visit
Understanding the Attack Pattern
Hackers employ a relatively consistent attack pattern to target enterprise data. First, they gain access to company email lists. Then, they make realistic but fabricated accounts in order to send around shared links that are rife with malware. There are two aspects to this general plan which tilt the scale in favor of the hackers. The first is that the email containing malware is from a sender that is familiar, so employees are more likely to open an attachment without stopping to question its contents. The second factor that makes this attack pattern dangerous is that the malware comes in the form of a shared link that goes to an uploaded PDF file. While many users are trained to be vigilant about scanning attachments for viruses, the simplicity of an embedded link to a seemingly innocuous shared file gives employees a false sense of security. Oftentimes, these file links are branded to look official and mimic sign-in dialog or other pages. For example, a hacker may forge a page where you input your . Once they access these, then Pandora’s box is opened - they can access email, OneDrive, SharePoint, etc.Lastly, since the sender is typically unaware that malware has been sent out under their name, they are unable to warn their colleagues. As individuals click on the link, they further perpetuate the attack and the cycle continues.
Establishing Prevention Measures
Devising Big-Picture Industry Solutions
While internal prevention measures may help companies guard their data on a small scale, it’s important that the industry simultaneously thinks about big-picture solutions to prevent the type of disastrous breaches that can turn companies upside-down. One route to consider is to increase validation efforts for new users signing up for file sharing platforms. By vigorously validating new users’ information through processes such as two-factor authentication or even through manual means such as calling new users to verify their information, this would help weed out potential attackers. Another possibility is in expanding hybrid cloud options that allow companies to take advantage of public file sharing systems for less sensitive data but would enable them to keep any sensitive data on a private cloud where data is stored in-house.Improving trust and understanding
While some of the fears surrounding EFSS-related risks are genuine, others are based on a lack of understanding about the way file-sharing works. For example, believe that some party other than the company doing the storing has access to private data on the cloud. Through a combination of preparing companies for the potential risks as well as educating them about the best ways to utilize the built-in protections available through EFSS solutions, decision-makers will finally be able to achieve the elusive and ideal balance of convenience and security.