Sinara ETS Email Threat Simulator
Target-oriented phishing attacks (spear phishing) have become one of the most harmful types of attacks that cause serious data breaches. According to the researchers (2016),
- 91% of the violations were targeted by spear phishing attacks.
- It takes an average of 146 days to detect a violation.
- Average of 82 days is required to prevent cyber security breaches.
- The overall average cost of data breaches is about $ 4 Million.
To minimize the above threats, Sinara Labs proposes a holistic security approach that focuses on people, processes and technology. In this context, Sinara Labs offers regular testing and remediation services for testing, improving and taking additional measures of technological investments.
With simulation logic, Sinara Labs tests the attack vectors targeting your institution through the e-mail service, and helps you to take the necessary action for your results.
Sinara Email Threat Simulator Workflow
When you share the information and configuration options for your test account, it sends attack vectors to test email address then connects to the mailbox of the test email address and checks their status. A sample workflow is shown below. Sinara ETS Email Threat Simulator
Unlike the other cyber threat simulation platforms, Sinara offers some unique methods, which will convince individuals to use it:
- Unlike known vulnerability scanning services, it controls missing / incorrect configuration options.
- Systems that test active network devices by moving traffic are insufficient, and this lack is sustained by real attack vectors by Sinara Labs.
- It reports about intrusions with domain squatting features and its integrated cyber intelligence services.
Integration Options for Corporates Network
There are full integration options for organizations that have shut down services such as Pop3 and Imap to the outside world and offer web-based email access to their users. In this sense, to connect to the test e-mail box, the integration with “Outlook Web Access” option is the right solution.
It scans your e-mail service against known vulnerabilities. It works integratedly with automation scanning softwares such as Nessus and Nexpose as well as with third party services such as Mxtoolbox.
It includes attack vectors for Internet users.
It contains known harmful substances in email attachments. In this category, harmful attachments not recognized by antiviruses are also available and they are expected to be detected by behavior analysis. It works integratedly with Metasploit tool and various third party services.
It contains annotations that simulate known ransomwares and their actions.
It inspects missing faulty configurations. It tests known and frequently misconfigured configurations with active scan options, and it also has test scenarios to determine if you are implementing the best configuration options.
It contains e-mails that contain known vulnerabilities of internet browsers. It sometimes contains a link or an abuse piece of code.
File Formats Exploits
It works integratedly with known file types (pdf, word, mp4 etc) with Metasploit tool and various third party services.
Sign up for Sinara
Create test account
A test email address and password are required for the service to work successfully. If you do not define a password, the actual risk may not be reported to you, because the delivery status of e-mails can not be checked!
Secure Configuration Suggestions
If your organization has concerns about creating a security risk with this test email address and password, you can make suggestions:
- You can restrict test email’s sending option. There is a guide that show you how you can configure it.
- By requesting the IP address of the Sinara ETS servers, you can restrict access to these addresses.
Quick Scan Option
You can make your account definitions and start browsing directly. With this option, attack vectors will be simulated in all categories.
Advanced Scan Option
It is the scan option that you can customise settings and connect them to schedule.
The report interface contains all the details of the simulation result. Solution suggestions for findings and references contain guiding details for you to develop solutions.
Interpretation of the Report Summary
Successful attacks are reported as “failed”, which is a problem that you are affected by and should be resolved. Failed attacks are reported as “pass”. This indicates that you are not affected by such attacks.
The summary of the results is listed as follows.
Scorecards and Development Chart
Sinara Email Threat Simulator gives scores from A to F according to the results. The calculation of these points is as follows;
And the score tables point out:
- Score: The score calculated according to the average of Phishing, Vulnerability, CTI (Cyber Threat Intelligence) scores.
- Phishing Score: The score you have calculated according to what you have received from the Sinara Phishing simulator.
- Vulnerability Score: The score which is created based on the results of the weakness scan.
- CTI Score: The percentage of points awarded by the cyber intelligence services.
The last 7 scan results provide visuals to report for your progress. You can see your progress based on Passed, Failed and Unchecked output.
Please feel free to contact us with any questions you may have. email@example.com