KnowBe4 as Poor Person's Intrusion Detection System & The Catch
If you use KnowBe4 to perform phishing assessments of your company, you know that a handy feature is the map of the world showing where people clicked on assessments. Under:
Phishing > Campaigns > Inactive > (Click on a finished campaign)
Scroll down to "Failure by IP Address Location". If you know all of your staff is based in the Canada and see that someone fell for a phishing message in Madagascar, you're thinking that either someone is on vacation, or the mailbox has been compromised. Red Alert!
Or not. I had a situation where I had a failure on an IP address in Israel. I confirmed that the recipient of that message was not on vacation to the middle east and was not using a VPN. This prompted an investigation seeking any suspicious activity involving the user account in question and any suspicious activity or successful logons from unexpected countries. Passwords were changed, meetings cancelled, and I was JUST about to call in third party IR reinforcements when I decided to call KnowBe4 support to see if they could provide further insight into the situation. They did.
Long story short: The message in question had been forwarded internally after receipt (the recipient was dutifully questioning the validity of the message without clicking on anything therein). By doing this the hyperlinks were scrutinized by two different email security solutions and their automatic sandboxes - at least one of which then passed it around the world. It's analogous to VirusTotal - you don't upload a file to VT unless you're comfortable with the file being accessible to 34,521 security people around the globe. Exclusions put in place to avoid KnowBe4 messages being scrutinized were limited to inbound Internet messages only.
When you look at the Failures map in KnowBe4, or export the failures data to .csv, you are only seeing the last failure for a given user/message. Support staff have access to all the clicks, and the analyst with whom I spoke could see 20 on this given message as it traversed the email security interwebs.
So the moral of the story is: Don't panic if, at first blush, it looks like an evildoer opened your phishing assessment message.
Comments
Post a Comment