Download Our Fraud and Cybercrime Vulnerabilities On

Total Page:16

File Type:pdf, Size:1020Kb

Download Our Fraud and Cybercrime Vulnerabilities On Fraud and cybercrime vulnerabilities on AIM Research into the risks impacting the top 200 AIM listed businesses Audit / Tax / Advisory / Risk Smart decisions. Lasting value. 2 Contents Introduction 5 Key findings 6 Case studies and examples 12 What should organisations do? 18 Organisations and authors profile 20 Appendices 23 Fraud and cybercrime vulnerabilities on AIM 3 Introduction Key findings Ransomware Risk1 47.5% of companies had at least one external 1 internet service exposed, which would place them at a higher risk of a ransomware attack. Email Spoofing 91.5% of companies analysed were 2 exposed to having their email addresses spoofed. Vulnerable Services 85% of companies were running at least one 3 service, such as an email server or web server, with a well-known vulnerability to a cyber attack. Out of Date Software 41.5% of companies had at least one service 4 that was using software which was out of date, no longer supported and vulnerable to cyber attack. Certificate Issues 31.5% of companies had at least 5 one internet security certificate which had expired, been revoked or distrusted. Domain registration risks 64% of companies had at least one domain 6 registered to a personal or individual email address. 1 A new category of risk that was not included in the previous KYND / Crowe analysis of legal firms. Please see ‘Ransomware Risk’ in this report for further context. 4 Introduction There has been a surge in fraud and cybercrime in the UK and AIM listed businesses are not immune. Irrespective of size, listed businesses The impact of a cyber attract cybercriminals due to their visibility and the opportunity to breach could be use share price as leverage to devastating, including extract ransom payments. financial loss and The impact of a significant reputational damage. breach on a listed business Although businesses are well aware of can sometimes knock the issue, basic vulnerabilities persist. the confidence of fragile Crowe, KYND and the University of investors. Portsmouth’s Centre for Counter Fraud Studies undertook research The operational impacts of a breach in February 2020 to establish how can result in a loss of service and vulnerable AIM listed businesses an inability to deliver goods and are to cybercrime. The research services to clients and customers. focused on the internet domains of Valuable management time is lost the top 200 AIM listed businesses, reacting to fraud and cybercrime and by market capital, and examined the distracts from a business’s mission. cyber risk exposure of each business at that point in time. The research The amount of money businesses are utilised KYND’s pioneering cyber losing to cybercrime is increasing. risk management technology. Ransomware attacks alone increased by 350% in 2018, with global The KYND technology tracks down ransomware damage costs expected all domains relating to an organisation to double to $20 billion by 2021. and the externally facing software and services running on those The threat is constantly evolving domains. It highlights risks to the and businesses need to continue organisation relating to domain evaluating and improving their cyber registration, service vulnerabilities, resilience. The Department for Digital, security certificates and more. Culture, Media and Sport’s Cyber Security Breaches Survey 2019 found The findings of the research 32% of UK businesses identified are stark. The vast majority cyber security breaches or attacks in the last 12 months. The findings also of top 200 AIM listed suggest that, in cases where cyber businesses have significant security breaches have resulted in a unaddressed cyber risks. business losing data or assets, the financial costs from such incidents have consistently risen since 2017. Fraud and cybercrime vulnerabilities on AIM 5 Key findings Key findings Ransomware Risk of companies had at least one external service exposed, which would place them at 47.5% a higher risk of a ransomware attack. Ransomware is an emerging form of Commonly exploited services are those malware that locks the user out of their used for file sharing or remote access, for files or their device, then demands an example File Transfer Protocol (FTP), Secure anonymous online payment to restore Shell (SSH), Server Message Block (SMB) access. Such attacks saw a 350% increase and Remote Desktop Protocol (RDP). in 2018, with global ransomware damage Having these types of service externally costs predicted to hit £20 billion in 2021, exposed can result in ransomware – once up from £11.5 billion in 2019. This past year target services have been identified, bore witness to ransomware impacting hackers will typically gain access by companies large and small, public and brute-forcing passwords in order to login private. A more recent twist is not only as the administrator. They will then encrypt encryption of the network for a ransom, data and demand a ransom payment, but if the victim refuses to pay, then the typically in cryptocurrency (e.g. Bitcoin) attackers release sensitive company data on for the business to regain access. the internet – turning a ransomware-based business disruption into a data breach. What can you do? One of the most utilised attack vectors These types of services should not be for hackers carrying out ransomware accessible or visible on the public internet attacks is simply to scan the public and should immediately be hidden behind internet for specific open ports relating a firewall or the port should be closed. to services, which would allow external access if not securely configured. 6 Email spoofing of the organisations analysed are exposed to having their email addresses spoofed and used 91.5% to send spam, phishing or otherwise fraudulent emails (either internally or externally). Standard inbox spam filters and vigilant Email spoofing can result in: staff will catch most phishing by spotting • exposure to malware and ransomware an incorrect originating email address. • phishing of employees Spoofed emails appear to be sent from an • phishing of clients. organisation’s legitimate address and will not be flagged as spam. It is far harder to spot. Companies at risk of email spoofing What can you do? do not have the correct email • Start by creating a statement, known as a Sender security configurations in place. Policy Framework (SPF) record, specifying all the infrastructure that sends emails on your behalf. Organisations using external email security • Publish the SPF record within a policy services may mistakenly assume they known as Domain Message Authentication are protected. Such services can be Reporting and Conformance (DMARC). effective at protecting an organisation • Begin by using your DMARC to monitor emails being from internal spoofing (an organisation’s sent on your behalf. If you get to this point, well done. own domains used to send spoof emails You’re now aware of any spoofing attempts that are to employees), but they are not effective being made on your organisation’s email addresses. at preventing external spoofing (an organisation’s domains used to send spoof • Based on these reports, over time you’ll be able to emails to customers and suppliers). slowly progress your DMARC policy to first warn recipients of illegitimate emails, before progressing Incorrect configurations suggest there further to stop those emails from being received at all! may be insufficient oversight of cyber security in the organisation or a lack It’s worth noting that many organisations may be of knowledge and skills to correctly on this journey of understanding and monitoring implement the protection that is available. their emails with minimal settings, which is why they are currently spoofable. They’ll be aware of any Of the 200 organisations analysed, 182 attempts to do so, and in time will be able to refine of them (91%) were wide open to having their settings to become increasingly resilient. their domains spoofed and used to send spam, phishing or otherwise fraudulent emails either internally or externally. Fraud and cybercrime vulnerabilities on AIM 7 Key findings Vulnerable services of organisations were running at least one service with a well-known vulnerability – putting them at high 85% risk of attack from cybercriminals who specifically target services with known vulnerabilities. Newly discovered software vulnerabilities are disclosed publicly as part of the disclosure and resolution process for software developers. Cybercriminals use these public repositories of software vulnerabilities and identify websites using services with known vulnerabilities. Running vulnerable services can • ransomware – a malicious program result in: that removes access to electronic • theft of data – hackers can files, usually by encryption exploit vulnerabilities to directly • malware – software specifically access sensitive data designed to disrupt, damage or • loss of control of website – gain unauthorised access to a website owners and visitors can be computer system also known unaware that the site and traffic to as a virus, bug or worm. the site has been compromised 8 Out-of-date services of organisations had at least one internet service that was using software which was out of date and 41.5% no longer supported by its developer, putting them at higher risk of cyber attack and service failure. Older versions of services are no longer supported or maintained by What can you do? the vendor and any newly discovered • Have a register that includes vulnerabilities are only patched in the details of all software used, where new release versions of the software. it is used, and who is responsible for keeping it up to date. Running old or out-of-date versions of • Have a procedure to regularly services makes a business extremely check software is up to date. vulnerable to attack and service failure. • Do not delay or ignore messages Running out-of-date services to update services when prompted can have the same impact as by software providers. running vulnerable services.
Recommended publications
  • End-To-End Measurements of Email Spoofing Attacks
    End-to-End Measurements of Email Spoofing Attacks Hang Hu, Gang Wang [email protected] Computer Science, Virginia Tech Spear Phishing is a Big Threat • Spear phishing: targeted phishing attack, often involves impersonation • 91% of targeted attacks involve spear phishing1 • 95% of state-affiliated espionage attacks are traced to phishing2 1. Enterprise Phishing Susceptibility and Resiliency Report, PhishMe, 2016 2. 2013 Data Beach Investigation Report, Verizon, 2013 2 Real-life Spear Phishing Examples Yahoo DataJohn Breach Podesta’s in 2014 Gmail Account From Google [accounts.googlemail.comAffected] 500HillaryMillion ClintonYahoo! 2016User CampaignAccount Chairman Why can phishers still impersonate others so easily? 3 I Performed a Spear Phishing Test • I impersonated USENIX Security co-chairs to send spoofing emails to my account ([email protected]) Auto-loaded Profile Picture From Adrienne Porter Felt From William Enck Adrienne Porter Felt [email protected] Enck [email protected] [email protected]@ncsu.edu 4 Background: SMTP & Spoofing • Simple Mail Transfer Protocol (SMTP) defined in 1982 • SMTP has no built-in authentication mechanism • Spoof anyone by modifying MAIL FROM field of SMTP HTTP HTTP POP SMTP SMTP IMAP William ncsu.edu vt.edu Hang Mail Server Mail Server SMTP MAIL FROM: [email protected] Attacker Mail Server 5 Existing Anti-spoofing Protocols MAIL FROM: [email protected] Process SMTP, 1982 IP: 1.2.3.4 ncsu.edu Sender Policy Framework (SPF), 2002 • IP based authentication Publish authorized? the IP Is vt.edu Yes IP authorized?
    [Show full text]
  • Using Dmarc to Improve Your Email Reputation Zink
    USING DMARC TO IMPROVE YOUR EMAIL REPUTATION ZINK USING DMARC TO IMPROVE up with ways to mitigate this problem using two primary technologies. YOUR EMAIL REPUTATION Terry Zink 1.1 Terminology Microsoft, USA In email, people naturally thing that the sender of the message is the one in the From: fi eld – the one that they see in their email Email [email protected] client. For example, suppose that you are a travel enthusiast and you receive the email shown in Figure 3. You received the message ‘from’ [email protected], right? Wrong. ABSTRACT In email, there are two ‘From’ addresses: In 2012, the world of email fi ltering created a new tool to combat 1. The SMTP MAIL FROM, otherwise known as the RFC spam and phishing: DMARC [1, 2]. DMARC, or Domain-based 5321.MailFrom [3]. This is the email address to which the Message Authentication, Reporting & Conformance, is a technology that is designed to prevent spammers from From [email protected] <[email protected]> forging the sender, thus making brands more resistant to Subject Receipt for your Payment to Penguin Magic abuse. However, its most powerful feature is the built-in To Me reporting mechanism that lets brand owners know they are being spoofed. June 10, 2014 08:42:54 PDT DMARC has its upsides, and it is very useful for Transaction ID: 8KAHSL918102341 preventing spoofi ng, but it also has some drawbacks – it will fl ag some legitimate email as spam, and it will Hello Terry Zink, cause some short-term pain. You sent a payment of $427.25 USD to Penguin Magic.
    [Show full text]
  • A Security Analysis of Email Communications
    A security analysis of email communications Ignacio Sanchez Apostolos Malatras Iwen Coisel Reviewed by: Jean Pierre Nordvik 2 0 1 5 EUR 28509 EN European Commission Joint Research Centre Institute for the Protection and Security of the Citizen Contact information Ignacio Sanchez Address: Joint Research Centre, Via Enrico Fermi 2749, I - 21027 Ispra (VA), Italia E-mail: [email protected] JRC Science Hub https://ec.europa.eu/jrc Legal Notice This publication is a Technical Report by the Joint Research Centre, the European Commission’s in-house science service. It aims to provide evidence-based scientific support to the European policy-making process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. All images © European Union 2015, except: Frontpage : © bluebay2014, fotolia.com JRC 99372 EUR 28509 EN ISSN 1831-9424 ISBN 978-92-79-66503-5 doi:10.2760/319735 Luxembourg: Publications Office of the European Union, 2015 © European Union, 2015 Reproduction is authorised provided the source is acknowledged. Printed in Italy Abstract The objective of this report is to analyse the security and privacy risks of email communications and identify technical countermeasures capable of mitigating them effectively. In order to do so, the report analyses from a technical point of view the core set of communication protocols and standards that support email communications in order to identify and understand the existing security and privacy vulnerabilities. On the basis of this analysis, the report identifies and analyses technical countermeasures, in the form of newer standards, protocols and tools, aimed at ensuring a better protection of the security and privacy of email communications.
    [Show full text]
  • 5 Ways to Avoid Being the Target of Email Spoofing
    5 ways to avoid being the target of email spoofing ver several days, a number of your members report receiving an email from a board member Oasking them to open an attachment. Most realize it’s spam and delete it, but since it appears to come from your chapter, one or two fall victim to the scam. Email spoofing happens when scammers forge communications with your members and the sending details on a message, the same way potential members. someone can write a false return address on an envelope. The message might appear to Check your SPF records and adjust if be from you, but isn’t really. By leveraging necessary. The Sender Policy Framework (SPF) publicly available information, scammers hope standard identifies the mail servers that can to get the recipient to provide something of send email on behalf of your chapter, and an value, like sending them account information SPF-protected domain is less attractive to phishers or transferring funds. and spoofers. Understanding some of its intricacies and adjusting as necessary can help The volume of spam emails quadrupled in 2016 protect your chapter’s reputation and improve (2017 IBM Threat Intelligence Index). There are your email deliverability. StarChapter maintains a number of things you can do to protect your SPF records on your behalf. chapter from spoofing, and there are changes you can make in the aftermath of a spoofing If you’ve gotten a spoofed message, make sure attempt to maintain the safety of your email that your email system is set to perform SPF program and the integrity of your checks.
    [Show full text]
  • Implementation Guidance: Email Domain Protection
    UNCLASSIFIED//TLP:WHITE Implementation Guidance: Email Domain Protection PRACTITIONER 1 ITSP.40.065 UNCLASSIFIED//TLP:WHITE FORWARD ITSP.40.065 Implementation Guidance: Email Domain Protection is an UNCLASSIFIED publication that is issued under the authority of the Head of the Canadian Centre for Cyber Security (Cyber Centre). For more information, email or phone our contact centre: Contact Centre [email protected] (613) 949-7048 or 1-833-CYBER-88 EFFECTIVE DATE This publication takes effect on April 7, 2020. REVISION HISTORY Revision Amendments Date 1 First release April 7, 2020 2 ITSP.40.065 UNCLASSIFIED//TLP:WHITE TABLE OF CONTENTS 1 Overview .................................................................................................................................... 6 2 Email Domain Protection Mechanisms ............................................................................................. 7 2.1 SPF .................................................................................................................................................... 7 2.2 DKIM .................................................................................................................................................. 7 2.3 Limitations of SPF and DKIM ............................................................................................................... 8 2.4 DMARC .............................................................................................................................................. 8 2.4.1 DMARC Validation
    [Show full text]
  • Understanding DMARC: Your Guide to Powerful Email Authentication
    Understanding DMARC: Your Guide to Powerful Email Authentication An Email Best Practices Whitepaper CONTENTS A Brief Introduction to DMARC 03 Modern Threats to Email Security: Phishing and Spoofing 04 What is DMARC? 05 How DMARC Works 05 How DMARC Impacts Deliverability 07 Who is Using DMARC? 07 Implementing a DMARC Policy for Your Domain 09 The Future of DMARC 10 DMARC Authentication at SocketLabs 11 About SocketLabs 12 ©2019 SocketLabs 2 Introduction As marketing and transactional email becomes a more prominent part of modern business, the security of email has become a topic of much conversation. While the basic principles of SMTP have yet to change by any significant measure, modern technology has changed the rate at which we are able to configure, send, receive, and consume email. With this increase in traffic and overall usage of email comes an equal increase in malicious entities looking to take advantage of users through phishing, spoofing, and forgery tactics. An increase in compromising email tactics demands an increase in security, which has been duly noted by the larger players in the email industry. This increase in security takes the form of many different measures including intelligent spam filters, advanced encryption, authentication protocols like SPF and DKIM, and the primary topic of this guide, DMARC (Domain-based Message Authentication, Reporting & Conformance). DMARC is a protocol that is designed to prevent spammers from sending malicious email on behalf of your domain without your permission through a practice known as spoofing. ©2019 SocketLabs 3 Modern Threats Before you understand the ins and outs of how spammers conduct phishing and to Email Security: spoofing techniques, you need to first understand what a “message header” Phishing and is.
    [Show full text]
  • An Intelligent Spam Detection Model Based on Artificial Immune System
    information Article An Intelligent Spam Detection Model Based on Artificial Immune System Abdul Jabbar Saleh, Asif Karim, Bharanidharan Shanmugam , Sami Azam * , Krishnan Kannoorpatti, Mirjam Jonkman and Friso De Boer College of Engineering, IT and Environment, Charles Darwin University, Casuarina, NT 0810, Australia; [email protected] (A.J.S.); [email protected] (A.K.); [email protected] (B.S.); [email protected] (K.K.); [email protected] (M.J.); [email protected] (F.D.B.) * Correspondence: [email protected] Received: 31 May 2019; Accepted: 9 June 2019; Published: 12 June 2019 Abstract: Spam emails, also known as non-self, are unsolicited commercial or malicious emails, sent to affect either a single individual or a corporation or a group of people. Besides advertising, these may contain links to phishing or malware hosting websites set up to steal confidential information. In this paper, a study of the effectiveness of using a Negative Selection Algorithm (NSA) for anomaly detection applied to spam filtering is presented. NSA has a high performance and a low false detection rate. The designed framework intelligently works through three detection phases to finally determine an email’s legitimacy based on the knowledge gathered in the training phase. The system operates by elimination through Negative Selection similar to the functionality of T-cells’ in biological systems. It has been observed that with the inclusion of more datasets, the performance continues to improve, resulting in a 6% increase of True Positive and True Negative detection rate while achieving an actual detection rate of spam and ham of 98.5%.
    [Show full text]
  • Revisiting Email Spoofing Attacks
    Revisiting Email Spoofing Attacks Hang Hu Gang Wang Virginia Tech Virginia Tech Abstract—The email system is the central battleground against emails still be delivered to users? If so, how could users know phishing and social engineering attacks, and yet email providers the email is questionable? Take Gmail for example, Gmail still face key challenges to authenticate incoming emails. As a delivers certain forged emails to the inbox and places a security result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In cue on the sender icon (a red question mark, Figure 4(a)). this work, we study email spoofing to answer three key questions: We are curious about how a broader range of email providers (1) How do email providers detect and handle forged emails? (2) handle forged emails, and how much the security cues actually Under what conditions can forged emails penetrate the defense help to protect users. to reach user inbox? (3) Once the forged email gets in, how email In this paper, we describe our efforts and experience in eval- providers warn users? Is the warning truly effective? We answer these questions through end-to-end measurements uating the effectiveness of user-level protections against email 1 on 35 popular email providers (used by billions of users), and spoofing . We answer the above questions in two key steps. extensive user studies (N = 913) that consist of both simulated First, we examine how popular email providers detect and han- and real-world phishing experiments. We have four key findings.
    [Show full text]
  • Adoption of Email Anti-Spoofing Schemes: a Large Scale Analysis
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TNSM.2021.3065422, IEEE Transactions on Network and Service Management IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 1 Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis Sourena Maroofi, Maciej Korczynski,´ Arnold Hölzel, Andrzej Duda, Member, IEEE Abstract—Sending forged emails by taking advantage of a real Microsoft login page to steal user credentials [2]. In this domain spoofing is a common technique used by attackers. paper, we investigate the second type of email spoofing. The lack of appropriate email anti-spoofing schemes or their The Simple Mail Transfer Protocol (SMTP) for email dis- misconfiguration may lead to successful phishing attacks or spam dissemination. In this paper, we evaluate the extent of tribution does not provide support for preventing spoofing [3] the SPF and DMARC deployment in two large-scale campaigns so mail systems need to rely on security extensions such as measuring their global adoption rate with a scan of 236 million the Sender Policy Framework (SPF) [4], the DomainKeys domains and high-profile domains of 139 countries. We propose Identified Mail (DKIM) [5], and Domain-based Message Au- a new algorithm for identifying defensively registered domains thentication, Reporting, and Conformance (DMARC) [6] to and enumerating the domains with misconfigured SPF rules by emulating the SPF check_function. We define for the first time authenticate the sender and decide what to do with suspicious new threat models involving subdomain spoofing and present emails.
    [Show full text]
  • A Case Study of Email Sender Authentication
    Composition Kills: A Case Study of Email Sender Authentication Jianjun Chen∗ Vern Paxson†∗ Jian Jiang‡ ∗ † ‡ International Computer Science Institute University of California, Berkeley Shape Security Abstract email. To combat email spoofing, modern email servers em- ploy several SMTP extensions—SPF, DKIM, and DMARC— Component-based software design is a primary engineering to authenticate the sender’s purported identity, as the basis approach for building modern software systems. This pro- for displaying in email clients assurances of validity to users gramming paradigm, however, creates security concerns due when they read messages. to the potential for inconsistent interpretations of messages be- tween different components. In this paper, we leverage such inconsistencies to identify vulnerabilities in email systems. We identify a range of techniques to induce inconsistencies among different components across email servers and clients. We show that these inconsistencies can enable attackers to bypass email authentication to impersonate arbitrary senders, and forge DKIM-signed emails with a legitimate site’s signa- ture. Using a combination of manual analysis and black-box testing, we discovered 18 types of evasion exploits and tested them against 10 popular email providers and 19 email clients— all of which proved vulnerable to various attacks. Absent knowledge of our attacks, for many of them even a consci- Figure 1: A spoofing example that impersonates entious security professional using a state-of-the-art email facebook.com. Gmail shows that this email is signed provider service like Gmail cannot with confidence readily by facebook.com. determine, when receiving an email, whether it is forged. We show that the compositions of different software com- 1 Introduction ponents to construct these validity assurances have wide- ranging vulnerabilities enabling attackers to undermine the Component-based software design [1] has been widely decision-making process.
    [Show full text]
  • End-To-End Measurements of Email Spoofing Attacks
    End-to-End Measurements of Email Spoofing Attacks Hang Hu Gang Wang Virginia Tech Virginia Tech [email protected] [email protected] Abstract email phishing has involved in nearly half of the 2000+ reported security breaches in recent two years, causing a Spear phishing has been a persistent threat to users and leakage of billions of user records [4]. organizations, and yet email providers still face key chal- Email spoofing is a critical step in phishing, where lenges to authenticate incoming emails. As a result, at- the attacker impersonates a trusted entity to gain the tackers can apply spoofing techniques to impersonate a victim’s trust. According to the recent report from the trusted entity to conduct highly deceptive phishing at- Anti-Phishing Working Group (APWG), email spoof- tacks. In this work, we study email spoofing to answer ing is widely in spear phishing attacks to target em- three key questions: (1) How do email providers detect ployees of various businesses [2]. Unfortunately, to- and handle forged emails? (2) Under what conditions can day’s email transmission protocol (SMTP) has no built- forged emails penetrate the defense to reach user inbox? in mechanism to prevent spoofing [56]. It relies on (3) Once the forged email gets in, how email providers email providers to implement SMTP extensions such as warn users? Is the warning truly effective? SPF [40], DKIM [19] and DMARC [50] to authenticate We answer these questions by conducting an end-to- the sender. Since implementing these extensions is vol- end measurement on 35 popular email providers and ex- untary, their adoption rate is far from satisfying.
    [Show full text]
  • Your In-Depth Guide to Email Authentication
    Your In-Depth Guide to Email Authentication An Email Best Practices Whitepaper WHAT YOU WILL LEARN • What is email authentication? • Why is email authentication necessary? • A brief history of email authentication • What is Sender Policy Framework (SPF) authentication? • What is DomainKeys Identified Mail (DKIM)? • What is Domain-based Message Authentication, Reporting & Conformance (DMARC)? ©2019 SocketLabs 2 CONTENT Introduction to Authentication 04 The Growth of Email Spam 04 Email Spoofing and Phishing 04 What is Email Authentication? 05 A Brief History of Authentication 06 What is Sender Policy Framework (SPF) Authentication? 08 What is DomainKeys Identified Mail (DKIM) 10 Authentication? What is Domain-based Message Authentication, Reporting 12 & Conformance (DMARC)? Adoption of Email Authentication 13 Conclusion 13 ©2019 SocketLabs 3 Introduction The objective of this paper is to provide a brief overview and description of the most commonly used authentication practices and methodologies in today’s email industry. This guide will cover the main topics and points of discussion with regard to the mainstream standards used today for authenticating email. The Growth of In an email and spam data report by Cisco Systems, it was revealed Email Spam that over 400 billion spam email messages are sent each day – approximately 85% of worldwide email. This alarmingly high rate of spam being sent out is the direct result of an increase in spamming tactics like phishing, botnets, social engineering, and reputation hijacking. Because spam and other cyber security issues continue to increase year after year, technology integrators have turned to alternative methods to secure their communications. Email authentication is one such method.
    [Show full text]