{"id":17958,"date":"2021-01-28T19:52:06","date_gmt":"2021-01-28T15:52:06","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/hr-related-threats\/17958\/"},"modified":"2021-01-28T19:52:06","modified_gmt":"2021-01-28T15:52:06","slug":"hr-related-threats","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/hr-related-threats\/17958\/","title":{"rendered":"Targeting HR with cyberthreats"},"content":{"rendered":"<p>Some professions are simply more susceptible to cyberattacks than others, regardless of the type of business. Today, we\u2019re focusing on the cyberthreats aimed at professionals who work in human resources. The simplest, but far from the only, reason is that HR employees\u2019 e-mail addresses are published on corporate sites for purposes of recruitment \u2014 they\u2019re easy to find.<\/p>\n<h2>Cyberthreats targeting HR<\/h2>\n<p>In human resources, employees occupy a rather unusual position: They receive mountains of correspondence from outside the company, but they also tend to have access to personal data that the company cannot afford to leak.<\/p>\n<h3>Incoming mail<\/h3>\n<p>Typically, cybercriminals penetrate the corporate security perimeter by sending an employee an e-mail containing a malicious attachment or link. That\u2019s why we always advise readers not to open suspicious e-mails with attachments or click on links sent by unknown individuals. For an HR professional, that advice would be ridiculous. The majority of external e-mails they get are likely to be from strangers, and many include an attachment with a r\u00e9sum\u00e9 (and sometimes a link to sample work). As a guess, we\u2019d say at least half of them look suspicious.<\/p>\n<p>Moreover, portfolios or samples of past work sometimes come in uncommon formats, such as highly specialized CAD program files. The very nature of the job requires HR employees to open and review the contents of such files. Even if we forget for the moment that cybercriminals sometimes disguise a file\u2019s true purpose by altering the file extension (is it a CAD file, RAW photos, a DOC, an EXE?), not all such programs are kept up to date, and not all have been thoroughly tested for vulnerabilities. Experts often find security holes that allow arbitrary code execution even in widespread, regularly analyzed software, such as Microsoft Office.<\/p>\n<h3>Access to personal data<\/h3>\n<p>Large companies might have a variety of specialists responsible for communication with job seekers and for work with current employees, but small businesses are more likely to have just one HR rep for all occasions. That one person most likely has access to all personnel data held by the company.<\/p>\n<p>However, if you\u2019re looking to cause trouble, compromising just the HR specialist\u2019s mailbox usually does the trick. Applicants who send r\u00e9sum\u00e9s might explicitly or tacitly give a company permission to process and store their personal data, but they\u2019re definitely not agreeing to hand it over to unknown outsiders. Cybercriminals can leverage access to such information for blackmail.<\/p>\n<p>And on the topic of extortion, we also must consider ransomware. Before depriving the owner of access to data, the latest strains often <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-data-disclosure\/32410\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">steal it<\/a> first. If that sort of malware lands on an HR computer, the thieves can hit a personal data jackpot.<\/p>\n<h3>A foothold for more convincing BEC attacks<\/h3>\n<p>Relying on credulous or uneducated employees to make mistakes is risky. The more difficult but more effective <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-bec-attack\/34135\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">business e-mail compromise (BE\u0421)<\/a> attack is now a major player. Attacks of this type often aim to seize control of an employee\u2019s mailbox and convince their colleagues to transfer funds or forward confidential information. To ensure success, cybercriminals need to hijack the mail account of someone whose instructions will probably be followed \u2014 most often, an executive. The active phase of the operation is preceded by the long and painstaking task of finding a suitably high-ranking employee. And here, an HR mailbox may come in very handy indeed.<\/p>\n<p>On the one hand, as mentioned above, it is easier to get HR to open a phishing e-mail or link. On the other hand, company employees are likely to trust an e-mail from human resources. HR regularly sends applicants\u2019 r\u00e9sum\u00e9s to department heads. Of course, HR also sends internal documents to the company at large. That makes a hijacked HR mail account an effective platform for launching a BE\u0421 attack <em>and<\/em> for lateral movement across the corporate network.<\/p>\n<h2>How to protect HR computers<\/h2>\n<p>To minimize the likelihood of intruders penetrating the HR department\u2019s computers, we recommend following these tips:<\/p>\n<ul>\n<li>Isolate HR computers on a separate subnet if possible, minimizing the likelihood of threat spread to the corporate network even in the event that one computer gets compromised;<\/li>\n<li>Do not store personally identifiable information on workstations. Instead, keep it on a separate server or, better yet, in a system made for such information and protected with multifactor authentication;<\/li>\n<li>Heed HR professionals\u2019 advice regarding <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">cybersecurity awareness training<\/a> for the company \u2014 and place them first in line for that training;<\/li>\n<li>Urge HR reps to pay close attention to the formats of files sent by applicants. Recruiters should be able to spot an executable file and know not to run it. Ideally, work together to draw up a list of acceptable file formats for r\u00e9sum\u00e9s and work samples, and include that information in listings for bona fide applicants.<\/li>\n<\/ul>\n<p>Last but by no means least, adhere to basic security practices: Update software on HR computers in a timely manner, maintain a strict and easy-to-follow password policy (no weak or duplicate passwords for internal resources; change all passwords regularly), and on every machine install a <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solution<\/a> that responds promptly to new threats and identifies attempts to exploit vulnerabilities in software.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Why the computers in human resources are especially vulnerable, and how to protect them. <\/p>\n","protected":false},"author":700,"featured_media":17959,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[2176,1815,2408,363,76],"class_list":{"0":"post-17958","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-bec","10":"tag-e-mail","11":"tag-hr","12":"tag-personal-data","13":"tag-phishing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hr-related-threats\/17958\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hr-related-threats\/22468\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hr-related-threats\/24173\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hr-related-threats\/22250\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hr-related-threats\/20944\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hr-related-threats\/24612\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hr-related-threats\/23820\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hr-related-threats\/29990\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hr-related-threats\/9285\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hr-related-threats\/38614\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hr-related-threats\/16327\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hr-related-threats\/16915\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hr-related-threats\/14437\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hr-related-threats\/26153\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hr-related-threats\/29955\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/hr-related-threats\/26645\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hr-related-threats\/23473\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hr-related-threats\/28848\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hr-related-threats\/28654\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/e-mail\/","name":"e-mail"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17958"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17958\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17959"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}