Phishing Your Own Users

New anti-phishing upgrades raise the profile of client-side attacks

Dark Reading logo in a gray background | Dark Reading

What if you could launch an automated phishing attack on your own organization? Okay, maybe not a "real" one, but one that looked real enough to determine where your phishing vulnerabilities lie?

Core Security's new version of its Impact penetration testing tool comes with an exploit module that, like an effective phish, lets you build fake emails that look legitimate. It's a way to test both how well your end-user anti-phishing education and policy and anti-phishing tools are working.

Client-side pen testing is becoming more important these days, with targeted attacks on the rise, including so-called spear phishing of a targeted user or organization. And version 6.2 of Core's commercial penetration testing tool, released today, is the latest anti-phishing weapon to help enterprises and users to defend themselves. The newest version of the open-source Opera browser, 9.1, also released today, comes with links to the PhishTank "community watch" fraud-protection service for identifying phishing sites, in real-time. (See Report: Phish Jump and Startup Finds Phish in Browsers.)

"Client-side exploits are where the threat is these days, and not testing for them is leaving the largest area of exposure wide open," says HD Moore, director of security research for BreakingPoint Systems. "I would expect any company that provides penetration testing to at least offer client-side exploit attempts as part of their service."

The downside, however, is it can get a little personal with users. "It tends to be high-visibility on the employees -- even if they aren't caught by the exploit, they wouldn't appreciate being targeted."

Scottish Re, a re-insurance company based in the U.S., has been running the Impact penetration tool for two years and conducts employee awareness training on phishing. "I can see how this [phishing feature] could be helpful," says Mark Odiiorne, CISO and senior network systems manager, who says he may set up the new upgrade soon to get familiar with it. "If this is something we find we are having more problems with, we could take advantage of it [the phishing exploit]."

The Impact phishing module lets you get email addresses, generate names, and send emails that look legit, says Mike Yaffe, director of product marketing for Core, which offered a "rudimentary" phishing email function in version 6, he says. "Now you have this level of automation, where you can do this in a few clicks," he says, with templates that reflect the latest trends in phishing and social engineering exploits. It also lets you automatically generate email to a group of "targets," but with personalized content on each recipient. (See Six Hot Security Products.)

The big tradeoff of pen-testing, however, is you can inadvertently crash or interrupt your business systems and applications, so not all companies are willing to use the tools themselves, or they keep it limited to the lab.

Impact Version 6.2 also comes with encryption and authentication enhancements, as well as support for testing networks with IBM AIX-based systems and Internet Explorer 7 and existing customers get the upgrade as part of their subscription service. Impact is priced at $25,000 per year for training, support, and exploit updates. It runs on Windows 2000 and XP, and includes exploits for Windows XP, Windows 2003, NT4, Windows 2000, Solaris, OpenBSD, Mac X, and Linux.

The new Opera browser, meanwhile, comes with real-time phishing detection via PhishTank.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights