BEC: Homoglyphs, Drop Accounts, and CEO Fraud
Listen now
Description
CCI: Cyber Crime Investigation. Another day, another email attack - something smells “phishy” in the network. *Slowly puts on sunglasses and flips up trench coat collar* Time to go to work.    Just how easy is it for someone to steal your credentials? Because once they’re stolen, and sold for pocket change, it’s open season. Homoglyphs, drop accounts, email forwarding… is it any wonder billions of dollars have been lost to BEC (business email compromise)?   Join hosts Nic Fillingham and Natalia Godyla for a fascinating conversation with Peter Anaman, Director and Principal Investigator of the CELA Digital Crimes Unit, as they unpack the cybercrime section of the Microsoft Digital Defense Report to see what these phishers are up to. Scott Christiansen joins us later in the show to recount his journey to security and his role as an Adjunct Professor for Bellevue University's Master of Science in Cybersecurity, along with some great advice for choosing security as a profession.         In This Episode, You Will Learn:     The difference between consumer and enterprise phishing  The types of people and professions that are usually targeted in cyber attacks   How putting policies on backups and policies to protect the organization in place will help prevent digital crimes  The four categories of the internet: the dark web, the surface web, the deep web, and the vetted web     Some Questions We Ask:    What would an example of credential phishing look like?  What is the end goal for phishers?  How are phishing and business email compromise techniques leveraged during the pandemic?  What patterns are being seen when it comes to credential phishing?  How do you use ML to classify whether a bug is security related or not?       Resources:    Microsoft Digital Defense Report:    https://www.microsoft.com/en-us/security/business/security-intelligence-report      Peter’s LinkedIn  https://www.linkedin.com/in/anamanp/     Scott’s LinkedIn  https://www.linkedin.com/in/scottchristiansen/     Nic’s LinkedIn   https://www.linkedin.com/in/nicfill/      Natalia’s LinkedIn   https://www.linkedin.com/in/nataliagodyla/      Microsoft Security Blog:    https://www.microsoft.com/security/blog/ See acast.com/privacy for privacy and opt-out information.
More Episodes
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22