Date post: | 23-Mar-2016 |
Category: |
Documents |
Upload: | connecus-communications |
View: | 212 times |
Download: | 0 times |
2
Table Of ContentsIntroduction......................................................................................................................................................................................................... 3How.To.Protect.Yourself......................................................................................................................................................................................... 4What.To.Do.If.You.Get.Hacked............................................................................................................................................................................... 5The.Hacker’s.Life.................................................................................................................................................................................................. 6Email.Is.Gold....................................................................................................................................................................................................... 7How.An.Attack.Works............................................................................................................................................................................................ 8
3
Introduction To Email Security
We’re.a.paranoid.bunch.at.Mailchimp..We.proudly.wear.tinfoil.hats,.we.have.secret.hideout.rooms.with.steel.walls,.and.we.have.fireman.poles.and.slides.throughout.the.building.for.quick.evacuation..We.also.have.at.least.24.rottweilers.with.freakin’.lasers.on.their.heads..We’d.go.into.more.detail,.but.let’s.just.say.that.security.is.a.serious.matter.at.Mailchimp..We.take.it.so.seriously.because.our.customers.shouldn’t.have.to.worry.about.their.data..We.spend.a.lot.of.time.talking.about.bad.guys.and.acting.like.bad.guys,.to.figure.out.how.they.think..Our.team.invests.a.lot.of.time.and.money.into.writing.code.to.protect.ourselves.and.our.customers,.and.we.have.lots.of.software.and.hardware.to.protect.our.infrastructure..Our.security.methods.are.there.to.help.keep.you.safe—but.when.it.comes.to.protecting.yourself.and.your.subscribers,.you.have.some.responsibilities.of.your.own..In.this.guide.we’ll.cover.how.you.can.protect.yourself,.what.to.do.if.your.data.has.been.compromised,.some.basics.on.why.an.attacker.might.target.you,.and.why.email.data.is.important.in.the.first.place..We.hope.this.guide.scares.you.into.taking.some.precautionary.measures.to.ensure.your.data.is.safe.
According.to.the.Ponemon Institute,.the.value.of.a.customer.record.is.$204.in.the.US..For.some.people.the.value.is.much.higher,.and.for.oth-ers.it’s.much.lower..Some.people.use.the.simple.“dollars.earned.divided.by.list.size.equals.dollar-per-email.value”.calculation..(So.if.you.made.$120,000.off.your.campaigns.and.had.5,000.subscribers,.then.each.subscriber.is.worth.$24.).Though.some.are.worth.more.than.others,.that.calculation.shows.you.how.valuable.email.addresses.are..And.even.if.you’re.not.earning.money.off.your.subscribers,.there’s.great.responsibil-ity.in.protecting.the.email.addresses.they.provide..Hackers.want.those.addresses.because.they.know.how.to.extract.and.extort.money.from.unsuspecting.people,.tarnish.your.brand.and.cause.some.serious.financial.hassles.for.you..If.you.and.your.service.providers.aren’t.taking.the.proper.precautions.to.protect.your.customers.data,.then.you’re.doing.a.grave.dis-service.to.your.business.and.subscribers.
*ATTENTION: EXTREMELY IMPORTANT OBLIGATORY LEGAL DISCLAIMER
This guide is intended to serve as a resource on the topic of email security. It is not intended to be
professional advice, nor is it a complete compendium of the information available in this area. The
Rocket Science Group, LLC d/b/a MailChimp expressly disclaims any and all warranties about the
information contained within. In sum, while we think this is an awesome guide on the topic, use of
the information contained within the guide is entirely, completely, definitively, absolutely, positively,
100% at your own risk. If you have questions or need specific advice for your situation, please
contact a knowledgeable professional.
by Brandon, deliverability engineer
4
How To Protect Yourself
You.can.never.be.too.cautious.when.it.comes.to.protecting.yourself,.your.business.and.your.valuable.data..Here.are.some.tinfoil-hat.tips.
1..Keep ALL of your systems completely up to date..Not.just.your.operat-ing.systems,.but.your.browser,.Adobe.Reader,.Java,.flash,.etc..These.ancil-lary.applications.are.generally.the.most.problematic.and.easiest.to.hack.Keep.your.anti-virus.programs.up.to.date,.and.if.possible,.use.anti-virus.software.that.has.a.firewall—or.at.the.very.least.malware—protection..Try.something.like.Comodo.
2. Run anti-virus and malware scans daily. As.in,.every.single.day.
3..Secure your networks and wifi..Do.NOT.allow.employees.to.use.their.home.computers,.guest.computers,.smartphones.or.iPads.on.your.network..Secure.your.wifi.using.WPA2.or.stronger..If.you.have.mobile.workstations.inside.or.outside.your.networks,.never.use.insecure.wifi,.like.your.local.coffee.shop’s.connection..If.you.must.use.this.type.of.connection,.keep.your.usage.to.an.absolute.minimum...Read.up.on.Firesheep.to.learn.how.much.information.gets.transmitted.on.an.open.wifi.connection.
4. Secure your smartphone with a password or security lock..If.it’s.stolen,.call.your.provider.immediately.and.disconnect.your.phone..Passwords.are.extremely.important.when.it.comes.to.security..Use.different.passwords.for.every.site.you.do.business.with...Do.NOT.use.the.same.password.twice.(see:.Twitter Spam Attack Tied to Gawker Security Breach)..Each.site.should.have.a.unique.password..Consider.using.1Password,.KeePass.or.a.similar.utility.to.help.keep.track.of.all.your.passwords..Keep.in.mind.that.if.someone.steals.your.computer.or.gains.access,.they.can.steal.your.pass-word.database..So.make.sure.your.master.password.is.unique.and.difficult.to.guess..Use.at.least.10-digit.passwords.with.numbers,.letters,.symbols.as.well.as.different.cases..If.you.use.the.same.password.everywhere,.it’s.extremely.easy.for.an.attacker.to.try.your.username.and.password.at.each.and.every.site.they’re.after.
5..Use a single machine for financial transactions..It.shouldn’t.be.used.for.anything.other.than.banking,.and.should.only.be.connected.via.a.wired.connection..Don’t.keep.this.computer.powered.up.unless.it’s.being.used.
6..Be careful what information you share publicly. If.you’re.interviewed.for.something.that.will.be.published.online,.make.sure.you.don’t.mention.software.vendors.or.business.vendors.you.use,.unless.you.can.be.100%.sure.that.your.software.and.business.vendors.will.not.be.hacked.
7..Never open email, IMs and social-media notifications from people you don’t know, haven’t heard from in a long time, or look suspicious. This.type.of.communication.is.often.malicious,.so.skip.it.to.be.safe..If.you’re.unsure,.don’t.reply.to.the.communication,.and.call.the.person.for.confir-mation..Assume.everyone.is.compromised.
5
What To Do If You Get Hacked
Hopefully.you’re.protecting.your.data.like.a.champ.and.nobody’s.after.you..But.if.you.do.get.hacked,.here’s.how.to.handle.it.
1..If it’s a virus or malware on a machine, disconnect ALL machines from your network immediately..At.this.point.it’s.best.to.involve.a.local.IT.company.or.consultant.who’s.trained.in.removing.malware..Don’t.turn.on.any.systems.until.the.threat.has.been.completely.removed..If.you.must.get.to.a.system,.make.sure.it’s.not.on.the.internet,.and.assume.that.anything.and.everything.on.that.system.is.infected.
2..Change all passwords, and security questions and answers that may have been affected..Make.sure.you.do.it.from.a.secure.machine—if.you.change.passwords.on.an.infected.machine,.you’re.giving.the.attacker.all.the.info.they.were.after.on.a.silver.platter..Use.a.secured.network.that.you.trust..If.your.systems.were.hacked,.don’t.trust.your.network.until.all.machines.have.been.given.the.all.clear.
3..Contact your service providers and software providers, and ask them to do a scan for potential data breaches on your account..Also.ask.them.to.lock.your.account.from.further.access.if.you.feel.the.account.is.what.the.attacker.was.after,.or.if.the.account.is.important.enough.to.lock.down.
4..Check your email. Ensure.that.there’s.nothing.in.your.deleted.items.that.relates.to.communication.with.your.service.and.software.providers.
5..Notify your friends, clients and business vendors that you were com-promised..Let.them.know.that.they.shouldn’t.trust.further.communication.from.you.until.otherwise.noted.
6
The Hacker’s Life
Discussions.about.hackers.usually.end.with,.”Why.don’t.they.just.get.a.job?”.The.truth.is,.hacking.is.their.job,.and.they.often.make.good.money.(or.enjoy.what.they.do)..The.laws.in.many.countries.are.lax.enough.that.cybercrime.isn’t.considered.serious,.or.there’s.just.so.much.other.bad.stuff.going.on,.it.doesn’t.bubble.up..Many.countries.even.overlook.this.be-havior.because.the.criminals.pay.off.and.support.government.officials..The.book.Fatal System Error by.Joseph.Menn.goes.into.more.detail.about.that..Whether.someone.is.paying.government.officials,.or.the.laws.just.don’t.apply,.it.really.doesn’t.matter..These.criminals.exist,.and.they’re.out.to.get.any.and.all.information.they.can..So.why.do.they.want.your.data?
1..To target your personal and/or business finances..Stealing.financial.ac-count.information.is.easy.these.days..It’s.even.easier,.and.far.more.useful,.to.steal.credit.card.information.
2..To target your computers and technology infrastructure..Botnets.allow.an.attacker.to.use.many.machines.to.attack.other.machines,.steal.infor-mation.and.commit.various.other.acts.of.evil..Once.the.hacker.controls.your.computer.they.can:
• Log.every.keystroke.you.type..The.software.that.records.the.key-strokes.is.even.built.to.show.fake.login.pages.for.financial.institutes.to.log.your.credentials.
• Steal.information.from.your.hard.drive..The.attacker.owns.your.machine.and.can.get.at.any.piece.of.data.they.want..Stealing.your.accounting.database.and.cracking.the.username.and.password.shouldn’t.take.more.than.a.few.Google.searches.
• Use.your.system.to.send.SPAM..The.majority.of.SPAM.is.sent.through.systems.controlled.by.botnets..If.your.system.is.under.the.control.of.a.hacker,.they.can.send.hundreds.of.thousands.of.pieces.of.SPAM.from.your.system.without.you.ever.knowing.it.
3..To target your customers. Maybe.you.have.some.high-profile.clients.that.the.attacker.is.after..Maybe.a.client.is.listed.on.your.site.or.sent.an.issue.via.Twitter..It’s.easy.to.figure.out.who.your.clients.are,.and.it’s.an.easily.accessible.entry.point.for.an.attack.
4..To target employees. A.hacker.can.easily.target.your.employees.using.social.media.and.direct.attacks..It’s.easy.to.find.ways.to.get.at.your.em-ployees,.like.using.family.members,.college.or.high-school.friends.found.through.Facebook..If.an.attacker.targets.one.of.your.employees,.he.can.gain.insight.into.your.business.practices.and.target.your.entire.company.
All.attacks.are.planned..There’s.an.end.goal,.and.because.this.is.the.at-tacker’s.job,.he.spends.lots.of.time.planning.and.plotting.every.step..Just.like.that.new.promotion.you.planned.in.November,.the.attacker.planned.the.malicious.attack.on.your.Social.Media.Manager..Many.people.think.hackers.don’t.put.much.thought.into.attacks,.and.while.the.419 scams.and.bad.spelling.in.most.SPAM.might.make.you.think.hackers.are.stupid,.that’s.far.from.the.truth..In.the.book.Social Engineering: The Art of Hu-man Hacking,.Christopher.Hadnagy.provides.information.on.how.much.effort.a.hacker.will.put.into.planning.and.executing.an.attack..It’s.like.a.chess.game—but.unfortunately,.most.of.the.targets.have.no.idea.they’re.part.of.the.game..If.you.have.any.type.of.online.presence,.then.you.are,.have.been,.or.very.shortly.will.be.under.attack..So.you.must.behave.like.you’re.under.attack.and.secure.your.assets.at.all.times.
7
Email Is Gold
Email.addresses.are.extremely.valuable.in.today’s.economy..Referencing.back.to.our.quick.calculation.in.the.introduction,.you.can.see.that.an.email.address.can.be.worth.a.lot.of.money.to.your.business..Our.identities,.important.accounts.and.vital.information.are.attached.to.email.addresses..Chances.are.your.financial.institutions.use.your.email.address.as.your.username..Your.social.media.accounts,.like.Facebook.and.Twitter,.tie.to.your.email.address..Your.email.address.is.a.unique.identifier—but.more.importantly,.it’s.a.communication.mechanism..We.use.email.to.transmit.all.kinds.of.important.information,.and.we.use.email.more.and.more.each.day..Evil.hackers.want.the.email.accounts.for.various.reasons..This.is.just.a.small.list.of.some.stuff.they.might.be.after:
• Hackers.have.found.that.companies.who.use.ESPs.generally.have.clean.lists..A.clean.list.means.fewer.bounces.and.potentially.an.en-gaged.list..And.that.means.the.list.will.deliver.to.the.inbox.and.have.a.higher.likelihood.of.clicks.and.opens.
• The.hacker.wants.your.email.addresses.to.send.your.subscribers..malicious.stuff..Maybe.your.email.list.has.important.users.like.con-gress.members..If.they.can.trick.your.subscribers.into.clicking.links.and.visiting.bad.sites,.they.can.then.gain.access.to.machines.they.were.targeting.
• The.hacker.is.planning.a.much.larger.attack.and.is.just.harvesting.email.addresses.
• The.hacker.is.planning.to.resell.your.subscribers.
Know.that.lists.used.by.marketers.often.have.highly.engaged.readers.and.good.email.addresses..If.the.hacker.wanted.to.target.your.customers,.they.could.easily.imitate.your.campaign.content.and.trick.your.users.into.following.a.link.to.a.malicious.site..Chances.are,.the.engaged.readers.will.click.like.they.normally.would..The.list.is.valuable.to.you,.but.it’s.just.as.valuable—if.not.more.so—to.the.hacker...
There’s.also.a.large.market.for.buying.and.selling.email.addresses..So.not.only.can.the.hacker.use.the.email.addresses.for.direct.attacks,.but.they.can.then.sell.the.addresses.to.a.list.broker.for.further.gain..Think.that.through.the.next.time.someone.approaches.you.about.selling.a.list—chances.are.most.of.the.addresses.were.gathered.unethically.
8
How An Attack Works
Remember,.the.hacker.has.an.end.goal..In.this.section.we’ll.build.a.sce-nario.and.walk.through.how.an.attack.is.planned.and.carried.out..
Let’s.say.your.site.is.a.popular.foodie.blog..You.have.a.cool.newslet-ter.signup.on.your.site,.and.you.allow.people.to.comment.on.your.blog..Somewhere.along.the.way,.you.were.interviewed.on.a.food.website.about.how.you.handle.your.business,.and.most.importantly,.your.marketing..You.told.everyone.that.you.use.this.really.cool.newsletter.service.called.MiamiMail,.that.you.have.280,000.subscribers,.and.the.list.grows.by.2,000-3,000.subscribers.a.week..It’s.so.much.to.maintain.that.you.hired.Debra,.a.social-media.expert,.Quinn,.an.email-marketing.guru,.and.Vince,.a.programmer.who.works.with.the.MiamiMail.API..You.also.talk.about.your.guest.bloggers.and.some.of.the.famous.chefs.that.actively.participate.on.the.blog.and.answer.questions.in.the.comments..You.just.built.this.great.new.recipe.section,.where.the.same.famous.chefs.comment.on.the.posts..Arthur.is.a.hacker,.and.he’s.just.come.off.a.series.of.attacks.against.major.car.dealers..He.wants.to.change.things.up.and.reads.the.article.about.your.site..It.piques.his.interest.because.you.gave.some.specific.details..Here’s.what.Arthur.knows.about.your.business:
1..You.use.MiamiMail.
2..You.have.a.substantial.list,.and.it’s.growing.quickly.
3..Arthur.knows.about.at.least.four.people.in.the.company:.Debra,.Quinn,.Vince.and.you.
4..Arthur.also.knows.some.famous.people.who.use.your.blogging.tool.
5..Those.famous.people.participate.in.the.recipe.section.
Arthur.takes.this.data.and.begins.to.research.the.following:
1..MiamiMail..Find.out.anything.and.everything.out.about.them..He.trolls.the.support.forums,.signs.up.for.a.free.account,.learns.about.the.API.and.even.experiments.with.the.system.to.send.a.few.test.campaigns.
2..Your company’s About page. That.really.cool.Team.page.came.in.handy!.Arthur.finds.a.few.other.employees.and.then.begins.researching.your.employees.and.building.profiles.for.Debra,.Quinn,.Vince.and.you..He.finds.your.Twitter,.Facebook.and.LinkedIn.profiles..He.also.finds.out.your.home.addresses,.personal.email.accounts.and.a.few.other.pieces.of.information.he.purchases.using.some.stolen.credit.cards.he.got.from.that.car.dealer.scam.he.ran.last.week.
3..The famous chefs..If.Arthur.can’t.trick.your.employees,.he.might.be.able.to.trick.one.of.the.chefs.and.maybe.gain.some.access.to.the.blog.
Over.the.years.we’ve.seen.SPAM.grow.in.maturity...SPAM.has.moved.from.poorly.spelled.419.scams,.to.simple.phishing.scams,.and.now.we.see.smarter.and.more.targeted.SPAM.and.phishing.attacks..Hackers.have.exposure.to.tools,.data.and.blackhat.ESP.systems.that.allow.them.to.run.sophisticated.campaigns.against.targeted.victims..We.see.hackers.use.levels.of.sophitication.beyond.what.most.marketers.use,.like.advanced.segmentation,.dynamic.content.using.conditional.merge.tags,.and.combin-ing.other.data.sources.to.target.recipients.more.effectively..With.combined.data.sources,.they.can.effectively.attack.your.employees.and.users..If.the.attacker.can’t.obtain.enough.information,.there.are.sites.where.a.few.dol-lars.can.provide.them.with.just.about.anything.they.want.to.know..Just.as.you.read.your.campaigns.results,.the.hacker.is.using.reporting data.from.their.malicious.software..When.they.launch.an.attack,.they.use.the.stats.to.tweak.and.refine.future.attacks.
Arthur.builds.his.campaign.to.drive.his.victims.toward.a.site.or.series.of.malicious.sites..These.campaigns.allow.him.to.learn.more.about.the.com-puter.systems.involved,.gain.access.to.the.owners.system,.or.even.worse,.damage.your.infrastructure.as.a.whole..He.won’t.just.target.employees—he’ll.target.business.associates,.family.members.and.friends..Arthur..may.even.use.a.series.of.campaigns.to.learn.more.information.or.gain.access.to.specific.computer.systems.
So what is a malicious site?
Years.ago.someone.would.receive.a.virus.in.an.email,.click.it,.and.get.in-fected..Those.tactics.are.still.used,.but.these.days.most.attacks.use.drive-by.malware..The.basic.idea.is.that.you.visit.a.site.that.the.hacker.controls..They’ve.embedded.some.javascript.or.code.that.runs.and.infects.your.system..You.didn’t.have.to.click.anything—you.simply.visited.the.site.and.got.infected..If.Arthur.plays.his.cards.right,.he’ll.infect.the.right.machines..Even.if.he.doesn’t.get.to.the.systems.he.wanted,.he’ll.use.the.other.systems.to.learn.more.information.or.attack.elsewhere..And.what.does.an.infected.machine.provide.Arthur.with?.Malware.infections.can.include.keyloggers,.remote.access.and.access.to.all.the.data.on.your.machine.or.network..Once.infected,.Arthur.has.unfettered.access.to.your.information...Keyloggers.allow.him.to.watch.all.your.keystrokes..Yes,.EVERY.keystroke...Malware.is.designed.to.run.without.you.ever.knowing.it.has.been.installed...Arthur.can.sit.and.watch.and.collect.and.learn..With.time.he’ll.gain.access.to.all.of.your.systems.or.in.this.case.gain.access.to.your.MiamiMail.ac-count..Once.he.has.this.access,.he’ll.steal.your.subscribers.and.start.the.process.all.over.again..At.this.point,.he.can.target.your.subscribers.to.gain.access.to.their.systems,.attempt.to.steal.credit.cards.and.more..He.can.continue.mining.data.from.your.system,.or.rent.or.sell.your.system.to.other.hackers.for.other.needs..
Read.more.about.malware..Scary,.huh?.We.suggest.rottweilers.with.lasers.