Business Email Compromise: Operation Wire Wire and New Attack Vectors

  Рет қаралды 9,505

RSA Conference

RSA Conference

Күн бұрын

Anne Connell, Cybersecurity Engineer, CMU - SEI - CERT
The FBI (IC3) received 600,000 cybercrime and fraud complaints in 2017 with reported losses in excess of $12.5 Billion, and BEC was the number one cause of loss. This talk will analyze “Operation Wire Wire” to detail how targets are identified, methods for obtaining information, the new attack vectors-beyond impersonation, invoices and social engineering-and offers new defense techniques.Learning Objectives:1: Understand the new attack vectors BEC scammers use.2: Know how the BEC targets are identified and the methods to obtain information.3: Learn how to defend against the new attack vectors of BEC and stop the wire transfer.Pre-Requisites:Understanding basic attack vectors and techniques, leveraging social engineering tactics to identify targets, and a grasp of the cost that BEC has to an organization.

Пікірлер
Insights from NSA’s Cybersecurity Threat Operations Center
45:21
RSA Conference
Рет қаралды 32 М.
Phishing for Funds: Understanding Business Email Compromise
59:45
когда не обедаешь в школе // EVA mash
00:57
EVA mash
Рет қаралды 3,8 МЛН
The Joker wanted to stand at the front, but unexpectedly was beaten up by Officer Rabbit
00:12
4G to 5G Evolution: In-Depth Security Perspective
46:46
RSA Conference
Рет қаралды 24 М.
Business Email Compromise;   Office 365  Making Sense of All the Noise
47:10
SANS Digital Forensics and Incident Response
Рет қаралды 15 М.
How Money Laundering Actually Works | How Crime Works | Insider
22:30
Think Fast, Talk Smart: Communication Techniques
58:20
Stanford Graduate School of Business
Рет қаралды 40 МЛН
Email Header Analysis and Forensic Investigation
22:59
13Cubed
Рет қаралды 148 М.
Business Email Compromise Case Study
15:44
LMG Security
Рет қаралды 427
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 115 М.
The Five Most Dangerous New Attack Techniques and How to Counter Them
44:04
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
51:12
когда не обедаешь в школе // EVA mash
00:57
EVA mash
Рет қаралды 3,8 МЛН