Parcel and Postal Technology International
  • News
    • A-E
      • Automation
      • Business Diversification
      • Construction / Development
      • Cross-border
      • Delivery
      • E-commerce
      • Expo
    • F-O
      • Freight
      • IT & Systems
      • Last Mile
      • Lockers / PUDO
      • Logistics
      • Mail
      • Operations
    • P-R
      • Packets
      • Parcels
      • Peak
      • Retail
      • Returns
    • S-Z
      • Sorting Systems
      • Staff / Personnel
      • Sustainability
      • Technology
      • Vehicles / Fleet
  • Features
  • Online Magazines
    • March 2025
    • September 2023
    • June 2023
    • March 2023
    • December 2022
    • SHOWCASE 2019
    • Archive Issues
    • Subscribe Free!
  • Opinion
  • Videos
  • Analysis
  • Awards
    • 2025 Awards
    • Previous Winners
  • Supplier Spotlight
  • Parcel + Post Expo
LinkedIn YouTube Twitter
  • Sign-up for Breaking News Emails
  • Meet the Editors
  • Contact Us
  • Media Pack
Subscribe
LinkedIn Facebook
Parcel and Postal Technology International
  • News
      • Automation
      • Business Diversification
      • Construction / Development
      • Cross-border
      • Delivery
      • E-commerce
      • Expo
      • Freight
      • IT & Systems
      • Last Mile
      • Lockers / PUDO
      • Logistics
      • Mail
      • Operations
      • Packets
      • Parcels
      • Peak
      • Retail
      • Returns
      • Sorting Systems
      • Staff / Personnel
      • Sustainability
      • Technology
      • Vehicles / Fleet
  • Features
  • Online Magazines
    1. December 2024
    2. September 2024
    3. June 2024
    4. March 2024
    5. SHOWCASE 2019
    6. Subscribe Free!
    Featured
    April 2, 2025

    In this Issue – March 2025

    Online Magazines By Web Team
    Recent

    In this Issue – March 2025

    April 2, 2025

    In this Issue – December 2024

    December 5, 2024

    In this Issue – September 2024

    September 19, 2024
  • Opinion
  • Videos
  • Analysis
  • Awards
    • 2025 Awards
    • 2024 Award Winners
    • 2023 Award Winners
    • 2022 Award Winners
    • 2021 Award Winners
    • 2020 Award Winners
    • 2019 Award Winners
    • Previous Winners
  • Supplier Spotlight
  • Parcel + Post Expo
LinkedIn Facebook
Subscribe
Parcel and Postal Technology International
Features

Homeland security

mmBy Helen NormanDecember 2, 20168 Mins Read
Share LinkedIn Twitter Facebook Email

Australia’s Corporate Reputation Index is a measure of consumer trust in the country’s top brands. Back in 2012 the national postal operator, Australia Post (AusPost), ranked number two on the index. By 2015 it had slipped to sixth place and by 2016 was all the way down to 19th.

Over that same period AusPost had been fighting an ongoing cybersecurity battle to stop its brand being used by hackers for nefarious purposes. “AusPost noticed our brand being used in late 2013 and early 2014 in very small numbers, which we were able to manage through take-downs of fraudulent sites,” says Kristin Lyons, chief information security officer at AusPost. But that action provided only a temporary reprieve and the problem has since become much worse, including “many aggressive campaigns, a steep increase in their numbers and many changes of tack”, adds Lyons.

The hackers’ main method of attack has been ransomware – malicious software that locks computer files and demands payment for their release. Typically the ransomware is hidden inside an attached “shipping confirmation” document in an email purporting to come from AusPost. The hackers have tried to entice tens of thousands of online users into downloading the malware using data gleaned from the target’s social media profiles to give the emails an air of authenticity.

According to the Australian Competition and Consumer Commission, these email scams cost consumers more than A$80,000 (US$61,580) in 2015. It is unclear what the reputational cost has been and whether falling consumer confidence in the company is linked to this proliferation in scams. But Lyons says that it was AusPost’s status as “one of Australia’s most trusted brands” that made it a desirable target in the first place. “People are familiar with our emails and will at times be expecting them, which could make them more susceptible to opening a fake email,” she adds.

The US Postal Service (USPS) has frequently found its brand being used in these targeted email attacks, known as spear phishing. “For several years our customers were commonly the target of these sorts of cyber attacks,” comments Greg Crabb, acting chief information security officer and digital solutions vice president at the USPS.

To tackle the problem, the USPS has introduced two sets of email authentication protocols that have “reduced the amount of spam purporting to be from the USPS to near zero”, Crabb explains.

The protocols – known as Sender Policy Framework (SPF) and Domain Key Identified Mail (DKIM) – allow email service providers such as Google and Yahoo to distinguish genuine USPS correspondence from phishing attacks. Crabb adds, “That has helped develop and preserve our email brand in a very measurable way.”

Right: Kristin Lyons, chief information security officer at AusPost

Gaps in security

Despite these efforts the USPS was the victim of a major cybersecurity breach in 2014. In this case hackers didn’t confine themselves merely to appropriating the USPS brand, but successfully attacked the post’s own networks via an attack that compromised the personal information of nearly three million customers and stole the social security numbers of 750,000 former and current employees, according to US media reports at the time.

A follow-up report by the USPS’s watchdog, the Office of the Inspector General (OIG), was highly critical of the postal operator, finding that it lacked “a cybersecurity culture”.

One specific shortcoming the report pointed to was outdated software – half of the software systems tested by the OIG were no longer supported by the manufacturer, which meant that any security vulnerabilities could not be patched up. It also noted an understaffed cybersecurity team and negligible staff training – only about 1% of USPS employees had completed security awareness training, compared with an average of about 80% in the private sector.

More worryingly, when the OIG launched fake phishing attacks as part of its audit months after the original breach, it found that a quarter of staff still fell for the emails. “Information security awareness training is critical to ensuring that employees are equipped with the knowledge to identify and report phishing emails,” says Kimberly Benoit, the OIG’s deputy assistant inspector general for technology. “As a result, we recommended that management update training requirements to require all employees with network access to complete annual information security awareness training.”

Start with the basics

Creating a successful cybersecurity apparatus “often means doing the dull things right”, says Rob Pritchard, founder of the Cyber Security Expert, a web-based consultancy. He explains, “It means managing your assets so that you know what software is out of date and where your vulnerabilities are – this is not a trivial task for a large enterprise.”

In response to the OIG’s findings, the USPS initiated a comprehensive training program called Cyber Safe that has provided security awareness training to 200,000 staff and contractors that have computer access within the organization. As part of Cyber Safe, staff performance is continuously monitored through monthly fake phishing attacks.

“Every month we test 10,000 of our staff, and employees’ click rates have reduced dramatically,” says Crabb. “Whenever an employee takes the bait we provide remedial training and retest them afterward.”

As well as these measures, the USPS recently launched a consumer-facing campaign on its website to educate customers about potential cyberattacks.

Australia Post has also tried to promote public awareness about cybersecurity, using its website and social media strands to inform customers about the ransomware scams and provide practical advice to victims. “We believe it is our social obligation to keep our customers informed when these scams happen, so that they can take the required action to protect themselves,” says Lyons.

Left: Greg Crabb, acting chief information security officer and digital solutions vice president, the USPS

Types of attacks

Another key factor in tackling cyberthreats is understanding where they come from. Crabb says that the USPS deals with three main varieties of hackers: socially motivated hackers like members of the hacking collective Anonymous; criminal hackers whose motivation is solely financial; and hackers operating on behalf of a nation state.

“Socially motivated hackers,” he says, “usually favor denial-of-service (DoS) attacks, in which the targeted network is flooded with multiple requests in an attempt to overload the system.” The USPS has controls that protect it from DoS attacks.

“The most sophisticated attacks are usually those launched by nation states,” Crabb continues. “They require that we implement a layered set of controls, assuming that the adversary may be able to completely circumvent certain security controls of our tool providers,” says Crabb. “You can’t rely on only one or even two sets of tools when you’re dealing with a nation state actor.”

Media reports following the 2014 breach speculated that it may have come from China. The USPS has never confirmed its origin – it is still the subject of an FBI investigation – but Pritchard warns against attributing these large-scale hacks to nation states, contending that the motive is “more often financial”.

He points to the massive hack of US bank JPMorgan Chase in 2014, in which data on more than 80 million customers was stolen. One of the largest data breaches in history, the hack happened to coincide with the escalating conflict in eastern Ukraine between the government and pro-Russian separatists.

“There were lots of rumors at the time that it was Russian reprisals for the West’s involvement in Ukraine,” says Pritchard. “But it turned out to be some people running a pump-and-dump scam – a financial fraud that involves artificially inflating the price of stocks – and they were using the hacked customer details simply as a database.”

Protecting data

In order to protect customer data from attacks like the JPMorgan Chase hack, the USPS has trained staff to encrypt sensitive data, like credit card numbers, and to avoid storing it on hard drives. But a balance has to be struck, according to Crabb, “between privacy and security, and making the systems robust and available”.

He gives the example of the USPS change of address management system. Since 20% of the US population moves each year, the mailing community needs to be able to follow consumers. To facilitate this, the USPS has designed a system that allows sharing of change of address information “in a very privacy-enhanced way”, say Crabb.

“We don’t provide mail service providers with a database of names and addresses. Instead we encrypt that information and require that senders know the recipient’s name before they can get the new address. I consider that change of address system a national treasure.”

Right: Members of the USPS’s CyberSafe initiative passing out materials to attendees at the Cybersecurity Awareness Fair on October 11, 2016

The threat within

As well as the threat posed by hostile actors, posts must also contend with insider threats. To this end, the USPS uses a data-loss prevention tool that stops staff from using thumb drives or other removable media to take sensitive data out of its networks.

Pritchard, however, believes that technological solutions will only get you so far and that “it’s more an issue of personal management. You have to ask yourself: Are you correctly vetting staff and dealing with disgruntled employees so that it doesn’t get

to the point where someone walks out of the door with a lot of sensitive data?”

Pritchard is skeptical about the existing insider threat detection software that is meant to pick up on unusual user behavior: “It tends to generate a lot of false positives, so it requires very competent operators to monitor it, who know the system well and can drill through what they’re seeing and pick out the genuine anomalies. In the end it still comes down to having good personnel.”

To read the full version of the article in the January 2017 issue of Postal Technology International, click here.

Article by Paul Willis

December 2, 2016

Share. Twitter LinkedIn Facebook Email
Previous ArticleFuture view
Next Article Postal revenue increases by 1.5% for first half of 2016

Related Posts

Features

FEATURE: Overcoming cross-border e-commerce customs challenges

May 14, 202514 Mins Read
Features

EXCLUSIVE INTERVIEW: Egypt Post

May 1, 202511 Mins Read
Features

FEATURE: Improving reverse logistics with better data and collaboration

April 15, 202514 Mins Read

Receive breaking stories and features in your inbox each week, for free


Enter your email address:


Latest News

Yeep! rolls out 1,000th locker in the UK

June 13, 2025

Sameday acquires private courier Cargus

June 13, 2025

THG Fulfil to increase sorting capacity with 430 Libiao robots

June 12, 2025
Getting in Touch
  • Contact Us / Advertiser
  • Meet the Editors
  • Download Media Pack
  • Breaking News Emails
Our Social Channels
  • Facebook
  • LinkedIn
Supplier Spotlights
  • Prime Vision B.V.
  • Cookie Policy
  • Privacy Policy
  • Terms & Conditions
  • Notice & Takedown Policy
  • Site FAQs
© 2025 UKi Media & Events a division of UKIP Media & Events Ltd

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.

CookieDurationDescription
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Advertisement" category.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Analytics" category.
cookielawinfo-checkbox-functional1 yearThe GDPR Cookie Consent plugin sets the cookie to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Necessary" category.
cookielawinfo-checkbox-others1 yearSet by the GDPR Cookie Consent plugin, this cookie stores user consent for cookies in the category "Others".
cookielawinfo-checkbox-performance1 yearSet by the GDPR Cookie Consent plugin, this cookie stores the user consent for cookies in the category "Performance".
elementorneverThe website's WordPress theme uses this cookie. It allows the website owner to implement or change the website's content in real-time.
JSESSIONIDsessionNew Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

CookieDurationDescription
__cf_bm30 minutesCloudflare set the cookie to support Cloudflare Bot Management.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

CookieDurationDescription
CONSENT2 yearsYouTube sets this cookie via embedded YouTube videos and registers anonymous statistical data.
uidsessionThis is a Google UserID cookie that tracks users across various website segments.
vuid1 year 1 month 4 daysVimeo installs this cookie to collect tracking information by setting a unique ID to embed videos on the website.
_ga1 year 1 month 4 daysGoogle Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors.
_ga_*1 year 1 month 4 daysGoogle Analytics sets this cookie to store and count page views.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

CookieDurationDescription
OAGEOsessionOpenX sets this cookie to avoid the repeated display of the same ad.
OAID1 yearCookie set to record whether the user has opted out of the collection of information by the AdsWizz Service Cookies.
VISITOR_INFO1_LIVE5 months 27 daysYouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface.
YSCsessionYoutube sets this cookie to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt-remote-device-idneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt.innertube::nextIdneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requestsneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

CookieDurationDescription
VISITOR_PRIVACY_METADATA5 months 27 daysDescription is currently not available.

SAVE & ACCEPT
Powered by