Exposing users to the latest social engineering attacks is a key component of any security awareness training program. Centrality’s Training offers customers real-world phishing simulation templates to evaluate whether their employees can successfully identify spear-phishing attacks and determine how likely they are to interact with them. We also have the click-rate data related to these simulation templates for years. A clear trend has emerged among users from a variety of industries: Emails that impersonate internal departments or applications are the most likely to bait user interaction.
Ice phishing is a form of internal communication emulation and is successful because employees tend to get flooded with these types of emails on a daily basis. Password reset requests, storage alerts, HR notifications, and service ticket updates are all examples of these messages. The frequency and volume of these emails lead people to click without careful analysis. These ice phishing attacks can also be baited with emotional triggers like “you’re about to run out of email storage” or “your web browsing is in violation of company policy.” Emotional reactions like anger, fear, or frustration tend to drive a lot of clicks, regardless of the type of email.
Out of the hundreds of phishing simulation templates we provided in our security awareness training, 9 out of 10 of them were ice phishing. Below is the data for the click rate. Google File Share was the only simulation not a phishing attack.
Template Name / Description | Click Rate | Ice Phish? |
Internet FAX | 50% | Yes |
Salary Confirmation | 43% | Yes |
Travel Policy Updated | 40% | Yes |
HR PTO Updates | 31% | Yes |
Travel Policy Updated | 30% | Yes |
New Corporate Directory | 30% | Yes |
MFP (Multi-Function Printer) Document | 29% | Yes |
Google File Share | 28% | No |
MFP (Multi-Function Printer) Document, v2 | 28% | Yes |
Found Print Job | 28% | Yes |
Detecting these types of attacks takes careful analysis on behalf of the recipient, but technical controls can help. For instance, you can place warning banners on external emails by using something like an External Sender Warning.
Procedural controls can also help to mitigate the risks of ice phishing. One major medical institution now mandates that all internal communication should direct users to the intranet and that links to external sites are strongly discouraged. More importantly, users were educated about the danger of ice phishing attacks.
When hackers leverage ice phishing internally after a successful account takeover, these attacks are even more difficult to identify. Contact us today at 502.262.2552 to learn more about how we can help educate your team about the latest phishing attacks as well as be your partner to response to any cybersecurity incidents.