e-Learning Blog

Blog

2021.02.23

Original Materials

How to Protect Yourself from Targeted Attack Emails? The Importance of Information Security Education

  • Category

  • Recommended Articles

  •  

    Moodle Implementation Support and Operation Services
    e-Learning Material Production Services

    For companies and organizations to conduct their operations with peace of mind, information security measures are essential.
    Companies hold not only information related to their own employees' personal data but also various information about clients and contractors. If this information is leaked improperly, the company will undoubtedly lose trust and suffer significant damage.
    Implementing information security measures such as antivirus software, establishing internal rules, and conducting information security training is a challenge that all companies should address to prevent information leaks.



    1. Various information security risks surrounding companies

    The starting point of information security measures is to understand what kind of "risks" exist. In the course of business, we consider how much risk there is of leaking confidential information.
    Risks include "threats" and "vulnerabilities." A threat is a factor that causes a risk. There are human-made threats due to human actions and environmental threats such as disasters.

    <Examples of Threats>

    Human-made Threats Intentional Viruses, theft, eavesdropping, unauthorized access, data tampering, etc.
    Accidental Careless mistakes such as loss of media or documents, incorrect addresses, and information leaks from conversations, etc.
    Environmental Threats Fire, earthquake, lightning, flood, etc.

    A vulnerability is a weakness that can be exploited by threats. It refers to security holes such as insufficient antivirus protection, software bugs, or unlocked buildings.
    The more vulnerabilities there are, the higher the likelihood of being targeted by malicious attackers and having confidential information stolen.


    2. Increasing Damage from Targeted Attacks

    When it comes to malicious cyber attacks, in the past, they were mainly perpetrated by thrill-seekers targeting a large number of unspecified individuals. However, recently, attacks aimed at specific organizations or individuals for financial gain have become more prevalent.
    These attacks targeting "specific organizations or individuals" are referred to as "targeted attacks."

    Among targeted attacks, one of the most common is email-based attacks.
    For example, an attacker targeting Company A's confidential information sends a disguised email to an employee of Company A that is "likely to be accidentally opened," infecting the employee's PC with a virus. From the infected PC, the virus spreads through the internal network, stealing confidential information on PCs and networks or destroying systems.
    These attacks often continue for long periods, and it is not uncommon for information to be stolen without the victim realizing it.


    According to the "Top 10 Information Security Threats" announced annually by IPA (Information-technology Promotion Agency, Japan), targeted attacks have maintained the top position in the "Threats to Organizations" ranking for five consecutive years since 2016. Prior to 2015, there was no distinction between "organizations" and "individuals," so it has been ranked first since the investigation into threats to organizations began. This indicates how prevalent these attacks are in terms of the number of incidents.

    Rank Threats in the Organization Last Year's Ranking
    1st place The theft of confidential information through targeted attacks 1st place
    2nd place Information leakage due to internal misconduct 5th place
    3rd place Financial damage due to business email fraud 2nd place
    4th place Attacks Exploiting Weaknesses in the Supply Chain 4th place
    5th place Damage from Ransomware 3rd place
    6th place Business interruption due to unexpected IT infrastructure failure 16th place
    7th place Information leakage due to negligence (rules are followed) 10th
    8th place The theft of personal information from online services 7th place
    9th Unauthorized Use of IoT Devices 8th place
    10th Service interruption due to denial-of-service attacks 6th place

    Source: https://www.ipa.go.jp/security/vuln/10threats2020.html

    In November 2020, a major Japanese gaming company experienced an incident where personal information was leaked due to a targeted attack, and a ransom was demanded. It seems that the company was infected with ransomware (an attack that demands a ransom in exchange for stolen information), potentially leading to the leakage of approximately 350,000 pieces of personal information.


    3. Targeted attack methods are becoming increasingly sophisticated! The belief that only large corporations are targeted is a misconception.

    The methods of targeted attacks are indeed sophisticated. They meticulously research the companies they target, considering factors such as "what kind of subject line would make it easier to open the email" before launching their attacks. They may investigate employees' social media and sometimes even delve into internal relationships.
    The email sender and attachments are disguised in such a way that they cannot be easily identified at first glance.

    Targeted attacks are often thought to be aimed only at large corporations and that they do not concern individuals, but this is a misconception. Regardless of the size of the company, the department one belongs to, or their position, anyone can be a target.

    For example, attackers targeting Company A will set traps for anyone even slightly related, such as Company B, which is contracted by Company A, Company C, which is subcontracted, Company D, a business partner, and Company E, which manages servers. If even one person gets infected with a virus, they can spread the infection from there and ultimately reach Company A's confidential information.


    4. Targeted attack emails cannot be blocked by security software!

    If it is an obvious spam email or nuisance email, such as an unnatural email written only in English, it can be blocked by security software. Some companies may also block suspicious emails before they reach individual mailers.
    However, the frightening aspect of targeted attack emails is that they disguise themselves as "very ordinary business emails" in both title and content. There is no software that treats emails with titles like "Request for Quotation" or "Delivery of Minutes" as spam. As a result, emails with viruses attached can reach individual mailers.

    If it cannot be mechanically verified, the only option is to determine whether the email is real or fake by human inspection.

    ・Is the email address correct? Is a free email address being used?
    ・Is there anything strange in the body text?
    ・Is the attachment not disguised?

    Employees need to develop the ability to notice subtle differences that are different from regular business emails.


    5. Cultivate personal security awareness without overly relying on systems and software

    The implementation of systems and software for information security measures, such as antivirus software, is certainly necessary. However, information security measures are not something that guarantees absolute safety just by installing this security software. Attackers' methods are becoming increasingly sophisticated, and there are more attacks that software cannot prevent.
    It is crucial to abandon the idea that "we are always protected and safe" and for each employee to acquire the correct knowledge of information security measures and conduct their daily tasks with caution. Let's cultivate individual security awareness through information security education.


    6. E-learning materials for information security measures

    The e-Learning Manuscript Easy Arrangement Series "Fundamentals of Information Security Measures in Corporations: 2020 Case Studies" provided by Human Science is a course that can be used for employee information security training as one of the information security measures. It introduces three threats: "Targeted Attacks," "Supply Chain Attacks," and "Ransomware".
    Since it is in PowerPoint format, you can freely edit it to add your company's policies, examples, or even a message from the president.

    In addition to the three threats, we also offer a course titled "Fundamentals of Information Security Measures in the Workplace" where you can learn basic knowledge.
    If you are struggling with information security measures, please consider it!

    e-Learning Manuscript Easy Arrangement Series
    "Fundamentals of Information Security Measures in Corporations: 2020 Case Studies"
    "Fundamentals of Information Security Measures in Corporations"

    Sayoko Shirochika

    Author:

    Sayoko Shirochika

    Education Solutions Department Production Group
    Writer / Consultant
    Since joining the company, consistently engaged in e-learning production.
    In addition to overseeing the entire project as a director, also responsible for writing scenarios specialized in e-learning.
    Currently, leveraging past production experience, also serves in instructional design, scenario writing, and consulting related to e-learning.

    Contact Information:

    Phone Number: 03-5321-3111
    hsweb_inquiry@science.co.jp