New Research: Organizational Email Account Takeovers Push Lateral Phishing

A team of researchers from Barracuda Networks, the UC-Berkeley and UC-San Diego team up to study the nature of email account takeovers.

How do cybercriminals decide on the best targets? (Source: Shutterstock)

Email account takeover and lateral phishing, where hackers use compromised accounts to distribute phishing emails to other recipients including company contacts and associates at other companies, present a growing organizational threat.

Over the past year, researchers from Campbell, Calif.-based Barracuda Networks, the University of California Berkeley and the University of California San Diego, teamed up to study the nature of email account takeovers, how attackers select potential victims, and tactics used to make attacks stealthier and more convincing. The research, detailed how email account takeover attacks are a widespread and effective attack enterprises need to defend against.

“Because attackers send these lateral phishing emails from legitimate accounts, they can effectively fool many existing email protection systems and unsuspecting users,” the report claimed. It added, “In this study, spanning nearly 100 organizations, we take a detailed look at the widespread and dangerous nature of this attack, analyze the different strategies that attackers use for selecting their potential victims and the content they use in their attack messages, and highlight a few forms of sophistication and stealth exhibited by this evolving attack.”

Key findings:

Across the study’s dataset, attackers used a total of 154 hijacked enterprise accounts to launch lateral phishing attacks. Researchers identified four primary strategies attackers used to select the potential victims:

Account-agnostic: Across 45% of the hijacked accounts, attackers did not appear to draw heavily on the hijacked account’s relationships when selecting their victims. “These attackers appeared more interested in opportunistically phishing as many accounts as possible, rather than compromising victims with some tie to the hijacked account.”

Organization-wide: Attackers leveraged the hijacked account to send phishing emails to dozens to hundreds of fellow employees at the same company; 25% of attacks used this strategy.

Targeted-recipient: Attackers selected their victims by mining the hijacked account’s recent or close contacts; 29% of attacks followed this strategy.

Lateral-organization: Attackers used the hijacked account to send phishing emails to recipients at other organizations within the same industry, e.g., business partners of the hijacked account’s organization. Only 1% of attacks adopted this strategy.

“Because attackers control a legitimate account in an email account takeover attack, they could mine the hijacked account’s emails to craft custom and highly personalized messages,” the research observed. Across the incidents studied, researchers found the majority of lateral phishing attacks rely on two deceptive narratives: 1.  Messages that falsely alert the user of a problem with their email account. 2. Messages that provides a link to a fake “shared” document

In both cases, the attacker provided a link for the victim to click on, which often leads to a phishing website designed to look like a legitimate login page but that ultimately steals the victim’s username and password.

The study also looked at studies that hypothesized that attacks such as phishing might be detectable by looking for suspicious emails sent at unusual times. However, based on the attacks in this study, it appears that attackers send lateral phishing emails from compromised accounts during the typical working hours of the affected organizations. A full 98% of the lateral phishing incidents occurred during a weekday. Researchers also found 82% of lateral phishing attacks sent by an attacker occurred during the compromised account’s typical working hours.

The research recommended three critical precautions to help protect against lateral phishing attacks: improving security awareness training and making sure users are educated about this new class of attacks; organizations should invest in advanced detection techniques and services that use artificial intelligence and machine learning to automatically identify phishing emails: and two-factor authentication or a hardware-based token if available.