03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ATO Detection<br />

Account takeover benefits from the account’s credibility and history with their own company and external<br />

organizations that they do business with. A fraudster who has access to an account can cause<br />

tremendous damage.<br />

Why is this difficult to detect?<br />

• With ATO, the email is coming straight from the vendor’s IP and the actual sender’s mailbox.<br />

• The attacker will read the email communications, and wait <strong>for</strong> the perfect time to inject a message<br />

<strong>for</strong> fund transfer. He will usually reply back with a signature that’s identical to the vendor’s and<br />

will ask <strong>for</strong> you to transfer money to other bank accounts.<br />

Blacklisting email security vendor IP addresses<br />

Hackers blacklist email security vendors’ IP addresses. They create phishing websites, being aware that<br />

their target is highly <strong>for</strong>tified, and they assume email security solutions will scan their website be<strong>for</strong>e it<br />

will reach the end user.<br />

Why is this difficult to detect?<br />

By fingerprinting the different email security solutions, a hacker can understand what the IP addresses<br />

are of the email security provider services. Once fingerprinted, they can easily blacklist that IP.<br />

Recommendations<br />

1) When selecting an email security solution, an organization should consider a service that identifies<br />

all threats be<strong>for</strong>e they arrive in a user’s inbox. The ideal solution should provide various detection<br />

layers to identify advanced phishing attacks as well as ATO, malware, 0-days and more.<br />

Look <strong>for</strong> services that:<br />

• Dynamically scan 100% of emails and their embedded content be<strong>for</strong>e they arrive to the user’s<br />

inbox without affecting user experience<br />

• Use technology to deterministically provide verdicts on malware and not rely on behavioral<br />

analysis<br />

• Leverage image analysis Image recognition of URLs<br />

• Can detect account takeover detection<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 117<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!