Report Phishing Deceives the Masses: Lessons Learned from a Global Assessment Report Table of Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Phishing Preys on the Uninformed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Introducing the McAfee Phishing Quiz. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Lessons Learned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Recommendations for Security Practitioners. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Phishing Deceives the Masses: Lessons Learned from a Global Assessment 2 Report Executive Summary Organizations worldwide succumb to a constant barrage of cyberinfiltration attempts. The actors behind these efforts want information—personal, financial, or even intellectual property—and have shown no signs of slowing down. Our research shows that social engineering is the most effective way to exploit employees. Most commonly, through phishing emails that deliver malware, or simply lead an unsuspecting user to divulge information. Part of the solution is to educate every connected worker on the tactics used in phishing attacks, so they are better prepared when a phishing email makes it to their inbox. Using an online quiz, we’re bringing attention to these tactics and are attempting to raise the skill level of anyone who takes it. With over 50,000 respondents to date, we are able to both grasp the overall performance level of employees around the world when it comes to detecting phishing emails—and help give them a more astute view of the potential threats in their inbox. Several trends have emerged from this assessment. First—the vast majority of us will miss at least one phishing email, especially if it looks like it is coming from a legitimate and known email address. Unfortunately, we’re not all equal. Finance and HR departments around the world performed worse on this assessment than their counterparts, especially those in IT and R&D who were consistently top performers. In this report, we’ll look at what caused respondents to struggle, and what can be done to prevent future attacks from occurring with a combination of education and technology. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 3 Report Phishing Preys on the Uninformed Phishing attacks exploit what is often the weakest link in cyberdefense—human behavior. Bypassing our best judgment can be as simple as creating urgency with a fake bank notice, or as complex as assuming the persona of a known business partner—all in an effort to steal information. Numerous high-profile breaches such as the theft of credit card data from Target and the compromise of multiple celebrities’ Apple iCloud accounts are purported to be the result of targeted spear phishing. Effectively, it has become easier for the bad guys to know their targets, where they work, what they are interested in, and more. All forms of digital media have accelerated this capability, especially social media. We base our decisions on trust: Did the email come from a party or organization I know and currently do business with? Does it contain an element of personalization that makes it appear legitimate? That is often enough to ensure a click. Take a look at some of the top brands used in phishing attacks these days, identified by McAfee® Labs. ■■ PayPal ■■ Amazon ■■ eBay ■■ Bank Of America ■■ HSBC Would you click a link in an email that appears to come from one of these companies? Through research conducted by McAfee Labs, we have seen email phishing enable the vast majority of successful attacks in the wild. Verizon found similar evidence in their investigations this year: “80% of all espionage-motivated attacks used either a link or attachment in a phishing email to gain access to their victim’s environment”1 On the front lines, there are often unsuspecting employees just trying to navigate the constant flow of email entering their inboxes. Phishing attacks have moved from the classic “Nigerian 419” scams of the past, to targeted spear phishing messages that look no different on the surface than any other shipment notification, bank statement, or business solicitation you may receive from a legitimate party. Technology can only solve part of the problem. Key to defending against sophisticated phishing attacks is employee education and the level of awareness they have about potential threats in their inboxes. Only education can raise awareness around recognizing malicious emails—but many organizations lack the tools and resources to roll out an effective educational program to their employees. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 4 Report Introducing the McAfee Phishing Quiz In an effort to build awareness around phishing and the tactics used to deceive victims of phishing attacks, McAfee—now a part of Intel® Security—developed an online phishing quiz in mid-2014. This quiz presents 10 real emails in replicated inboxes, asking respondents to determine whether each message is legitimate, or a phishing attempt. At the time of this report, over 50,000 business users in 49 countries have completed the quiz. The ability to detect fraudulent email, as demonstrated by the results of this assessment, varies by country and even more dramatically, by department of employment. Key statistics from the quiz findings include: ■■ Only 6% of respondents worldwide were able to identify all emails as phishing or legit. ■■ 80% of all respondents fell for at least one phishing email. ■■ The average score around the world came in at a mediocre 65% correctly identified emails. ■■ IT and R&D teams performed the best—both at a 69% detection accuracy. ■■ HR and Finance departments performed the worst—both with a 60% detection accuracy. ■■ ■■ EMEA proved to be the most skilled, at an average of 67% correct. Both NA and LTAM averaged 66% as well. APAC respondents were the least skilled, with an average score of 61% correctly identified emails. An overview of these findings can also be viewed in this infographic. Lessons Learned While the results of this assessment are telling, it is enlightening to look deeper at where respondents fell short in their ability to detect the legitimacy of a message. Figure 1 below shows the frequency each question was answered incorrectly. Several messages were notoriously more difficult than the others. In this section, we’ll explore why these emails were more difficult to identify, and what that means for strengthening business defenses against attacks which use similar (and numerous other) tactics. Individual Question Failure Rate 70% 63% 62% 60% 49% 50% % Incorrect 43% 42% 40% 27% 30% 21% 20% 13% 10% 8% 7% 0% Email 1 Email 2 Email 3 Email 4 Email 5 Email 6 Email 7 Email 8 Email 9 Email 10 Blue = Legitimate email Red = Phishing email Figure 1. Overall failure rate for individual questions in the McAfee Phishing Quiz. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 5 Report Looking at the full range of questions, we see a mix of both accurate identification and overwhelming misidentification of emails by respondents overall. Notably, two emails which both used forged email addresses were the most difficult to detect as phishing (Emails 4 and 8, above). We’ll dive deeper into those in the analysis below. Not exempt from misidentification were several legitimate emails, which highlight the difficulty in identifying the true nature of any email, whether legitimate or malicious, when sitting in an inbox. Let’s dive into the most missed questions to uncover the source of difficulty. Email 1 of 10: LinkedIn (missed by 63% of respondents) In a strange twist of fate, the single most-missed email was actually legitimate. This marketing message from LinkedIn asks the recipient to take action and “claim their free ads.” Claiming a free prize is a tactic many are familiar with in phishing or spam campaigns, which is likely the reason behind this email’s misidentification as a phishing email. Despite its harmless nature, the high rate of failure on this question further highlights the issue at hand—it is extremely difficult to detect the legitimacy of an email message in today’s technology landscape. Ambiguous messages like this only cloud the judgment of end-users, as a fake message could easily follow the same template and lead to a malicious payload. We also recognize an inherent bias in the data regarding this question, as respondents were aware of the intention of the quiz as a phishing assessment, and were presented with this question first. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 6 Report Email 4 of 10: eFax (missed by 49% of respondents) No excuses here. This email is simply well-crafted and proved very difficult to detect any malicious intent. Business users may be familiar with the online service eFax, and even if they haven’t received a digital fax in their own professional lives, it is easy enough to place yourself in the shoes of someone who might. The relatively accurate branding and convincing layout in this email would fool most people at first glance. Savvier users might look to the sender email address for validation that the email originates from a known party—and that it matches the brand in the body of the email. Unfortunately this wouldn’t help here, as the email address has been “spoofed” or forged to appear as if it came from the actual eFax domain. In many cases, using your cursor to hover over links in an email body would reveal the true destination of a URL, and give evidence of malicious activity if it does not match up with a known domain, or is random enough to raise suspicion. The malicious actors here however chose a fairly safe sounding domain “www.oegroup.com” with minimal additions to the URL strings behind each link. While this doesn’t line up with eFax perfectly, it is close enough to be mistaken in a quick glance, which is all most employees give an email link—if they even check the destination URL at all. So what can we learn from the high failure rate here? Reinforcing safe practices such as hovering over URLs (long-press on mobile devices) may be enough for some to avoid being tricked. All it takes is one employee clicking a link, however, to give the sender a chance to deliver their malware payload hidden in URL content. Instructing end users to never click on links in email is going to be a futile effort for most. Web security technology which scans HTML content for both known and zero-day malware, even from email links on mobile devices (which are often excluded from proxy-based scanning), is the most comprehensive resolution here. More on technology in the final section of this report. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 7 Report Email 5 of 10: Venmo (missed by 43% of respondents) Here we see a case of what is likely a high level of suspicion towards a new application, Venmo, and minimal evidence to base a decision of legitimacy. With a proverbial flood of new online services and mobile applications coming to market, most technology users receive sign-up confirmation emails like this on a fairly regular basis. Cybercriminals are aware of this trend, and use similar shortformat emails to trick recipients into clicking malicious links. In this case, the message was legitimate, displaying the Venmo domain in both the sender email address and destination URL of the link. Educating users to long-press links within email on mobile devices can help avoid any unintentional web access, but in this case, they would have been safe. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 8 Report Email 8 of 10: UPS (missed by 62% of respondents) Most people have received a tracking email from UPS at some point in their life. The universal recognition of this brand and familiarity with package tracking play a large role in the high failure rate for this question—and also for those that fell for this phishing attack when it made the rounds on real business networks. The methods of disguise here were common but effective. First, the sender address was spoofed to appear as if it originated from the UPS.com domain. Several UPS branding elements were part of the message, including the official logo. Most interesting was the use of only one malicious URL in the entire email. The first URL directed the recipient to track the shipment—and actually sent you to the UPS package-tracking website. The second URL prompted a download of the “invoice,” and it indeed opened a file—but not one in the UPS domain. That link delivered the payload: malware wrapped in a .zip file. Phishing emails like this are notoriously difficult to stop before they enter a business network, and even more difficult to prevent action at the user level. A common takeaway in this report—hovering over links to reveal their true destination—may raise enough suspicion for an end user. But this attacker clearly knew better. What are the chances an employee would hover over not just the first link, but the second as well? Probably not very high. Taking into account the legitimacy of the first URL brings a level of trust strong enough to warrant clicking on the second without thinking twice. Even more worrisome is that this phishing email would have made it past most email filters, and some web-based malware detection, as the .zip file contained zero-day malware. While end-user education could divert the attack from a percentage of recipients—advanced malware detection technology for web traffic would have been needed to interrogate the .zip file download and uncover its zero-day payload. Phishing Deceives the Masses: Lessons Learned from a Global Assessment 9 Report Recommendations for Security Practitioners Phishing is still heavily in use, and carries with it a high level of efficacy—leading the charge for most attacks we see in the wild. It is not an easy problem to address, requiring both technology and behavioral filters. To give readers a sense of our best practices, we offer a short checklist to help guide security initiatives. Activity Key Technologies Eliminate mass phishing campaigns. Secure email gateway with sender IP, URL, file, and network reputations, antivirus (AV), and real-time block lists. ü Reduce risk of cybercriminals being mistaken for trusted parties. Secure email gateway with identity verification including Sender Policy Framework (SPF), Domain Keys Identified Mail (DKIM), Domain-Based Message Authentication, Reporting, and Conformance (DMARC). ü Detect and eliminate malicious attachments. Secure email gateway combined with advanced malware protection for file reputation, AV, content emulation, sandboxing, and static code analysis. ü Scan URLs in email when received, and again when clicked. Secure email gateway with URL reputation, AV, content emulation, sandboxing, and static code analysis. ü Scan web traffic for malware when phishing leads the user on a multiclick journey to infection. Secure web gateway combined with advanced malware protection for URL reputation, AV, content emulation, sandboxing, and static code analysis. ü Stop exfiltration in the event of a breach or user input. Data loss prevention for endpoints, email traffic, and web traffic. ü Educate users on best practices in detecting and acting upon suspicious emails. Follow this link for a list of recommended tips for end users. ü Interested in assessing the phishing detection capability of your own organization? Run the McAfee Phishing Quiz internally at no cost. Follow these simple steps: 1. Add a unique identifier of your choice (red) to a. https://phishingquiz.mcafee.com/home/OrganizationName. b. Test this URL in your browser to ensure it displays the quiz start page. 2. Send this URL to your employees, instructing them to take the quiz. 3. When employees have completed the quiz, contact [email protected] for your results. For more information, visit www.mcafee.com/emailsecurity. 1. http://www.verizonenterprise.com/DBIR/2014/ McAfee. Part of Intel Security. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.intelsecurity.com Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright © 2015 McAfee, Inc. 61996rpt_phishing-quiz-retrospective_0615
© Copyright 2026 Paperzz