Q1. How has the employment scam landscape evolved in recent years? What do security teams and users need to know about the threat and staying safe from it?
Employment scams have become more targeted, elaborate, and harder to detect, posing substantial threats to both job seekers and organizations. One notable shift is the increased sophistication in social engineering techniques. Cybercriminals exploit publicly available information from social media profiles and professional networking sites to craft personalized messages, making their job offers seem authentic and convincing. These scams may involve enticing job opportunities, remote work positions, or freelance gigs, luring users into sharing even more personal information or falling for fraudulent payment schemes.
This has also spilled over into the world of phishing. Instead of relying on generic emails, scammers craft messages that convincingly imitate legitimate job portals or known organizations, tricking victims into revealing sensitive data, such as login credentials or financial details. Additionally, fake job advertisements on popular online platforms have become prevalent, leading users to malicious websites or prompting them to download malware-infected files.
And these aren’t smalltime hackers hoping to capitalize on human vulnerabilities around employment. For example, UNC2970, a North Korean organization, actively employs job recruitment scams to pursue both espionage and hacking-for-profit, serving the state's financial interests. These scams involve using backdoors as phishing hooks, enabling various malicious post-exploitation activities.
Security teams must emphasize the importance of user education and awareness to combat these threats effectively. Regularly conducting training sessions on recognizing employment scams, understanding phishing indicators, and best practices for verifying job opportunities can empower users to stay vigilant.
Job seekers should verify the legitimacy of the companies offering job opportunities, especially if contacted through unsolicited emails or messages. They should independently search for the company's website, contact information, and social media profiles to confirm its authenticity. Refraining from sharing sensitive, avoiding downloading files from suspicious sources, and exercising extreme skepticism can significantly reduce the risk of falling victim to these scams.
Q2. What were the biggest takeaways from KnowBe4's Annual Phishing Benchmarking Report? Was there anything in the data that was surprising or unexpected in any way?
One of the things I’m struck by each year is the sheer amount of data we are able to include in this report. The data set for this year’s study included over 32.1 million simulated phishing tests sent to 12.5 million users across 35,6000 organizations from seven regions: Africa, Asia, Australia/New Zealand, Europe, North America, South America, and the United Kingdom/Ireland.
In 2023, the overall Phish-prone percentage (PPP) baseline average for all industries was 33.2%, indicating a significant risk of employees falling for phishing before training. However, after participating in a monthly combination of simulated phishing and training, only 18.5% failed within 90 days, and after a year, the failure rate dropped to 5.4%. That’s an 82% improvement of susceptibility to phishing in just a year.
Keep in mind that these high-level numbers are averages. In the report, we provide a ton of detail broken-down across 19 industries. And, if you’re looking for something to be shocked about, some of the initial baseline percentages for organizations that haven’t yet conducted any simulated phishing activities can certainly be a shock. For example, prior to training, organizations with 1,000 employees or more within the insurance industry demonstrated a 53.2% PPP. But, again, in a show of the efficacy of intentional and consistent training, that PPP was brought down to 5.7% at the one-year mark. Another truly dramatic turnaround was Energy & Utilities organizations over 1,000 employees – their journey took them from a 51.1% baseline PPP to a PPP of only 4.5% at the one-year mark.
These susceptibility and resilience improvements are hugely interesting each year because they are shockingly consistent. The data is clear that a commitment to ongoing simulated social engineering testing pays off in these drastic reductions in susceptibility.
Q3. How does KnowBe4 plan to highlight the latest developments in phishing and ransomware education at Black Hat USA 2023?
We’ll have a ton of great swag, engaging talks about security awareness best practices, and I’ll also be delivering a talk and doing a signing for my latest book, The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing your Human Defense Layer. And, of course, even more than all of that, we’re excited to let attendees see our latest product developments firsthand.
We’re particularly excited about our newest product: PhishER Plus. With it, we’ve created the most powerful anti-phishing protection available in the world. PhishER Plus is powered by a new, unique KnowBe4 global threat feed. This is a triple-validated phishing threat feed crowdsourced from 10+ million trained users are leveraged to automatically block matching new incoming messages from reaching your users’ inboxes. This continually updated threat feed is managed by KnowBe4 and syncs with your Microsoft 365 mail server.
Using this threat feed, PhishER Plus automatically blocks phishing attacks before they make it into your users’ inboxes using:
- KnowBe4's global network of 10+ million highly trained KnowBe4 end-users and their PhishER Administrators
- PhishML, a unique AI-model trained on phishing emails that all other filters missed
- Human-curated threat intel by KnowBe4’s Threat Research Lab
We see things no one else can because users report the attacks that make it through every other filter out there. These in-the-wild threats are the most dangerous, real-time social engineering attacks at any given point in time. And now we’re giving our customers a way to use the power of KnowBe4’s unique view into what’s making it past filters so that they can proactively update their blocklists as well as acting on messages that match an identified phishing threat other PhishER customers have "ripped" from their organization's mailboxes are then validated by the KnowBe4 Threat Research Lab. These messages are automatically quarantined by removing them from all of your users’ inboxes.