10202221 - Master - Cyber Pandemic Training Book.pdf

Types of Attacks - Business Email Compromise

Business Email Compromise

Ransomware

Vendor/Supply Chain Attacks

How They Work

Spoof email account or domain

• "Spearphishing “ or Use of Malware to gain email account info.

• IE: John.Kelly@mail.com vs John.KelIy@maiI.com

Gather intel, groom their target

• Conduct fraudulent transaction or legitimate transaction with false credentials

• Wire transfer of funds through various accounts overseas

• Primarily Nigerian and eastern-European organized crime. Also used to fund and gather intel for nation-state groups.

Page 6

Made with FlippingBook - Online catalogs