recommended reading

This Defense Contractor Is Repeatedly Spear-Phishing 68,000 Innocent People

One company with deep Washington connections is running a huge online scam. It involves tens of thousands of victims. And it's completely legal.

The business in question is Northrop Grumman, one of the country's biggest defense firms. But before crying foul, know this: What the company's doing is actually a good thing. No real damage is being done, and the only individuals affected are Northrop employees.

In fact, the entire operation is itself a fraud. Cybersecurity pros within the company are posing as outside criminals looking to breach the firm's defenses. By sending fake e-mails to employees that encourage them to click on malicious attachments or links—a type of attack known as phishing or spear phishing—the firm's tech team is trying to understand how vulnerable Northrop's networks are from real attacks. The exercise is also meant to teach employees how to identify and report actual attempts at intrusion.

Here's how it works: Company security experts blast out a spoof e-mail to the entire company that looks like it's coming from outside the network. In the most recent example, 68,000 of Northrop Grumman's 70,000 employees got an e-mail telling them they'd made an error on their tax returns. Some gullible Northrop workers clicked the "malicious" link. Others recognized the e-mail for the threat it was, and deleted it. But some employees reported the incident back to the staffers who sent the test attacks. 

Michael Papay, Northrop Grumman's chief information security officer, said his goal is to increase the size of the last group.

"If I've got 70,000 employees who are smart enough to say, 'Whoa, looks like a spearphishing e-mail—I'm going to report it to my cybersecurity operations center,' then my operations center can dig into it and immediately block anyone else in the company from getting that e-mail," Papay said. "Having 70,000 people instead of a small number of people doing protection provides economy of scale."

Papay wouldn't reveal how many Northrop employees clicked the dummy link he sent. But he did say that he's seen improvement over time—to the point that now, some employees will take it upon themselves to investigate the origins of a suspicious e-mail. They'll look at the sender's address and conduct a "whois" search online to see if they can connect the e-mail to a registered physical address or phone number.

Northrop has made running phishing exercises a regular habit. The first ones started in 2009, and targeted no more than 20,000 employees in all. According to a 2010 analysis by the company (PDF), the exercises got very positive feedback and are now conducted on a quarterly basis.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.