Most UK university applicants at risk of email fraud
Only one of the top 20 UK universities are following best practices to block fraudulent emails from reaching targets by implementing a basic modern authentication protocol to protect against phishing, putting students, staff and applicants at risk, according to a study by email security firm Proofpoint.
Nearly two-thirds (65%) of the UK’s top universities do not have a published domain-based message authentication, reporting and conformance (Dmarc) record, the study found, making them potentially more susceptible to cybercriminals spoofing their domains and increasing the risk of email fraud for prospective students.
In light of the fact that phishing remains one of the most common cyber-attack vectors organisations and individuals face today, the UK’s National Cyber Security Centre (NCSC) has championed the use of the Dmarc email protocol and published guidance on how to implement it.
Dmarc verifies that the purported domain of the sender has not been impersonated using the established DKIM (DomainKeys identified mail) and SPF (sender policy framework) standards to employees, customers and partners from cybercriminals looking to impersonate a trusted domain such as a university.
Although 35% of top UK universities have a published Dmarc record, the study found that all but one have not yet set their policies to “reject” to block fraudulent emails from reaching recipients, which is the recommended and strictest level of Dmarc protection.
Setting Dmarc policies to “reject” is the only guaranteed way of preventing email spoofing, which has long been blamed for fraud victims being duped by social engineering techniques.
Opting to set the policy to “none” will merely alert the domain owner of potentially suspicious activity, but will warn not the recipient of fraudulent emails.
Setting the policy to “quarantine” also notifies the domain owner and potentially offers some protection by sending the email to “spam” or “junk” folders, but the result depends on the delivery policy of the email provider and therefore does not provide guaranteed protection.
This means in the run-up to the announcement of A-level results on 15 August 2019 and immediately thereafter, the majority of those communicating with universities about course placements could be targeted by fraudsters with emails that appear to come from universities.
With a record 40% of UK school leavers applying for higher education places this year, more than 230,000 prospective students will be eagerly awaiting email correspondence regarding their applications.
“This is a rare occurrence when we can with 100% certainty predict a cyber attack in which we will see tens of thousands of school leavers targeted by phishing emails,” Kevin Epstein, vice-president of threat operations at Proofpoint, told Computer Weekly.
“A-level results day in combination with a lack of Dmarc protections provides a degree of specificity about attacks that is rare in the cybersecurity industry,” he said.
The Proofpoint study comes just weeks after Lancaster University reported an incident to the National Crime Agency (NCA) and the Information Commissioner’s Office (ICO) in which personal data breaches had resulted in fraudulent invoices being sent to some undergraduate applicants.
A recent report by the NCSC revealed that university-related phishing scams have significantly increased over the past year, while its list of top 10 phishing takedowns in 2018 included three universities and the Student Loans Company.
“By not implementing simple, yet effective email authentication best practices, universities may be unknowingly exposing themselves and their students to cyber criminals on the hunt for personal data,” said Epstein.
“Email continues to be the vector of choice for cybercriminals. Proofpoint researchers found that the education sector saw the largest year-over-year increase in email fraud attacks of any industry in 2018, soaring 192% to 40 attacks per organisation on average.”
According to Epstein, institutions and organisations in all sectors should look to deploy authentication protocols, such as Dmarc, to shore up their email fraud defences.
“Cybercriminals are always going to use events like A-levels results day to drive targeted attacks using social engineering techniques such as impersonation, and universities are no exception to this,” he said.
Students warned to be vigilant
Ahead of A-level results day, Epstein said student applicants need to be vigilant in checking the validity of all emails, especially when their attention is focused on the future.
Students should check the validity of all email communication and be aware of potentially fraudulent emails impersonating education bodies, he said. They should also be cautious with any communication attempts that request log-in credentials or threaten to suspend service or an account.
The study suggests that education is one of the weakest sectors when it comes to Dmarc implementation, while retail, banking and finance are among the strongest.
Organisations implementing Dmarc tend to be those that value their brand reputation the most, said Epstein, adding that universities should also be doing so for the same reason.
“There is a very real cost to any institution, academic or otherwise, in terms of brand degradation. In some cases, universities have spent centuries building their brand value, so there is no reason not to make an investment to protect that brand that the attackers are exploiting,” he said.
Another part of the problem is that organisations are not going for the strictest Dmarc policy out of fear of blocking legitimate emails. For this reason, Epstein said organisations need to ensure that they are implementing a Dmarc policy but with “diligence and precision” so that they can be confident that no legitimate email will be blocked.
“Organisations typically struggle to decide whether to err on the side of deliverability or security and although cases could be made for both options under different circumstances, in light of the impending delivery of acceptance emails, now would be a good time to err on the side of security.
“Now would be a great time for universities to examine the Dmarc situation. If they don’t have a published record, this would be a good time to publish it, and if they have a published record, this might be a good time to flip the switch to ‘reject’,” he said.
However, Epstein said this can be “complex” and so it is “completely reasonable” to seek assistance either by consulting guidance such as that published by the NCSC or from commercial service providers to ensure that the implementation will not block legitimate emails.
“The NCSC is doing wonderful public service by evangelising and emphasising the importance of Dmarc as well as providing resources. Of course, there are service providers like Proofpoint that are ready and willing to assist because we view this as a very important and high return on investment approach to security,” he said.
To illustrate this, Epstein said the cost of the Equifax breach worked at around £100 per person, and if only a quarter of UK school leavers are targeted by phishing attacks, at £100 apiece, that is a £5m potential loss over an eight-hour period in just 10 days’ time.
Industry: Cyber Security
- DevSecOpp- Security design / review consultant. SC Clearance. London
CH7838 London £70,000 DevSecOpp- Security design / review consultant. DevSecOpp- Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- SPLUNK SOC Analyst level 3, London.
SPLUNK SOC Analyst level 3, Must be able to commute to the City of London. Onsite role. Security clearance needed. The SPLUNK SOC Analyst level 3 must have current experience working within a SOC environment with specific experience using a range of tools and techniques to investigate security incidents. Current experience with Splunk is essential. any additional experience Individuals with Elastic Security SIEM are highly desirable. Any of the following certifications are desirable Splunk Phantom certified admin, Splunk Core Certified Power User / Advanced, Splunk Certified Enterprise Security Admin, etc The role will include, but not be limited to working with sophisticated information security tools, investigating security incidents, incident management, technical escalation, process improvement, research into the latest threats, reporting etc The individual MUST currently be living in the UK and be able to achieve UK security clearance. (SC) This is a permanent role To arrange a call with Chris Holt https://calendly.com/chris-holt/arranged-call-with-chris-holt-elastic-siem-engineer-soc Chris.Holt@dclsearch.com
- ISO 27001 & Business Continuity Security Specialist, End User
- United Kingdom
CH7828 ISO 27001 & Business Continuity Security Specialist, End User, £70,000 United Kingdom ISO 27001 & Business Continuity Security Specialist needed to join a Cyber team within an end user. The ISO 27001 & Business Continuity Security Specialist will have end to end responsibility for the information security and Business Continuity management system. ISMS/BCMS. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, very occasional travel to London office This is an exclusive role to DCL Search & Selection. Looking to interview immediately. https://calendly.com/chris-holt/iso-27001-business-continuity-security-specialis
- PCI- DSS Security Consultant, End User
PCI- DSS Security Consultant needed to join a Cyber team within an end user. The PCI- DSS Security Consultant will have end to end responsibility for PCI - DSS and its continuing certification. Both from an information security and technical security perspective working alongside the CISO. Experience must include, but not be limited to; a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling to achieve compliance. PCI objectives / 12 key requirements, OWASP top 10, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. PCI Cloud compliance, specifically someone with experience taking PCI-DSS from on premise into the cloud is HIGHLY desired. However, someone with Solid PCI experience with a strong technical background which include Cyber / Secure by design etc would be considered. Experience managing internal stakeholders and external third parties essential. Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection. 1st stage interviews to happen the week of the 14th September Arrange a call with Chris on https://calendly.com/chris-holt/arrange-a-call-chris-dcl-pci-compliance