National Portrait Gallery hit by 350,000 email attacks in three months

Majority of attacks said to be targeting employee accounts and associates of the gallery

The National Portrait Gallery was targeted by 347,602 emails containing spam, phishing and malware attacks in the last quarter of 2019, a freedom of information (FOI) request has revealed.

Over half of the emails, 194,620, were identified as being directory harvest attacks (DHA), a technique used to harvest valid email addresses belonging to employees and associates of the gallery, according to data collected by think tank Parliament Street.

Related Resource

Strengthen your defences against cybercrime

Cyber resilience planning for email

Download now

The gallery also blocked 61,710 emails from senders flagged as belonging to a "threat intelligence blacklist". A further 85,793 emails were intercepted as they were believed to have contained spam content - which is anything from unsolicited marketing to serious phishing and malware. According to the figures, 418 of the emails contained a virus of some kind.

"These figures paint a worrying picture of the volume of malicious email attacks designed to trick unsuspecting staffers into handing over confidential data such as passwords and log-in credentials," said Andy Heather, VP of security firm Centrify.

"The National Portrait Gallery is an incredibly popular destination for tourists, attracting millions of visitors and members every year, which unfortunately makes it a top target for hackers and cyber criminals seeking to use legitimate, often stolen, credentials to gain access fear of detection."

Stolen employee credentials are a global problem for all businesses. Last year, figures from Google's Password Checkup report suggested that 1.5% of all sign-in attempts were being made using details compromised during a data breach.

"Addressing this threat means ensuring a zero-trust approach to employee communication, ensuring suspicious emails are spotted and full checks are made so that managers can be sure all staffers are who they say they are," Heather added.

In 2017, London art dealers were defrauded out of hundreds of thousands of pounds after hackers successfully breached company email accounts to monitor correspondence between clients. The incident resulted in fresh cyber security guidance being issued by the Society of London Art Dealers, as well as tips for avoiding email fraud.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Weakness in Mamba ransomware could help recover data
ransomware

Weakness in Mamba ransomware could help recover data

26 Mar 2021
Invoice ZLoader campaign hides within encrypted Excel docs
malware

Invoice ZLoader campaign hides within encrypted Excel docs

8 Mar 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget
Mobile Phones

Xiaomi Redmi Note 10 Pro review: Champagne tastes on a lemonade budget

13 Apr 2021