As targeted e-mail attacks proliferate, companies wince

Attacks such as the ones detailed by McAfee this week in a report are frequent and hard to detect

The strange e-mails arrived in executives' inboxes around the same time that the Australian oil company was negotiating a deal with a Chinese energy company.

The e-mails had the same structure and format as those sent around the company and were baited with text that appeared to refer to a supposed continuing discussion between executives. The messages looked authentic from a nontechnical perspective, just part of normal electronic communication within a company.

But the corporate IT administrator felt something wasn't quite right. Upon closer examination, the administrator found the e-mails, while appearing to come from internal company servers, were actually coming from other domains not authorized to send e-mail for the company.

The e-mails contained a malicious link that would redirect the person who opened it to a website of another energy company whose Web pages had been hacked in order to deliver malicious software designed to steal data. Victims would have no indication they'd been attacked.

It became clear that hackers were on a campaign to find out more about the pending deal.

"This was just their [the hackers] idea of due diligence," said the Australian IT administrator, who did not want himself or his company to be identified in this story due to the sensitivity of the intrusion.

The situation that faced the Australian company is one that is confronting companies and organizations worldwide regardless of their industry: hackers are getting a lot better at breaking through the defenses designed to keep information safe.

The attacks these days are "getting worse," said Alex Lanstein, a network and systems architect at security vendor FireEye, which makes systems designed to thwart Web-based attacks.

On Tuesday, McAfee -- a major security vendor now owned by Intel -- said it had gained access to a server that had logged intrusions into 72 companies, nongovernmental organizations and governments, including the U.N., U.S. defense contractors and the World Anti-doping Agency, among many others.

Dubbed "Operation Shady RAT" (remote access tool), McAfee heralded the operation as one of the most significant examples of "advanced persistent threats," or cyberattacks that are undetected for a long time.

Some of the most frequently targeted organizations are financial institutions, energy companies, defense contractors and pharmaceutical companies, but hackers are also expanding their remit to other areas, such as law firms, Lanstein said.

Law firms are always at the core of many business transactions, ranging from mergers and acquisitions to patent negotiations and more. And their computer security practices are not quite as good as more frequently targeted organizations, Lanstein said.

"There are always lawyers involved and they always have the most sophisticated information," he said.

Governments are a frequent target. William Hague, the U.K.'s foreign secretary, said in a speech in February that three of his staff were sent e-mails from a purported colleague outside the Foreign Office, the U.K.'s equivalent of the U.S. State Department.

"The e-mail claimed to be about a forthcoming visit to the region and looked quite innocent," Hague said. "In fact it was from a hostile state intelligence agency and contained computer code embedded in the attached document that would have attacked their machine. Luckily, our systems identified it and stopped it from ever reaching my staff."

Cisco's ScanSafe division, which specialized in products that scan Web traffic for malicious activity, released a report earlier this week that looked at how frequently employees of enterprises encounter malicious software on the Internet. It found employees as a group ran into malware an average of 335 times per month for the first half of this year.

Companies in pharmaceutical, chemical, energy and oil industries are at the highest risk for encountering malware on the web, the report said.

In response to the targeted attacks against the Australian oil company, the IT administrator said he built a tool that automatically strips out links in e-mails that come from outside his company. That may be inconvenient for some users, but "we can do without the links but we can't do without security," he said.

Fundamentally, the administrator said many executives still regard computer security as a hindrance and that "these geeks are just trying to make their life hard."

"I still think they think this is a nuisance and that the security guy will take care of it," the IT administrator said. "They are not elected [to the board] for IT savvy. They're old-school business people."

Send news tips and comments to jeremy_kirk@idg.com

Join the PC World newsletter!

Error: Please check your email address.

Tags securityDesktop securityFireEyedata breachdata protectionExploits / vulnerabilitiesmalware

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Donā€™t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?