The quarterly publication of the International Legal Technology Association
Issue link: https://epubs.iltanet.org/i/657874
89 WWW.ILTANET.ORG download or USB). We can see what type of information can be exposed by whom and how far it can go. This malware simulation is non-intrusive and doesn't interrupt normal daily business operations. 4. Malware Protection Tests: This feature allows us to perform security checks without involving employees outside the IT department. This helps us determine malware-related vulnerabilities on the network, system and application levels, and we can verify whether our security information and event management (SIEM) system can detect malicious activities. 5. Training: An integrated (interactive) e-learning module provides the necessary training to improve employee awareness. The tool can also: » Run within private networks or on the Internet » Detect if users access the campaign with vulnerable browsers (plug-ins) of simulated aacks (malware through USBs, for example)? Does it have integrated training modules? Does it provide baseline and trend analysis? » Reports: What kinds of reports can the solution generate and deliver? Can the results be used to target the weakest links for successive campaigns? Are there different dashboards for different audiences? » Cost: What are the cost differences between subscription and perpetual licensing? What hardware, training and other costs will be involved? Our Solution We decided to implement LUCY, which allows us to measure and improve awareness related to phishing, SMiShing, BadUSB, malware and drive-by aacks by launching your own realistic security campaigns. We can imitate cyberaacks in our own network or in the cloud through five main modules: 1. Traditional Phishing/SMiShing Aacks: We can run variations of aacks to measure and improve awareness of employees. All technical aspects, i.e., sending mail/SMS, starting the embedded Web server or generating statistical analysis, are handled by the application. In a few clicks, entire websites can be copied. Also included is a menu of aack scenario templates (predefined websites and message templates). 2. BeEF Integration: We can opt to gather advanced information about our users using a Browser Exploitation Framework (BeEF) tool. This lets us answer the question: If a user falls for an aack using a vulnerable browser, would their browser security seings have prevented more damage from having browser-exploitation-type malware? 3. Malware Aacks: We can simulate a malware aack, combining phishing with custom malware samples (which can be delivered via mail, Web Catch and Release: Raising Phishing Aack Awareness LESSONS LEARNED PRABHAKAR CHANDRASEKARAN Prabhakar Chandrasekaran is the Senior Manager of Information Security at Ogletree, Deakins, Nash, Smoak & Stewart, P.C. and a member of ILTA's LegalSEC Council. Contact him at prabhakar.chandrasekaran@ ogletreedeakins.com.