An Analysis of Phishing Reporting Activity in a Bank

Conference Paper (2024)
Author(s)

Anne Kee Doing (Student TU Delft)

Eduardo Barbaro (TU Delft - Organisation & Governance, ING Bank)

Frank van der Roest (ING Bank)

Pieter van Gelder (TU Delft - Safety and Security Science)

Yury Zhauniarovich (TU Delft - Organisation & Governance)

Simon Parkin (TU Delft - Organisation & Governance)

DOI related publication
https://doi.org/10.1145/3688459.3688481 Final published version
More Info
expand_more
Publication Year
2024
Language
English
Pages (from-to)
44-57
ISBN (electronic)
9798400717963
Event
2024 European Symposium on Usable Security, EuroUSEC 2024 (2024-09-30 - 2024-10-01), Karlstad, Sweden
Downloads counter
316
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

A reduction in phishing threats is of increasing importance to organizations. One part of this effort is to provide training to employees, so that they are able to identify and avoid phishing emails. Yet further, simulated phishing emails are used to test whether employees will both identify and report a suspicious email. We worked with a partner bank to examine a repository of many thousands of reported emails from a behavioural perspective. We divide reported emails into categories and examine reporting trends over time relative to training and phishing simulation campaigns. Among our findings, the level of reporting of benign emails is comparable to the number of malicious emails reported, and we see indications that training and simulations amplify the reporting of benign emails. Our analysis uncovers reporting patterns for unique reporters per email campaign as a promising indicator for the security-related culture around phishing prevention. Evidence from our analysis informs recommendations, such as providing reporting infrastructure for reporting not only malicious emails, but also benign but suspicious work-related emails, in a manner that minimises the disruption for users erring on the side of caution when assessing emails.