US Congress blocks Yahoo Mail after wave of ransomware attacks

14 May 2016

On reading this post in HOTforSecurity I was reminded of a discussion we had during a strategy meeting last week.

Many companies and organizations allow their employees the use of web mailers for staying connected, and, to some extent, for doing private business. This makes sense because the use of company accounts for private purposes poses more risk to the company.

The use of web mailers becomes a problem as soon as company resources are used, i.e. attachments are downloaded to a computer on the organizations network and opened for further processing.

Under normal conditions, when the connection with the web mail provider is encrypted, the anti-malware solution on the web-proxy has trouble analyzing the attachments in the data stream. Technical solutions for breaking up SSL secured communication are available, however they are not widely used, or just too expensive, or cannot be enforced due to legal or privacy constraints.

With this, the endpoint protection solution must solely deal with the malicious attachment. And this is not very effective, in particular in the case of zero-day malware.

But the main problem are the web mail providers themselves. Every day millions of emails with malicious attachments are routed by few mail providers through the internet. With an improved examination during posting and forwarding the email providers should be able to reduce the number of emails with malicious attachments dramatically. This will lead to massive increase in overall cyber security, to savings in the costs for the defense of cyber-crime and in the costs for the recovery from cyber-attacks.

Denise E. Zheng writes in the CSIS publication ‘Disrupting the Cyber Status Quo’:

Much can be done by the handful of companies that provide the majority of products and services that comprise the Internet and computer-operating systems, through more focused nudging and guidance from government.

and

Law and policymakers have shied away from tackling the root causes and key enablers of cyber crime and conflict.

Have a good weekend, and enjoy Denise’s report.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s