Cyber Resilience for Email TECHNICAL DEEP DIVE Cyber Resilience for Email | Technical Deep Dive
Total Page:16
File Type:pdf, Size:1020Kb
Cyber Resilience for Email TECHNICAL DEEP DIVE Cyber Resilience for Email | Technical Deep Dive mail. It’s the number-one business application used by organizations. It doesn’t stop there. There are more ways to exploit email that haven’t EIt’s also the number-one method used to execute cyberattacks, enabling been put into broad practice. Mimecast recently provided an example of a malware delivery, phishing, impersonations, and the spread of threats that new attack type we named Ropemaker. Fortunately, we have yet to see this are already internal to your organization. In fact, 91 percent of all attack type in the wild! By using this exploit a malicious actor can change cyberattacks start with an email. And your organization can’t function for the displayed content of a delivered email at any time, post-delivery. This long without email. How many hours of email downtime can your could mean swapping a benign URL with a malicious one in an email already organization comfortably live with? If email isn’t accessible due to an delivered; turning simple text into a malicious URL; or editing any text in the adverse incident like malicious intent, human error or technical failure, your body of an email, whenever the attacker wants to – and all of this can be organization would likely suffer from reputational damage, internal done without direct access to an inbox – after delivery. The point is operational issues, and financial loss. attackers are not standing still and so the defenders must not either! Meanwhile, the use of Microsoft Office 365 is massive, and adoption It’s Time for a New Approach is accelerating. As organizations move to a cloud-based email environment, new challenges come along. The concentration of A defense-only security strategy is not sufficient to protect corporate mailboxes, and the complete operational against this level and volume of advanced email-borne dependency on Microsoft exposes organizations to new risks. attacks. Continuing to invest in disparate technologies and One resilient cloud suite. focusing Email is at theFo intersectionr one craz ofy wo a significantrld. amount of risk for on a defense-only security strategy will lead to consequences most organizations. If addressing this exposure doesn’t like intellectual property and financial loss, unplanned become a priority, successful cyberattacks will continue and downtime, decreased productivity and increased data protection and personal privacy will suffer. vulnerabilities. Legacy technologies can leave holes in your security and force you to chase tomorrow’s attacks with Traditional security approaches are no longer enough. Attack methods yesterday’s approaches. This also leads to additional cost and the are quickly evolving and growing more sophisticated, targeted and need to find more of the right people to manage a complex security dangerous. Right now, the industry is faced with email-borne threats such environment. It’s no wonder so many organizations are struggling to keep as phishing attacks delivering malicious attachments and URLs; pace. impersonation fraud fueled by social engineering and aimed at tricking employees into behaving badly; and ransomware attacks that can encrypt The only way to get ahead of cybercriminals and to holistically protect your your data and take entire systems offline. business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, These are only the types of threats we know about today. What about adaptability, durability and recoverability in a single cloud-based service. the future? One example of an emerging attack technique is the use of homoglyph/homograph-based attacks to mask domains, slip by your security You need to enable these four dimensions to truly provide cyber resilience controls, and to fake out your users as part of a spear-phishing attack. for your email. 2 www.mimecast.com | © 2018 Mimecast ALL RIGHTS RESERVED Cyber Resilience for Email | Technical Deep Dive Cyber Resilience for Email Threat Protection A strategy which delivers cyber resilience for email empowers organizations Introducing the Mimecast Email Security Inspection Pipeline: to secure, preserve and continue the flow of communications via email. This means preparing you for every stage of an attack: Before getting into the weeds of how the Mimecast email security service works, first take a glance at figure 1 on the next page. Figure 1 is a graphical 1. Putting the right security controls in place representation of the email security inspection pipeline of the Mimecast BEFORE an attack happens – focused on service in its entirety. What jumps out at you? The fact that so many prevention as well as those focused on analytic steps are being applied in an instant across hundreds of millions of quickly adapting to attacks techniques as emails a day? Or perhaps the breakdown of the analysis into specialized they evolve. inspection pipelines – with attachment inspection and URL inspection handled in their own streams? Or the many different types and total number 2. A continuity plan to keep email – and your of analytics that need to be applied to produce safe emails? Or business operations dependent on email perhaps the overall funnel effect – which always starts with high – running DURING an attack or failure. level, more general-purpose inspections applied to the emails before the analysis moves on to deeper, more sophisticated 3. The ability to recover data and other inspections further down in their respective funnels? corporate IP AFTER an incident or attack occurs. The Four Dimensions of Cyber Resilience for Email from Mimecast Our cloud-based system helps organizations prevent email-borne cyberattacks; keeps email flowing, business operations running and employees productive during downtime; and enables the recovery of lost or locked data after an attack happens. 3 www.mimecast.com | © 2018 Mimecast ALL RIGHTS RESERVED Cyber Resilience for Email | Technical Deep Dive EMAIL INSPECTION Configurable Block/ Permitsermits Safe File Conversion ATTACHMENT INSPECTION DNS Authentication URL INSPECTION SPF/DKIM/DMARCC Macros + Dangerous File TypesTypes Reputation Checks URL Discovery, Analysis, & Rewriting + Greylisting Maverick AV Check Spam Scanning Commercial AV Engine Checkss User Resolve URL to Final Web Address Configurable Awareness Content Checks Static File Analysis P Apply Customer & Mimecast Impersonation Block & Permit Lists SandboxingSandboxing Protection YES NO Apply 3rd Party Domain & IP Reputation Lists Block Dangerous File Type Downloads & Sandboxing Real-time deep User InspectionReal-time & analysisdeep Aw Inspectionof page contents & analysis s of page contents Safe Emails Figure 1: The Mimecast Threat Inspection Pipeline Cyber Resilience for Email | Technical Deep Dive Of course, the most logical answer is all-of-the-above and more! The beauty responsible for the day-to-day security efficacy of it are the members of the of the Mimecast email security cloud service is that the inspections can be Mimecast Security Operations Center (MSOC). both deep and wide, without significantly impacting the speed of delivery of the emails. Before an inbound email ever makes it to your organization’s The MSOC is a team of globally distributed analysts and security researchers email system, whether your email system is on-premises or in the cloud, it that tend to the Mimecast service on a 24 x 7 basis. They effectively are our goes through many layers of inspection and analysis to detect the ways customer’s email security focused operations center in the cloud! For phishers and spammers try to get to and fool your email security system and example, when customers submit suspect phishes and spam emails to your users. Mimecast – which number approximately 2500/day – the MSOC team is the group that analyzes them and in response makes any needed changes to Could your organization setup, maintain, and improve an equivalent email improve the service. security system on your own? Very unlikely, even if your organization had the most sophisticated security teams in the world with nearly unlimited The MSOC responsibilities include: budget. Isn’t that the point of subscribing to a specialized cloud service in the first place? We go deep so you don’t have to? • Investigating & notifying customers of likely compromises Can other email security cloud service providers offer the • Removing organizations from email blacklists sophistication of inspection that Mimecast does? This is also very hard for them to accomplish. To do so requires a level of • Creating and deploying updated threat detection signatures focus, speed, innovation, and scale that is beyond the capabilities of most. Also without a cloud-based architecture • Handling customer generated security related escalations that is like our MIME|OS (described below), other cloud providers, particularly those using hosted VM-based • Collaborating with 3rd-parties such as ISACs, ISPs, Hosting solutions that were originally built for on-premises deployments, Providers, Domain Registrars, & Law Enforcement are severely constrained as to the speed of development and integration that they can deliver. The MSOC is the team at Mimecast that is most responsible for staying ahead The Mimecast SOC of attackers and how they are attacking organizations with new spam, phishing, and malware distribution campaigns. To stay ahead of the When you think about the Mimecast email security service, you might think attackers and spammers