Please fill in the form below to subscribe to our blog

Guest Starring in the Federal Hack: Phishing

December 18, 2020
nation-state federal hack phishing described by a man in a hoodie sillohuettes adgains a world map with "hacked" stamped on it

Don’t Overlook the Connection Between the Federal Hack & Phishing

While the main focus in this week’s sprawling nation-state hacking contretemps has been on who’s been hacked, and when, and what was breached, and why no one caught it, there has been one but small but crucial security matter that has gotten lost in the tsunami of trouble: these hackers used authentic credentials to move around inside of systems to do their dirty work. One of the ways that they obtained those authentic credentials to use in the massive federal hack: phishing.

Which industries saw the most phishing last year? These 5 did in a year of record-setting threat growth. See how to protect your business.

See how to fix staffing problems, fill security gaps and make more money fast with security automation. LEARN MORE>>

Modern Social Engineering Meets Old-Fashioned Guile

Everyone knows that phishing is the number one threat to every cybersecurity plan. An astonishing 90% of incidents that end in a data breach start with a phishing email. Cybercriminals of all stripes from small Dark Web gangs to huge nation-state hacking operations rely on phishing as a major component of any hacking operation because it’s cheap, effective, and garners them big rewards.

That’s why even though the suspected Russian actors involved in this hacking operation were using extremely sophisticated tools and techniques that many experts have never seen before, they didn’t overlook old-fashioned credential theft. They knew that the safest way for them to move around undetected inside their target’s systems and continue making incursions in new directions was to do it using authentic credentials. So they went for a sure thing to do that in this federal hack: phishing.

This has been a tremendous year for phishing with a more than 600% increase in activity due to massive shifts in the way that people are working and living plus the thirst for information and the fear spawned by the global pandemic. But cybercriminals know that no matter how much cybersecurity experts emphasize the value of security awareness and phishing resistance training, 62% of businesses still don’t do enough of it.

In a challenging economy, every company is looking for ways to trim spending, so they’re increasingly choosing to neglect things like training. Security awareness training isn’t sexy. It’s not a quick, shiny fix for a troublesome issue. No one is looking forward to it. Security awareness and phishing resistance training is something that is perpetually viewed as a boring, waste-of-time item that can be cut from the budget to save money – and that’s a huge mistake. Security awareness by sharp-eyed staffers is what exposed this breach now.

Is Cryptocurrency risk one of 2021's biggest threats

Are you ready to fight back against cybercrime? See where 2021’s threats are coming from and what’s next. DOWNLOAD THE REPORT>>

Whaling and Spear Phishing Do Massive Damage

Phishing of any sort is dangerous, but the two forms of phishing that were used by the nation-state hackers in this incident are absolutely lethal weapons: spear phishing and whaling. Both methods of attack could quickly net them what they needed to extend their operations without leaving a trace by gaining access to authentic or highly privileged credentials.

Everything about this hacking operation was carefully planned, skillfully executed, and meticulously supported, and the phishing elements were no exception. The nation-state hackers concentrated their phishing attempts into spear phishing and whaling because they had the resources to conduct those operations successfully using information gained in other hacks or from intelligence or Dark Web sources.

They then used those resources to trick employees of the initially affected companies into providing them with authentic credentials through social engineering, by using excellent impersonation techniques to convince their targets that the hackers were legitimate employees or executives that needed to add devices, reset passwords or perform other routine tasks. That then enabled the hackers to get their hands on increasingly more privileged credentials by carefully exploiting those opportunities when someone took the bait.

cyberpunk 2077 malware represented by a futuristic looking cityscape featuring many neon signs at night

Want to Borrow Our Sales and Marketing Teams? OK!

Get expert sales and marketing help to power up your MSP in a flash with Powered Services Pro. LEARN MORE>>

Old Problems Need New Solutions

It’s imperative that companies stop overlooking the immense damage that phishing can do to their organization, especially when defending against nation-state hackers. The most commonly used tool of nation-state hackers is ransomware, and the most common delivery system for ransomware is phishing. A robust defense against phishing is vital to secure systems and data in today’s threat landscape.

Fortunately, we’ve got the ideal solution to do the job: BullPhish ID

  • Plug-and-play phishing simulation kits empower you to start training fast 
  • More than 50 engaging, animated videos provide easy-to-understand threat information 
  • Simple remote management makes it easy to run campaigns and adjust training groups 
  • Online testing measures retention to show who needs more help 
  • New training materials are added monthly to cover the latest threats like COVID-19 
  • More than 100 phishing simulation kits are available now
  • Training content is available in 8 languages 

remote workers pose a cryptocurrency risk

Solve five of the most exhausting remote and hybrid security problems fast with this handy infographic! DOWNLOAD IT>>

Don’t Wait Until Nation-State Hackers Knock on Your Door

Nation-state hackers aren’t just a problem for the defense industry or government agencies anymore – they’re also hitting their suppliers and partners, as well as dipping heavily into the private sector. All kinds of businesses in myriad industries are at risk. Throughout the COVID-19 journey to a vaccine, they’ve been striking at hospitals, drugmakers, and now cold storage transportation firms.

These bad actors haven’t just developed new technology that allows them to penetrate defenses more quickly – they’ve also reached into their toolbox to pull out some of the most reliable threats in classic cybercrime, and it’s working. They’ve benefitted greatly from using phishing and ransomware to their maximum capacity instead of just tools that enable them to steal some data. Cybercriminals today are also using those tools to disrupt business operations, slow manufacturing, damage infrastructure, and cause all manner of havoc that they can use to make a profit.

Contact the experts at ID Agent to see how our solutions can help you secure your clients, systems, and data against today’s biggest threats like phishing and nation-state hackers.

let us help secure you against passwords reuse with contact information and the ID Agent logo on grey.

Our Partners typically realize ROI in 30 days or less. Contact us today to learn why 3,850 MSPs in 30+ countries choose to Partner with ID Agent!


Check out an on-demand video demo of BullPhish ID or Dark Web ID WATCH NOW>>

See Graphus in action in an on-demand video demo WATCH NOW>>

Book your demo of Dark Web ID, BullPhish ID, RocketCyber or Graphus now!