Brand, Business, and Fraud

F5 Ecosystem | May 09, 2016

Phishing and fraud are most often (and lamentably) associated with financial and banking industries.

Fraud is just another word for trickery, for deception, for deceit, and for chicanery. And those are exactly the means by which attackers obtain credentials from corporateusers every day. Through phishing and through malware deposited on corporate assets by the simple act of browsing. Oh, I know, you don’t let corporate users browse those kinds of sites. But do you let them browse the BBC? Newsweek? The New York Times? How about MSN? All were recently victims of malvertising, where bad guys use top-tier sites to distribute malware laden online ads through online advertising companies. Oh, you’ve got anti-virus software running, of course. But only 25% of real-world malware is caught by anti-viruses according to the Five Habits Of Highly Successful Malware. You’ve no doubt had multiple “security awareness” sessions with your employees teaching them to recognize the signs of a phishing attempt. And yet nearly 50% of victims open that e-mail and click on the link within the first hour of receiving it.

phishing patterns emea 2015

Now let’s not forget that people are accessing their financial institutions, where phishing and malware is heavily relied on by the bad guys, from within the work place. Research from IDC indicates 30-40% of Internet access time in the workplace is spent on non-work related activities. That may be why our F5 SOC found that phishing attempts were significantly higher during the week than it was on the weekends, with Monday being a very popular day to go phishing. If an employee is out doing some banking on Monday morning and falls victim to a phishing attack intended to snag their financial credentials, well, the bad guys are likely to get corporate ones, too. Because AV isn’t catching everything, and people are still falling victim to phishing attacks. Those corporate credentials are just as sellable on the open market as any other, meaning very.

Then there’s the employees who access corporate assets through an SSL VPN or other “protected” portal from outside the corporate walls. The malware that’s sitting in their browser right now doesn’t really care whether it’s grabbing corporate or consumer-related credentials. They’re all worth something to the attacker, and as long as they went to all the effort to infect that device, why not grab everything you can?

The reality is that “fraud” isn’t peculiar to finance and banking. Oh, they’re the hardest hit and see the most immediate impact because the bad guys are after the money they’ve been asked to steward for the rest of us. But if you recall some of the “big” breeches in the past few years most of them point back to a single root cause: stolen credentials.

top data breaches

Credentials that may have been stolen through phishing or malware directly or through trojans that made their way past traditional detection systems and gave the bad guys an easy “in” on your network. From there, data is more often than not the goal. Customer and corporate data alike. The next thing you know, bam! You’re on the cover of “Guess Who Failed to Protect Your Data this Week Magazine*”.

The costs of dealing with that breech go way beyond the technical and operational.

Brand and Business Impacts

Oh, there’s recovery and clean up costs, of course. Resources are reallocated to rooting out every instance of malware and backdoors stemming from that single successful phishing expedition. Desktops are wiped and reinstalled to eliminate those that got in from drive-by downloads or malvertising. A significant loss of productivity across IT and business units ensues, cutting into your bottom line.

And then the brand impact sets in. The Twitters are alive with angry sentiments. Your heretofore pristine brand is turned into a mocking meme that spreads faster than the first winter cold through an elementary school.

Once the desktops are clean and stronger protections put in place, the aftershocks of a breach continue to hammer at your brand reputation and you’re going to have to address that. According to a recent study over half (57%) of organizations admit that security incidents had a negative impact on their reputation costing small and medium businesses more than $8000 and enterprises over $200,000. Some of that costs come from hiring external agencies to help manage the overwhelming demand for responses, answers to questions, and advice on how to proceed. Some of it comes from costs incurred meeting consumer expectations to provide identity theft protection (63%), credit monitoring services (58%), and compensation in the form of cash, products, or services (67%).

Some of it comes from losing customers, because as it turns out, brand is a significant factor in consumers’ purchasing decisions. Price is usually fingered as number one, but it turns out that price considerations are relative to the reputation of the brand. Consumers will pay for more for a brand with a good reputation, which makes it imperative that after a breach your brand is repaired as soon as possible.

But the damage isn’t restricted to consumers, though that’s usually the first place we look. Recruiting, it turns out, is also impacted. Attracting the right talent takes money, and the Employer Branding Global Trends report noted that good employer brands experienced a 22% lower recruitment fee. That’s assuming you can interest the talent in the first place. The same survey found that 45% of potential hires place other people’s perception of the company they work for on their list of “important” when it comes to choosing a new job. Brand impacts whether or not people want to work for an organization, so breaches can negatively impact your ability to attract (and potentially retain) the talent you need to succeed today.

Addressing Web Fraud

The good news is that there are tools that address the threats from phishing and malware. A lot of them. The thing is they’re generally categorized as “anti-fraud” and mentioned in the context of finance and banking and other money-based industries. But the solutions aren’t peculiar to finance and banking; there’s nothing magical about the way those industries interact with customers that makes anti-fraud only applicable to protecting them because they’re really about stopping web fraud; the use of web apps and technologies to trick, deceive, and coerce individuals into giving up their credentials.

What web fraud solutions do is seek out and prevent the theft of credentials that ultimately assist attackers in breaching security. Whether they’re after cash or data isn’t relevant; once they’re collecting credentials they’re collecting any credentials, whether they’re corporate or consumer. If employees access corporate resources using a compromised machine, the bad guys get corporate credentials right along with everything else. And that should be a concern for business in any industry.

* Not a real publication but after the spate of breaches over the past few years it seems like there’s a need for one, isn’t there?

Share
Tags: 2016

About the Author

Lori Mac Vittie
Lori Mac VittieDistinguished Engineer and Chief Evangelist

More blogs by Lori Mac Vittie

Related Blog Posts

SaaS-first strategies reshape cloud-native application delivery
F5 Ecosystem | 12/03/2025

SaaS-first strategies reshape cloud-native application delivery

F5 NGINXaaS empowers cloud and platform architects to unify operations, reduce complexity, and deliver exceptional digital experiences at scale.

F5 ADSP Partner Program streamlines adoption of F5 platform
F5 Ecosystem | 11/19/2025

F5 ADSP Partner Program streamlines adoption of F5 platform

The new F5 ADSP Partner Program creates a dynamic ecosystem that drives growth and success for our partners and customers.

Accelerate Kubernetes and AI workloads with F5 BIG-IP and AWS EKS
F5 Ecosystem | 11/17/2025

Accelerate Kubernetes and AI workloads with F5 BIG-IP and AWS EKS

The F5 BIG-IP Next for Kubernetes software will soon be available in AWS Marketplace to accelerate managed Kubernetes performance on AWS EKS.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us