individual level, these data can include victim’s behaviors, personal information, banking details and text and call data, but it can also include business information, such as credentials for the organization’s internal resources or tools.

These data can be used to gather information and access the organization’s systems and to craft and deliver phishing and spoofing campaigns. Also, spyware opens the door to introduce different malware on the infected host.

How to Detect On Your System

Because spyware will use the device’s resources and modify the expected behavior of some of the applications, the points below might be an indication that spyware is installed on a system:
  • The system runs slow, and applications take longer to load and run;
  • Increased data usage from previous periods. This would indicate that keyloggers, screenshots, or audio is uploaded to the threat actor’s servers;
  • Authentication failures when logging into websites. This could indicate that data entered may have been captured at logon time by the spyware;
  • New toolbars appeared on the Web browser, or the default search engine or home page changed. This is often the case when a web browser hijacker or adware is installed on the device;
  • Random popups and advertisements appear while browsing the Internet or on the Windows notification area.

How to Remove Spyware From Your System

The best approach against spyware is prevention. Below are some pointers on how to prevent spyware from getting installed:

  • Use a spam filter to block phishing and spoofed emails;
  • Ensure that the operating system is fully patched and that antivirus software up to date and has the latest definitions;
  • Only install applications downloaded from the developer’s official website;
  • Check the terms and conditions before installing any application and decline any optional downloads at install time;
  • Use multi-factor authentication where possible, especially to access sensitive websites.

If a computer is compromised, the points below outline how to remove spyware on a computer:

  • Ensure that the antivirus software on the device is up to date and run a full scan. Quarantine or delete any malware found;
  • Reset the web browsers to their default settings and remove all suspicious or unknown addins;
  • Checked installed programs and manually uninstall any suspicious or unknown applications.

If the issues still persist after following the steps above, it might be required to reload the operating system. This typically consists of backing up user data and reinstalling the operating system.

If a mobile device is compromised, the steps below describe how to remove spyware:

  • Checked the apps installed on the device and remove any that appear suspicious or are unknown;
  • Download an antivirus app and run a scan on the device, and quarantine and remove any malware found.

As in the case of computers, if the issue still persists, it might require to backup personal data from the device and reset it to factory defaults.

For an overall look at cybersecurity risks gained from analyzing 25 billion emails, see our free Cyber Security Report 2023.

To properly protect your employees against spear phishing, use Hornetsecurity Security Awareness Service as we work hard perpetually to give our customers confidence in their Spam & Malware Protection and Advanced Threat Protection strategies.

To keep up to date with the latest articles and practices, pay a visit to our Hornetsecurity blog now.

FAQs

What are the main types of spyware?

The main types of spyware are system monitors and adware.

What is the most popular spyware?

Olimpic Vision and Zlob are two of the most popular system monitors targeting computers and Pegasus is a system monitor targeting mobile devices. Popular examples of adware are Gator, 180 Solutions and CoolWebSearch.

Is keylogger a spyware?

Yes. A keylogger is a type of system monitor that keeps track of the victim’s keystrokes.

Do hackers use spyware?

Yes. Hackers will used data collected by spyware to, for example, deliver phishing or spoofing campaigns or perpetrate identity theft scams.

Can spyware see you?

Some system monitors include the ability to turn on the web camera on the infected device and send the recording to the threat actors.