Time
55 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Welcome back to end user email. Security Course. My name is Melanie Judge, and in previous video, you have been able to learn about wise email security so important in the eyes. Is it becoming more and more topic off interest for people doing security?
00:19
Now, in this video, we're going to talk about,
00:24
uh, how is email used for cyber attacks?
00:28
What kind of different types of female based attacks are there?
00:33
And also, how can your PC be infected using email? Not, I mean, when you are using email,
00:42
how can your PC be infected?
00:46
So
00:47
if you look at what's happening today in the world of cyber attacks, fishing, ease the number one method for intrusion using email, and probably one of the most common ways that cyber criminals today are, uh,
01:03
getting access to systems, which they're not authorized to access.
01:10
So what is fishing? Just explain. Its simple
01:14
fishing is, ah, email technique in which you receive an email which might look, uh, that is coming from somebody you know. Or it may look
01:26
the that he doesn't have to look like that. So it might be coming from somebody you don't know.
01:32
But the text of the email and the subject of the email is interesting enough so that you click on it. You open your email. This email may have some attachments in it, or this email may have some,
01:49
uh, links in it. And if you click on them,
01:52
or if you just open the email, your PC can get infected.
01:57
Now. I'm not saying that some anti virus solutions or Melber solutions cannot stop some of these intrusions. Probably they can, especially if it's some kind off, Web based
02:09
attack. So if you have to click on the link,
02:13
but if this is ah well conceived type of attack,
02:20
it can penetrate your
02:23
PC Security.
02:25
Why is it called fishing? Because, of course, in hacking World F is replaced by pH, so it's spelled differently. But the idea behind fishing is that you send that email to substantial number of addresses,
02:43
and you simply wait for somebody to catch it similar to fishing with nets. So you're thrown out in the water and whatever you can't sheets, it's a good catch. So
02:54
you are not targeting somebody special
03:00
wise and fishing. Still working because, as I mentioned in previous lesson is because and users do not take I t securities is security seriously?
03:12
So, according to some researchers, 12% of users click on phishing email, so they receive an email that is obviously not meant for them. That is obviously not something not wrong with it. But 12% of users still click on it,
03:29
and 4%. So 1/3 of those who click on phishing email
03:34
actually click a link I have heard
03:37
about from a friend of mine about one administrator who actually clicked on a link and even left his administrate, their password and user name on dealing that open. So it was basically Ling that was gathering your credentials.
03:53
So these things happen. Still, today, people simply don't think or they don't care.
04:00
And this is the biggest problem.
04:04
Now, when you receive such an email,
04:06
my work can be an attachment. So if you receive something that looks like it's coming from somebody you know, and there is a like it's business, so they're sending something to like some photos or world file or Excel file or something that is executable whatever.
04:25
If you don't care, you might open that attachment or run it
04:30
and then it's too late. Then you have infected your PC,
04:35
but also Mallorcan be in the body and of any mail. It can be a link like I said before, or it can be just in the HTML code dividend about the email
04:49
and to add to fishing. There is something called spear phishing, which is basically when you target the attack to a certain individual or people working in a certain company.
05:03
And then you try mawr to make look that the these emails are
05:11
genuine, more genuine than
05:15
then the simple fishing, which in which you send the generic email and you expect something to happen So it can be, for example, mail, which in subject has something like
05:29
It's not
05:30
theorize on it. Let's just see how it can look.
05:34
So there is a knee mail in my hook, and I'm using Outlook as my email client.
05:42
And okay, this this email I sent to myself.
05:46
But can you imagine? It's somebody working with me and they receive email like this, and in this email, I'm saying, Hi, Mylan. Through his new mileage tracking report template you should use for my long, blah, blah, blah, blah blah
06:00
so
06:01
it can have all this mail off course is not infected with virus. I wouldn't infect myself with the wires, but
06:11
just gives you an example. So you can double click on this file and open
06:16
infected Excel file.
06:18
Or you can click a link
06:23
here
06:24
and, uh,
06:27
just open the website, which would also contain this file if my contained this file, but
06:32
just opening the page will infect your PC
06:36
or and this is very important. People don't usually understand this. The body often email can be infected. How? Because if you look here
06:47
in outlook, we can see the actual look of this message.
06:54
And when you look at this, you see that this message is actually an HTML file. So html file is basically a list of commands which are then interpreted by your email client in this case, outlook.
07:08
And then, ah, make sure that your message is displayed like it's supposed to be a so in the way it's written.
07:16
And the thesis html file doesn't have malicious code, but because this is this is basically ah, code.
07:27
It can contain some malicious code which won't be visible on Europe
07:32
in your message here in Outlook, but we'll execute some commands, maybe open the back door or upload some some content from some some website, which will then in fact, your PC. So
07:47
even opening phishing emails can be enough for you to infect your PC. Now, there are methods of protection
07:57
against these things, but they're never 100% foolproof.
08:03
So,
08:03
uh, this is about how your PC can be infected using email.
08:13
And now let's talk a little bit more about how do attachments, in fact, your PC.
08:20
So, um,
08:24
when you when you type of word file, this is not a text file. You know that you can in, for example, makers of word save your file as a text file,
08:33
and then it contains just pure text. And that kind of file definitely cannot, in fact, your PC,
08:43
however, word Excel files. Basically, all office files
08:50
are in XML format,
08:52
and if you're using some other type off office suit,
08:58
it can also contain files in some other former. But it is still
09:03
something that has a meta data and basically a code that is viewed on your screen by that software in a certain way.
09:13
So you can embed some malicious cold inside that file,
09:20
and then it gets executed, and then it, in fact, see a PC.
09:26
Pdf files as well. They can have system commands that launch Melber,
09:33
and for they can have some hidden objects that are not visible on the screen when you open a pdf file.
09:43
But these objects can buy fast fires detection there. This is very important there. Launched, been file is open. So even if you double click and see that something is wrong with the file, it can be too late.
09:58
And then with PdF file, which is one of the most common ways for people to send
10:03
oh,
10:05
usual data
10:07
to each other.
10:09
You can infect your BC
10:11
also, you can these guys malware unifies like J Peg
10:16
Um, even the militias cold in them. So basically
10:24
thistles the way that you can essentially infect your PC just by opening some of these attachments in your email. Or if you're on ah website and you download these files and open them
10:41
also, you get infected so these things are basically
10:46
very, very dangerous, and this is the reason why
10:52
I recommend everybody
10:54
to look at these files the Tokyo team emails and to see if they're coming from somebody
11:03
that is not known on. And if they look suspicious, just don't open them.
11:09
It's simple. Is that so? If you have, for example,
11:15
if you work for some kind of cooperation, you probably have some kind of people working for your company that they're there to do deal and do something about phishing emails. So if you see an email that is, ah, looking suspicious, don't open it,
11:33
Um,
11:35
just, uh,
11:37
forwarded to or follow the procedure that is established
11:43
by that the people who are there to prevent fishing. Now, how do you see that? Let's go back to look
11:52
and look at this. So this is the basic
11:58
look out outlook layouts that most of people I know you, some of them
12:03
they're using the reading pain as well. So
12:07
when you click on email, it just opens the preview off the tee mail.
12:13
Ah,
12:15
in general drool is that when you are using the reading pain, you shouldn't be infected. But if
12:22
viruses in the body of une male, you might so reading pain is not recommended,
12:30
and the other thing that you
12:33
should do, so we'll turn it off.
12:37
You have this message preview here, and this is very important. Why?
12:43
Because if we turn it on like it did now, when you look at this male,
12:48
you see that from is actually my email address.
12:52
Now, what you have seen before, just my name and somebody might generate for them Pull a Gmail address with this,
13:01
uh, which look similar.
13:05
And then make sure that in
13:07
ah, name of the sender is my name.
13:11
So if they know somebody who is working for my company,
13:16
they can
13:18
generate
13:20
just bogus email
13:22
and, um, send it to me.
13:26
And if I'm in communication with that personal the time, it will look like that person sent me an email or if I'm in the regular communication when somebody outside my company But that person is, for example, working for a parking company.
13:41
It is a customer or vendor or supplier, whatever.
13:46
And I'm getting emails from them on a regular basis. Name
13:50
my generate the email that looks like this. So if you're turning on the message preview before opening every email, you should just look it from and check if this is okay.
14:07
And even if you have opened an email and you see something like this,
14:11
don't click on.
14:13
Don't open the attachment or don't click on the link if you're not 100% absolutely sure that this email is genuine. So these things are simply things that one should look at all times.
14:33
So, um,
14:35
at the end of this Ah,
14:37
a lesson. Let's just do the short recap.
14:41
So in this video I talked about how is email used for cyber decks?
14:46
And you have seen that it is used to penetrate your security by making you believe that your opening mail that is coming from a genuine person instead of cyber criminal,
15:01
that all of the email based attacks are basically
15:05
around fishing. So you receive an email and this email looks like it's OK. So you open it or you open the attachment or you click on the link,
15:18
and this is the way that your PC can be infected
15:22
using email.
15:24
So if you're using email client Lee Outlook, you have seen how you can protect yourself at least partially but not 100%. And the type of this protection is based on the fact
15:39
that you will have, ah, more insight in an email you're receiving and see if it's coming from a genuine person or it looks like it's something
15:50
that is actually a type of cyberattack, so this is the end of this lesson.

Up Next

End User Email Security

This course will give you the basic ideas on the importance of end user email security, how an email is used to breach security, who is responsible for maintaining email security to the adequate level and the things you need to do to reach that goal.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor