Types of Attacks - Business Email Compromise
Business Email Compromise
Ransomware
Vendor/Supply Chain Attacks
•
How They Work
•
Spoof email account or domain
• "Spearphishing “ or Use of Malware to gain email account info.
• IE: John.Kelly@mail.com vs John.KelIy@maiI.com
•
Gather intel, groom their target
• Conduct fraudulent transaction or legitimate transaction with false credentials
• Wire transfer of funds through various accounts overseas
• Primarily Nigerian and eastern-European organized crime. Also used to fund and gather intel for nation-state groups.
Page 6
Made with FlippingBook - Online catalogs