Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Dodging the Spear Phisher

Your Human Resources department sends you an e-mail asking for your home address -- again. And, oh, by the way, please verify your user name and password, too. "Gee," you think, "can't they keep their records straight?" You hastily type a reply and send it off.

What you don't know is that wasn't your trusted HR rep seeking your personal information. It was a hacker spear phishing -- employing a sophisticated cybercrime in an attempt to gain access to your organization's computer network and privileged information.

Simple phishing usually casts a wide net to steal identities by sending out a mass e-mail that claims to be from, say, eBay, PayPal, a bank or credit card company. Spear phishing, on the other hand, is much more targeted and much more personal. These e-mails are designed with you in mind, providing information that tricks you into believing that a legitimate source sent them. It could seem to be your trusted colleague, a manager from another business unit or agency office, or your boss.

The spear phisher uses information you provide to gain access to your account on a government system, then uses that access to hack into the entire network. The hacker not only can access files that you have access to, but can engage in widescale financial fraud, or steal military information, secret contract details or other proprietary data. The entry point might be an employee response to a bogus, but familiar-looking, e-mail that asks for key passcodes. Or the e-mail could ask the recipient to click on a link that downloads spyware that will allow the cyberthief an open door into the network.

Spear phishing is now one of the biggest vulnerabilities confronting information security executives in government and the private sector. The National Institute of Standards and Technology doesn't know (or won't tell) how many spear phishing attacks the federal government has suffered. But the chance that a spear phisher will target a federal worker and break into an agency network is likely increasing. Businesses had more than 55,000 phishing incidents in April alone, according to the Anti-Phishing Working Group in Cambridge, Mass. Financial services is the most targeted sector, as phishers look for ways to steal money from online accounts.

Spam filters, patches and firewalls are not very effective in stopping spear phishers. E-mail addresses are readily available. For example, the names and e-mail addresses of employees attending training conferences typically are listed on a conference's Web site or in printed conference materials. And providing aliases, such as a generic, and then routing queries to the appropriate person inside the agency doesn't necessarily ward off phishers. Instead, aliases create another entry into the system.

The most effective defense is education, security experts say. Federal agencies must train computer users to spot fraudulent e-mails and resist replying to them. Educating includes "inoculation," or intentionally setting a spear phishing trap by sending out a false e-mail to a group of employees to see who takes the bait, according to Alan Paller, director of research at the SANS Institute of Bethesda, Md., which manages the Internet Storm Center and tracks cyberthreats.

IT managers contact employees who replied or opened an attachment and teach them what to look for in a fake e-mail. Mistakes sometimes are the best teachers, Paller says. He estimates that spear phishing attacks on government number only in the low hundreds, but says the threat should not be taken lightly. It takes only one successful attempt to create a lot of damage.

The most vigilant agencies, the minority, conduct penetration testing annually, but that's not enough to keep employees attentive. Security experts advise piggybacking spear phishing tests on regularly scheduled security tests, teaching workers each time what to avoid. It's important to conduct multiple tests to find the employees who reply to the fake e-mails.

Frequent testing is the inoculation strategy of information security managers at the U.S. Agency for International Development. When USAID employees log on each morning, a question appears on the monitor. The security questions are taken from a database of nearly 300 queries, such as "How frequently should you change your password?" and "Do you lock your PC if you leave your desk?" They test whether an employee can spot a spear phishing attack.

The answers are recorded, and the names of employees who answered incorrectly are sent to their managers. Then managers follow up to provide one-on-one instruction about security threats. The daily online lesson is now part of the Office of Management and Budget's information security line of business, and other federal agencies can use it.

OMB required agencies to buy more secure applications starting July 1, making it more difficult to infect a system with malicious software if a person opens a bogus e-mail attachment. The requirement was part of OMB's June 1 memo requiring agencies to adopt standard security configurations for new computers by Feb. 1, 2008.

Core Security Technologies, a Cambridge, Mass.-based security firm, offers an e-mail program to teach workers how to avoid spear phishing. The program can be part of any defensive plan and requires workers to be tested repeatedly with fake attacks. Paul Paget, chief executive officer at Core Security, says about 15 percent of tested workers fail. The software costs $22,500 and resides on a supervisor's desktop.

Security experts suggest enforcing the following rules throughout an agency:

  • Report suspicious e-mail on a regular basis. Tell employees to call the information security office about suspicious e-mail and train them not to forward bogus e-mails.
  • Do not provide personal information, such as a password, a credit card number or any data that can be used to unlock an application or network, in reply to an e-mail.
  • Do not open any suspicious attachment.
  • When a spear phishing attack is successful, assess the damage and recover. Eradicating the malicious software is not easy. You must backtrack to a clean starting point on your system before it was corrupted.
Better security technology and programs to inoculate employees aren't foolproof, warns David Jevans, chairman of the Anti-Phishing Working Group. "There is no 100 percent way to prevent spear phishing," he says. But agencies can cut down on the chances that attacks will be successful. Train and retrain. Keep the rules for protecting systems and detecting an attack in front of employees as much as possible. That way, the next time it appears an officemate or boss has e-mailed a link to a great photo of Paris Hilton in jail, no one will be tempted to open it.

Judi Hasson is a Washington-based freelance journalist covering government information technology.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.


When you download a report, your information may be shared with the underwriters of that document.