How to Weed the Bad Links Out of Your Inboxes

How to Weed the Bad Links Out of Your Inboxes

Entities need to understand why these attacks are so common and how to combat them.

While malicious links are not a new cyberthreat, this tactic remains a pervasive and effective hacking technique.

For instance, with the Meltdown and Spectre vulnerabilities recently threatening billions of computers, many people, urgent to find information and solutions, clicked a link that arrived unsolicited in their inboxes, purportedly from the German Federal Office for Information Security. The link appeared legitimate and promised to provide a defense strategy. Instead, the very malware that those users were trying to avoid was installed on their computers.

Locky ransomware, originally released in 2016, offers a similar cautionary tale. Locky regained popularity in 2017 with more than 130 million emails being sent, peaking in September with 60 million emails delivering the malware in a single day. The infection spread via an otherwise innocuous-seeming email containing either an embedded link to a malicious site or an “invoice” attachment that contained the Visual Basic script of the malware downloader. In fact, this exploit proved to be so successful that the total cost of the Locky cyberattack has been estimated at more than $1 billion.

Both of these incidents highlight the scope and scale of malicious URLs. With attacks most likely to appear in organizations' inboxes and most likely to strike at the bottom line, entities need to understand both why these attacks are so common and how to combat them.

The Allure of Bad Links

The phishing tactics used to make malicious URLs and the emails that make them look entirely legitimate are diverse. For this reason, this forgery — such as using polished emails or websites that are SSL-enabled — is difficult to spot for even the most diligent users. While many users are aware that such links can be traps, many have nonetheless clicked these links before and likely will again.

In fact, 91 percent of all cyberattacks begin with a phishing email, indicating the fundamental risks these threats pose to organizations. So where does this disconnect between knowledge and practice stem from?

First and foremost, users are naturally curious. Links promising to connect a user with valuable information or a lucrative opportunity play into that vulnerability. Moreover, links that obscure the true destination with a "cousin domain" (a link that manipulates one or a few letters to mimic an authentic web address, such as adding or replacing a single letter) or with a link shortened by services like bit.ly, can deceive even the most cautious users.

With 97 percent of bit.ly links leading to malicious websites, this threat from shortened links is astonishingly high — namely because the link shortening circumvents the long-trusted "hover method," in which a user places his mouse over a link to see its destination before clicking it.

The Solution to Bad Links

Exacerbating the above problems are two drivers of employee success: efficiency and productivity. Scrutinizing every link in every email takes time, particularly with the average worker getting 121 emails per day. Workers may worry that not clicking a potentially legitimate link that contains important files or information could result in lost productivity and employer blowback.

While no single solution to this complex problem exists, businesses can better protect themselves and their users by relying on a comprehensive defense strategy that prioritizes security and convenience.

Link filtering. Scanning emails for embedded links that go to known malicious websites, newly registered domains, or those with low or no reputation, and quarantining them before they reach the user’s inbox should always be the first line of defense.

Cousin spotting. Hackers will often register domains “similar” to popular websites or the company they are attacking and then host their malicious code from them. These “cousin domains” typically have a single letter changed or added, making them seem legitimate enough to avoid detection, especially by users working quickly. Having a solution that validates domains and safeguards users against visiting the spoofed URLs is a strong second line of defense.

Time-of-click analysis. One way hackers bypass basic security measures is by emailing legitimate links and then compromising those sites to host their malicious software. As the links represent older, trusted domains, they often pass through inbound filters. Having a tool that analyzes links in real time confirms that a destination is safe anytime a user clicks on it. This ensures that even if a site is later compromised, the system will analyze the end destination and make sure it’s safe to visit prior to letting the user visit it.

Link scoring and restoration. A link-scoring feature in a cybersecurity tool ensures that securing the email inbox does not create unnecessary business interruptions. If the tool determines the link to be legitimate, for instance, it automatically sends users to their destination. If the link is suspicious, however, the tool provides users with clear information about why caution is necessary and how best to proceed. Moreover, the convenience of shortened links does not outweigh their risks. Links that automatically restore to full length, negating any uncertainty about their destinations, are an invaluable asset to users.

Banner announcements. Still, organizations should ensure that link analysis does not happen behind the curtain, so to speak. In order to continue raising awareness about the risk of links and educating users on best practices, every link should display a banner announcing that it is being analyzed for security at the time of click. By foregrounding this vetting process with a bold banner, organizations teach users not to become flippant about the links in their inboxes and to keep the threat top of mind.

While educated and astute users are a good line of defense for any organization, relying on them alone will not stop the problem of malicious URLs. This cyberthreat is simply too sophisticated and too targeted, but because it relies on human exploits rather than machine exploits, smart tools can unmask what users may miss. Protect yourself by unburdening your users, and take the hackers out of the equation this year.

Featured

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

  • Cloud Resources Have Become Biggest Targets for Cyberattacks According to New Research

    Thales recently announced the release of the 2024 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (26%) cited as the leading categories of attack. As a result, protecting cloud environments has risen as the top security priority ahead of all other security disciplines. Read Now

Featured Cybersecurity

Webinars

Whitepapers

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3