Looking a Gift Card Horse in the Mouth
Listen now
Description
Is it just me, or do you also miss the good ole days of fraudulent activity? You remember the kind I’m talking about, the emails from princes around the world asking for just a couple hundred dollars to help them unfreeze or retrieve their massive fortune which they would share with you. Attacks have grown more nuanced, complex, and invasive since then, but because of the unbelievable talent at Microsoft, we’re constantly getting better at defending against it.   On this episode of Security Unlocked, hosts Nic Fillingham and Natalia Godyla sit down with returning champion, Emily Hacker, to discuss Business Email Compromise (BEC), an attack that has perpetrators pretending to be someone from the victim’s place of work and instructs them to purchase gift cards and send them to the scammer. Maybe it’s good to look a gift card horse in the mouth?     In This Episode You Will Learn:   Why BEC is such an effective and pervasive attack  What are the key things to look out for to protect yourself against one  Why BEC emails are difficult to track    Some Questions We Ask:   How do the attackers mimic a true-to-form email from a colleague?  Why do we classify this type of email attack separately from others?  Why are they asking for gift cards rather than cash?    Resources:   Emily Hacker’s LinkedIn FBI’s 2020 Internet Crime Report Microsoft Security Blog Nic’s LinkedIn Natalia’s LinkedIn    Related: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked: CISO Series with Bret Arsenault  Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. 
More Episodes
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22