Aspects and embodiments disclosed herein are generally directed to an educational platform and method for increasing user's abilities to recognize social engineering delivered through e-mail, for example, to better recognize e-mails that may be phishing attacks.
In accordance with one aspect, there is provided a computerized platform for implementing an educational campaign to increase awareness of indications of signs of unsafe e-mails. The computerized platform is configured to perform a method comprising utilizing an assignment-based approach to provide one or more assignments to a user in which the user is presented with a simulated e-mail including one or more indicators that the user is instructed to determine as being more likely associated with a social engineering-containing e-mail, often called a phishing email, and thus unsafe, or a non-malicious e-mail, and thus safe.
In some embodiments, the platform is further configured to send an e-mail to a user inviting them to participate in an assignment of the one or more assignments, and responsive to the user accepting the invitation, presenting the assignment to the user in a website dedicated to the educational campaign.
In some embodiments, the platform is further configured to present the user with a window including selectable responses regarding whether an indicator within the simulated e-mail appears safe or unsafe.
In some embodiments, the platform is further configured to mirror hacker attacks with typo-squatted domain names and vendor branding that is not possible for phishing vendors to impersonate and that imitate what real hackers, organized crime, and nation states do when attacking individuals and companies with phishing emails.
In some embodiments, the platform is further configured to present to user with a selectable help link which, if selected by the user, presents the user with information regarding how to determine whether the indicator within the simulated e-mail should be considered safe or unsafe.
In some embodiments, the platform is further configured to present a user with a score and an indication of whether they have passed the assignment substantially immediately responsive to the user having selected whether each of the one or more indicators in the simulate e-mail are safe or unsafe and submitting their selections.
In some embodiments, the platform is further configured to request the user to re-take the assignment if they did not receive a passing score.
In some embodiments, the platform is further configured to randomly select from different content to include within each of the one or more indicators if the user re-takes the assignment.
In some embodiments, the platform is further configured to present the use with positive reinforcement responsive to passing the training assignment.
In some embodiments, the platform is further configured to randomly assign content that should be considered either safe or unsafe to each of the one or more indicators.
In some embodiments, the platform is further configured to assign the user an overall score and a rank responsive performance of the user in the one or more assignments.
In some embodiments, the platform is further configured to present the rank of the user as an avatar, with different avatars being associated with different ranks.
In some embodiments, the one or more indicators include a plurality of indicators selected from the group including sender, subject, greeting, spelling, punctuation, and grammar, urgency and emotionality, links to external websites, and attachments.
In some embodiments, the platform is further configured to automatically adjust difficulty of subsequent assignments taken by the user based on performance of the user in prior assignments.
In some embodiments, the platform is further configured to automatically deliver prompts for performance of assignment-based phishing simulations to e-mail inboxes of users without a need for an administrator to perform email filtration bypass functions including any one or more of: i) direct injection ii) allow-listing, iii) X-Header usage, or iv) PowerShell scripting to deliver the prompts to the inboxes of the users.
In some embodiments, the platform is further configured to provide an indication to an administrator of which users in an organization have completed a phishing assignment or not.
In some embodiments, the platform leads to greater than 90% compliance of all end users having taken and passed the phishing exercise.
Various aspects of at least one example are discussed below with reference to the accompanying figures, which are not intended to be drawn to scale. The figures are included to provide an illustration and a further understanding of the various aspects and examples, and are incorporated in and constitute a part of this specification, but are not intended as a definition of the limits of any particular example. The drawings, together with the remainder of the specification, serve to explain principles and operations of the described and claimed aspects and examples. In the figures, each identical or nearly identical component that is illustrated in various figures is represented by a like numeral. For purposes of clarity, not every component may be labeled in every figure. In the figures:
Malware delivered through e-mail to user's personal or work e-mail accounts is an ever increasing problem. According to certain industry estimates, as of 2023, over 1% of all e-mails sent are malicious, with over 3.4 billion phishing e-mails sent every day. According to Verizon's Data Breach Report, Phishing attacks are involved in 36% of all data breaches. The FBI reports that 83% of all companies experienced phishing attacks in 2021. There can be no doubt that phishing is a scourge online today affecting each and every individual who operates an e-mail address and a computer. Individuals who do not understand how to identify an e-mail as potentially malicious may unknowingly or unintentionally allow a malicious actor to release a ransomware or phishing attack by, for example, clicking on a link in a malicious e-mail or by simply responding to the malicious e-mail. A ransomware attack could subject an individual or their company to a loss of access to valuable data unless a ransom is paid to the actor responsible for the ransomware attack, often with no guarantee that the malicious actor will restore access to the data if the ransom is paid. A phishing attack could allow for the malicious actor to access personal or other confidential data from a user's personal or business computer or network which may be used to perpetrate further fraud such as identity theft, impersonating an individual to apply for credit cards or tax refunds in their name, or to perform other fraudulent or malicious activities.
Information Technology (IT) departments at many, if not most, companies have adopted or are adopting training programs to try and educate employees regarding how to identify potentially malicious e-mails, so they do not inadvertently subject their company to a malware attack. These training programs, however, are often less successful than may be desired.
Some companies' malware education programs may utilize “attack-based phish testing” methods in which an individual from the IT department at the company sends a harmless test e-mail that includes one or more features characteristic of certain forms of social engineering-containing e-mails to employees and checking if employees respond to the e-mail, click on a link in the e-mail, or otherwise act in a manner that could expose the company to vulnerability if the e-mail were genuinely malicious. An employee who took an inappropriate action upon receiving the test e-mail could receive a reprimand or be assigned awareness videos to watch regarding how to spot and avoid phishing attacks or other training tasks. This may be perceived negatively by the employee, degrading their opinion of and relationship with the IT department, and reducing their willingness to comply with further requests to participate in educational programs regarding identifying malicious e-mail.
Attack-based phish testing methods may be less effective at teaching employees to avoid phishing attacks than desirable because they typically only measure what employees already know and fail to teach them new skills. These methods are often difficult and time-consuming to administer and by their nature make it difficult to gather accurate statistics on whether an employee opened an e-mail but did not click on a suspicious link or regarding what indicators of potential malware employees were unable to identify and that they should be further educated about. Further, in many instances, getting attack-phishing e-mails into peoples' inboxes is difficult, time-consuming, and often fails due to changes in the underlying heuristics Microsoft, Google and other e-mail providers use to identify and block such messages. For example, to get attack-phishing e-mails past spam filers and into peoples' inboxes, an IT administrator may have to perform email filtration bypass functions including any one or more of direct injection, allow-listing, X-Header usage, or PowerShell scripting. This leads many IT administrators to give up attempting to perform phish testing, leaving employees without the tools they need to practice the phishing knowledge they obtain through videos and assignment-based phishing simulations. Aspects and embodiments disclosed herein may not require an IT administrator to perform any of these email filtration bypass functions to get a phishing e-mail assignment to a user. The terms “IT administrator” or “administrator” or grammatical variations used herein are intended to refer to individuals in an IT department of an organization and/or a managed service provider (MSP) that may have responsibilities for managing aspects and embodiments of the systems and methods disclosed herein.
Studies have shown that attack-based phish testing methods may have unintended side effects that actually make employees more susceptible to phishing rather than less. (See Lain et al., Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.) Further, attack-based phish testing methods may subject a company to receipt of cease-and-desist letters from companies whose names or e-mail domains are spoofed in the test e-mails should an employee, believing the test e-mail to be genuine, reports the test e-mail to one of various online phishing reports websites.
Aspects and embodiments disclosed herein may address at least some of the problems inherent in conventional malicious e-mail detection education programs by replacing attack-based phish testing with “assignment-based” phish testing. As opposed to attack-based phish testing, assignment-based phish testing may teach an individual methods of identifying malicious e-mails that they do not already know rather than only testing what they do know. Aspects and embodiments of the methods disclosed herein may be interactive, may resemble open-book tests, and may provide substantially immediate feedback to a user after providing answers to a test on what to look for in a potentially suspect e-mail, which may be highly beneficial for learning. The term “substantially immediately” as used herein refers to providing an indication of results of an assignment-based phish test directly after a user submits their answers to the test. These results may be provided “substantially” immediately due to lags inherent in information transfer and processing to calculate, send, and display the results to the user.
Aspects and embodiments disclosed herein may reward employees for “passing” a test, which may improve the relationship between employees and their IT departments, rather than harming it.
The disclosed methods may involve tasking a user with examining multiple attack indicators in an e-mail (e.g., sender, subject, greeting, spelling, punctuation, and grammar, urgency and emotionality, links to external websites, and attachments) and may gather reliable statistics not only regarding what employees completed what tests and what employees “passed” what tests, but also what attack indicators employees may have the most difficulty recognizing.
Aspects and embodiments may provide assignments for employees to complete within a dedicated website so that the employees know that they are participating in an educational session and have no reason to report the simulated e-mails they are presented with to a phishing report website.
Aspects and embodiments of the assignment-based phish testing methods disclosed herein may be adaptive and modify the nature or difficulty of the tests within assignments undertaken by an employee based on how they have performed in previous tests and assignments. The methods may provide automated advancement to more difficult phish testing assignments for a user based upon high performance by the user on prior assignments and/or the number of phishing tests passed by the user. More “points” may be awarded to a user for fewer attempts undertaken prior to passing an assignment and for better passing score percentages in assignments. There may be, for example, three levels of phish testing complexity. At an easy level a user may be presented with an assignment including, for example, six attack examples, and one safe entry example, with a help wizard driven throughout the exercise. At a moderate difficulty level, a user may be presented with an assignment including four attack examples, and three safe entry examples, with the help wizard driven throughout the exercise. At a difficult level a user may be presented with an assignment including a random sampling of examples from a database, wherein the user is driven to choose safe/unsafe components of the e-mail on their own. Users who score enough points on the easy level advance to the moderate level, and upon scoring more points advance automatically to the difficult level. In some embodiments, a user may be automatically promoted from easy to moderate once they have completed a specified number of easy training assignments, for example, four easy training assignments. The user may be promoted from moderate to difficult based on having completed a specified number of moderately difficult phish training assignments, for example, four of the moderately difficult phish training assignments. In some embodiments, a system administrator may have the ability to reset a user's phishing assignment difficulty level under user settings. This is available so that an administrator who determines that an employee could use more trainings at a certain difficulty level can manually reset the difficulty level for the employee.
In some embodiments, each user/employee is presented with a random group of indicators of potential malware for the same test. Different users may take the same phish test at the same difficulty level, but have different content within the phishing identifiers (e.g., sender, subject, greeting, spelling, punctuation, and grammar, urgency and emotionality, links to external websites, and attachments) that is considered either safe or unsafe. If a user re-takes a phishing test because they failed a previous attempt, the content and safe vs. unsafe nature of the identifiers may be randomly shuffled so the test is different the next time around.
Aspects and embodiments of the assignment-based phish testing methods disclosed herein may be gamified by providing a user with an avatar whose appearance and “rank” changes based on their performance and that may be compared to the avatars of other users.
Aspects and embodiments of the assignment-based phish testing methods disclosed herein may automatically measure employee pass/fail attempts, create a cybersecurity point score from those attempts, combine that point score with a point score associated with video trainings completed, and then automatically escalate a user to a more difficult level of phish testing assignments after enough points are accumulated by the user.
In some embodiments, when users take phishing tests, their scores are impacted by two things: the actual score for completing the phishing test; and the number of attempts performed by the user to pass the phishing tests. Each time a user has to retake a phishing test, there may be a deduction to the user's point score, for example, a 5 point deduction. These points earned by a user may be calculated to give the user an overall score and rank. In some embodiments, the scores and ranks of all users/employees in an organization/company may be combined to give the organization/company an overall score and rank.
One example of portions of a phish test assignment is illustrated in
The simulated e-mail may load and the user may be presented with a popup window including a question regarding whether the sender indicator appears to be safe or legitimate, for example, whether the domain name of the sender's e-mail address appears legitimate. (See
The assignment next moves on to the next indicator in the e-mail, for example, the subject, and presents another popup window with “Yes” and “No” buttons and another “Help Me” link asking the user to indicate if the subject appears safe, e.g., consistent with a safe e-mail or one that is likely a social engineering phishing e-mail or other form of malware-containing e-mail. (See
The assignment next moves on to the next indicator in the e-mail, for example, the greeting, and presents another popup window with “Yes” and “No” buttons and another “Help Me” link asking the user to indicate if the greeting appears safe, e.g., consistent with a safe e-mail or one that is likely a phishing e-mail or other form of social engineering-containing e-mail. (See
The assignment next moves on to the next indicator in the e-mail, for example, the spelling, punctuation, and grammar of the message text, and presents another popup window with “Yes” and “No” buttons and another “Help Me” link asking the user to indicate if the spelling, punctuation, and grammar appears safe, e.g., consistent with a safe e-mail or one that is likely a phishing e-mail or other form of social engineering-containing e-mail. (See
The assignment next moves on to the next indicator in the e-mail, for example, the urgency or emotional charge of the message text, and presents another popup window with “Yes” and “No” buttons and another “Help Me” link asking the user to indicate if the urgency or emotional charge of the e-mail text appears safe, e.g., consistent with a safe e-mail or one that is likely a phishing e-mail or other form of social engineering-containing e-mail. (See
The assignment next moves on to the next indicator in the e-mail, for example, a web link included with the message text, and presents another popup window with “Yes” and “No” buttons and another “Help Me” link and asking the user to indicate if the web link appears safe, e.g., consistent with a safe e-mail or one that is likely a phishing e-mail or other form of social engineering-containing e-mail. (See
The assignment next moves on to the next indicator in the e-mail, for example, an attachment to the e-mail, and presents another popup window with “Yes” and “No” buttons and another “Help Me” link and asking the user if the attachment appears safe, e.g., consistent with a safe e-mail or one that is likely a phishing e-mail or other form of social engineering-containing e-mail. (See
After the user has answered the questions about each of the indicators, they may select a “Submit” button (See
The platform, disclosed herein, eliminates the buildup of negative emotions and resentment that ensues when IT departments trick end users into mistakes and subsequently punish them with more costly (time consuming) endeavors of having to watch additional phishing training videos, and exercises that may not yield the necessary results (knowledge to avoid similar mistakes in the future). Instead, the platform builds trust, positive relationships, and gratitude between users of the system and their IT providers through the avoidance of negative reinforcement activities, while providing a positive educational activity for end users.
The platform, disclosed herein, has been 100% automated for the delivery of assignment-based phishing simulations relieving the IT Administrator of manual configuration of IT filtration systems (commonly called spam filtering) to allow phishing training assignments through to user's inboxes. Aspects and embodiments of the platform disclosed herein may be 100% automated in the sense that the platform may randomly determine content to include with the indicators of potential malware in simulated e-mails, consistent with the difficulty level assigned to a user, and may send messages to users asking them to participate in a phishing e-mail test assignment at predetermined or random intervals without intervention by an IT administrator.
Aspects and embodiments of the platform disclosed herein also removes the hurdle of IT administrators having to customize and tailor phishing attacks to the IT infrastructure, systems, and applications in use at a company to ensure they are believable and authentic-seeming to the end user.
Aspects and embodiments of the platform disclosed herein approach this exercise not to test the mettle and knowledge of what users “already know” but instead to teach them what they “should know” but do not. This helps create a consistent baseline knowledge of how to spot and avoid indicators of a phishing attack that may be present within an e-mail.
An administrator of the system may access various dashboards to view metrics associated with the performance and compliance with the phish testing of users in an organization. As shown in
Various aspects and functions described herein in accordance with the present embodiments may be implemented as hardware or software on one or more computer systems. There are many examples of computer systems currently in use. These examples include, among others, network appliances, personal computers, workstations, mainframes, networked clients, servers, media servers, application servers, database servers, and web servers. Other examples of computer systems may include mobile computing devices, such as cellular phones and personal digital assistants, and network equipment, such as load balancers, routers and switches. Further, aspects in accordance with the present embodiments may be located on a single computer system or may be distributed among a plurality of computer systems connected to one or more communications networks.
For example, various aspects and functions may be distributed among one or more computer systems configured to provide a service to one or more client computers, or to perform an overall task as part of a distributed system. Additionally, aspects may be performed on a client-server or multi-tier system that includes components distributed among one or more server systems that perform various functions. Thus, the embodiments are not limited to executing on any particular system or group of systems. Further, aspects may be implemented in software, hardware or firmware, or any combination thereof. Thus, aspects in accordance with the present embodiments may be implemented within methods, acts, systems, system elements and components using a variety of hardware and software configurations, and the embodiments are not limited to any particular distributed architecture, network, or communication protocol.
Aspects and embodiments of the platform disclosed herein may be implemented as a Software-as-a-Service (SaaS) platform leveraging the power of Amazon's Web Services architecture. An illustration of an example of such a platform is illustrated in
Various aspects and functions in accordance with the present embodiments may be implemented as specialized hardware or software executing in one or more computer systems including computer system 102 shown in
Memory 112 may be used for storing programs and data during operation of computer system 102. Thus, memory 112 may be a relatively high performance, volatile, random-access memory such as a dynamic random-access memory (DRAM) or static memory (SRAM). However, memory 112 may include any device for storing data, such as a disk drive or other non-volatile, non-transitory, storage device. Various embodiments in accordance with the present invention may organize memory 112 into particularized and, in some cases, unique structures to perform the aspects and functions disclosed herein.
Components of computer system 102 may be coupled by an interconnection element such as bus 114. Bus 114 may include one or more physical busses, for example, busses between components that are integrated within a same machine, but may include any communication coupling between system elements including specialized or standard computing bus technologies such as IDE, SCSI, PCI, and InfiniBand. Thus, bus 114 enables communications, for example, data and instructions, to be exchanged between system components of computer system 102.
Computer system 102 also includes one or more interface devices 116 such as input devices, output devices, and combination input/output devices. Interface devices may receive input or provide output. More particularly, output devices may render information for external presentation. The interface devices 116 may include, for example, one or more graphical user interfaces that may be disposed proximate to or separate from other components of the computer system 102. A graphical user interface of the computer system 102 may, for example, be displayed through a web browser that accesses information from the memory 112. Input devices may accept information from external sources. Examples of interface devices include keyboards, mouse devices, trackballs, microphones, touch screens, printing devices, display screens, speakers, network interface cards, etc. Interface devices allow computer system 102 to exchange information and communicate with external entities, such as users and other systems.
Storage system 118 may include a computer readable and writeable, nonvolatile, non-transitory, storage medium in which instructions are stored that define a program to be executed by the processor. The program to be executed by the processor may cause the processor 100 or computer system 102 to perform any one or more embodiments of the methods disclosed herein. Storage system 118 also may include information that is recorded, on or in, the medium, and this information may be processed by the program. More specifically, the information may be stored in one or more data structures specifically configured to conserve storage space or increase data exchange performance. The instructions may be persistently stored as encoded signals, and the instructions may cause a processor to perform any of the functions described herein. The medium may, for example, be optical disk, magnetic disk, or flash memory, among others. In operation, the processor or some other controller may cause data to be read from the nonvolatile recording medium into another memory, such as memory 112, that allows for faster access to the information by the processor than does the storage medium included in storage system 118. The memory may be located in storage system 118 or in memory 112, however, processor 110 may manipulate the data within the memory 112, and then may copy the data to the medium associated with storage system 118 after processing is completed. A variety of components may manage data movement between the medium and integrated circuit memory element and the presently described embodiments are not limited thereto. Further, the embodiments are not limited to a particular memory system or data storage system. Portions of the memory 112 or storage system 118 may be included in the same computer system as other components of the computer system 102 or may be resident in a cloud-based system that is accessible via the internet or other communications system or protocol.
Although computer system 102 is shown by way of example as one type of computer system upon which various aspects and functions in accordance with the present embodiments may be practiced, any aspects of the presently disclosed embodiments are not limited to being implemented on the computer system as shown in
Computer system 102 may be a computer system including an operating system that manages at least a portion of the hardware elements included in computer system 102. Usually, a processor or controller, such as processor 110, executes an operating system which may be, for example, a Windows-based operating system such as Windows 11 or Windows 10 operating systems, available from the Microsoft Corporation, a MAC OS System X operating system available from Apple Computer, one of many Linux-based operating system distributions, for example, the Enterprise Linux operating system available from Red Hat Inc., a Solaris operating system available from Sun Microsystems, or a UNIX operating system available from various sources. Many other operating systems may be used, and embodiments are not limited to any particular implementation.
The processor and operating system together define a computer platform for which application programs in high-level programming languages may be written. These component applications may be executable, intermediate, for example, C-, bytecode or interpreted code which communicates over a communication network, for example, the Internet, using a communication protocol, for example, TCP/IP. Similarly, aspects in accord with the presently disclosed embodiments may be implemented using an object-oriented programming language, such as .Net, SmallTalk, Java, C++, Ada, or C# (C-Sharp). Other object-oriented programming languages may also be used. Alternatively, functional, scripting, or logical programming languages may be used.
Additionally, various aspects and functions in accordance with the presently disclosed embodiments may be implemented in a non-programmed environment, for example, documents created in HTML, XML, or other format that, when viewed in a window of a browser program, render aspects of a graphical-user interface or perform other functions. Further, various embodiments in accord with the present invention may be implemented as programmed or non-programmed elements, or any combination thereof. For example, a web page may be implemented using HTML while a data object called from within the web page may be written in C++. Thus, the presently disclosed embodiments are not limited to a specific programming language and any suitable programming language could also be used.
Having thus described several aspects of at least one embodiment, it is to be appreciated various alterations, modifications, and improvements will readily occur to those skilled in the art. Such alterations, modifications, and improvements are intended to be part of, and within the spirit and scope of, this disclosure. Accordingly, the foregoing description and drawings are by way of example only.
This application claims priority under 35 U.S.C. § 119(e) to U.S. Provisional Patent Application Ser. No. 63/603,887 titled “POSITIVE REINFORCEMENT PHISHING IDENTIFICATION SIMULATIONS,” filed Nov. 29, 2023, the entire content of which is incorporated herein by reference for all purposes.
| Number | Date | Country | |
|---|---|---|---|
| 63603887 | Nov 2023 | US |