Practical Advice To Stop Malware, Phishing & Spoofed Email Attacks From Head of IT
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
This is a note I sent to our entire company last week. It was thought to be useful and I've been asked to share it with other readers:
IT has noticed an exponential increase in malware, phishing and spoofed email attacks against our users. We have strong filters in place that catch the majority of malicious emails, but nothing is perfect. Our last line of defense is YOU. When you receive an email with an attachment or link, it is important that you exercise caution. Below are a few guidelines that will help you determine whether an email is safe or not.
Spoofed email addresses are emails that appear to come from someone @alienvault.com (or another domain), but aren't actually from that user. We have seen the largest jump in these types of emails. These were initially targeting finance personnel and executives, but have recently spread to more users in the organization. We have strong SPF and DKIM enforcement set (SPF lets a mail admin specify what IP addresses are allowed to send email for a domain). While this will protect us from internal spoofed emails, it will not protect us from external domains that are being spoofed.
How do I recognize a spoofed email?
Phishing email – An attempt to harvest a user’s credentials. These will usually come from a spoofed email address, or from a legitimate user that has fallen victim to a phishing attack.
Malware – An attempt to infect a user’s device with malicious software. We are especially seeing a large uptick in trojans being sent. Some were only spotted in the wild a few weeks ago.
If you are unsure, please do not hesitate to contact your IT department for assistance.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.