by naftaliharris on 6/27/15, 10:14 PM with 69 comments
by chrissnell on 6/28/15, 5:10 AM
It worked wonderfully. I used it through proxies when I could and watched the phishers try to block me or even attack me back.
by pspace on 6/28/15, 5:45 AM
1. They rely on e-mail while phishing attacks come from multiple sources like Facebook and LinkedIn. Sadly, using those services to simulate phishing attacks violates their ToS.
2. Simulation phishing only provides pass or fail data meaning you cannot determine your weakest links in the organization. At best you get an "average" snapshot.
3. The data isn't very accurate or precise because there are too many confounding variables involved. Time of day, subject matter, type of phishing (attachment, social engineering, etc). Normally we ran our campaigns once a month but this wasn't enough to produce stable results.
4. Clicking doesn't mean they fell victim to the attack -- lot's of people click to investigate then report the links. Ideally, I'd like to specifically know WHY the employee clicked the link and HOW MUCH was actually at stake.
4. It pisses people off. There is enough animosity against us security folks that tricking your employees really hurts that relationship. People feel taken advantage of.
5. It doesn't actually improve security in any meaningful way. I found that it didn't actually improve people's ability to spot and report phishing attempts. They either became paranoid to the point where they were no longer productive in legitimate emails, or they had no improvements over time.
6. There's a growing body of knowledge that dismisses the effectiveness of this kind of phishing training (http://www.govinfosecurity.com/interviews/training-doesnt-mi...) .
With that being said, our company has tried about a dozen of these kinds of services and the best one so far has been one called Apozy that is rather new. It's a different approach but the data and insight you get back is actually very useful.
by jedberg on 6/28/15, 1:37 AM
That being said, I don't like these reports, because any time I get a phishing email I immediately load it up in a protected VM to see what it does, so it would count me as a victim. Since the page you go to isn't a real looking login page, you can't differentiate between those who fall for it and those who just clicked to see what it was.
You need to actually set up the fake page and see who puts in valid credentials to get a true report.
by zensavona on 6/27/15, 11:32 PM
by x0ry on 6/27/15, 10:43 PM
by randomflavor on 6/28/15, 12:13 AM
by watmough on 6/27/15, 10:41 PM
My company uses these guys: http://www.knowbe4.com/
by Buge on 6/28/15, 12:39 AM
I don't like the click link = you lose idea.
by runn1ng on 6/28/15, 1:14 AM
by jwcrux on 6/27/15, 11:29 PM
Quick question - are you concerned about trademarks (Amazon and such) being included as the phishing templates? Reason I ask is that I'm working on a hosted project [1] similar to this and have considered including default templates. I've held off for this exact reason.
Edit - another question, your screenshot in the intro page shows an email (in the Gmail client) coming from "support@github.com". Github has spf records setup so I would be interested to know how you manage to spoof the actual email address itself without getting flagged as spam.
by reagency on 6/28/15, 12:13 AM
Much more upside for you.
by gitaarik on 6/28/15, 1:17 AM
Not saying they would, but they could get hacked of course...
by gnyman on 6/28/15, 11:58 AM
by hrbrtglm on 6/27/15, 11:42 PM
If your customer is using google domains, microsoft 365 or what else, and the employees do not fall in your phishing attempt and report your mail as spam, you may be heading for some trouble with delivery afterward.
by noobermin on 6/28/15, 12:47 AM
by ahmetmsft on 6/28/15, 1:20 AM
by fokz on 6/28/15, 12:45 AM
How do you do email authentication? What are the headers that you put on your email?
by mikeknoop on 6/27/15, 11:24 PM
by it_learnses on 6/27/15, 11:51 PM
by reagency on 6/28/15, 12:14 AM
by talles on 6/27/15, 11:40 PM
by jmatthew3 on 6/27/15, 10:39 PM