BetaNews reported:
According to the FBI, business email compromise, also known as email account compromise, is one of the most financially damaging online crimes. It’s also easy. Hackers send an email message that appears to come from a known source making a legitimate request. From there, the scam happens. But now, many employees are smart enough to see through this scam thanks to various news headlines and some employee training.
Unfortunately, hackers are taking business email compromise a step further now, gaining access to an actual email inbox and learning the way a person conducts themselves when sending an email, effectively learning how to imitate their potential victims. Also known as socially engineering, this enables them to paint an even stronger picture so the scam is successful. When hackers gain access to your email, it means that outsiders have now become insiders -- and organizations need to understand their insiders. The recent Microsoft attack offers a real-world example of how nation-state actors are leveraging this tactic to outsmart and weaponize non-malicious insiders.
According to the FBI, business email compromise, also known as email account compromise, is one of the most financially damaging online crimes. It’s also easy. Hackers send an email message that appears to come from a known source making a legitimate request. From there, the scam happens. But now, many employees are smart enough to see through this scam thanks to various news headlines and some employee training.
Unfortunately, hackers are taking business email compromise a step further now, gaining access to an actual email inbox and learning the way a person conducts themselves when sending an email, effectively learning how to imitate their potential victims. Also known as socially engineering, this enables them to paint an even stronger picture so the scam is successful. When hackers gain access to your email, it means that outsiders have now become insiders -- and organizations need to understand their insiders. The recent Microsoft attack offers a real-world example of how nation-state actors are leveraging this tactic to outsmart and weaponize non-malicious insiders.
Find the original article here.
Enroll in Training Sessions: Last Thursday of Every Month is Training on Frauds and New Scam Alerts and How to Combat
Enroll in Training Sessions: Last Thursday of Every Month is Training on Frauds and New Scam Alerts and How to Combat
