1
Learn more at FireEye.com/email 1 Radicati Group Email Statistics Report, 2015-2019. 2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/ 3 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.” 4 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.” 5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014. © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. Protect your people, data and assets with FireEye email security Reduces business risk of unauthorized access Saves operational costs Deploys in minutes with no physical infrastructure THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT FINANCIAL REMEDIATION REPUTATION $4 MILLION 3 82 to contain a breach average cost of brand damage due to advanced persistent threats $9.4 MILLION 5 DAYS 4 FIREEYE EMAIL SECURITY: Better protection from email-borne attacks Industry-leading detection of, and protection from, targeted threats such as ransomware to safeguard business assets Real-time, automated protection from spear-phishing and other socially engineered attacks to minimize impostor ‘calls-to-action’ Flexible deployment models to support cloud, on-premise and hybrid email environments Always up-to-date protection; no upgrades needed Comprehensive, contextual threat intelligence to provide your security team the information it needs to respond to threats Protection from hard-to-detect multi-vector, multi-flow attacks Attackers typically target However, attackers are beginning to focus on information that allows them to go after physical assets. INTELLECTUAL PROPERTY FINANCIAL DATA HIGH-VALUE PEOPLE 215 BILLION THERE ARE APPROXIMATELY EMAILS SENT EVERY DAY 1 2 3 SPAM 2 Nearly emails are of every The attacker targets a global shipping company and identifies an IT manager inside — learning about them through social media. An email is crafted to appear like it’s from the IT manager’s boss, recommending a critical software update. The IT manager, assuming the email is real, clicks on a link embedded in the email to install the software update. Malware is downloaded from the attacker’s server and infects the IT manager’s machine. Passcodes that control the shipping company’s closed circuit television network are exfiltrated. The attacker disables the closed-circuit television cameras, steals the containers and flees the scene. RECON SOCIAL ENGINEERING SPEAR PHISHING INFECTION EXFILTRATION MISSION ACCOMPLISHED How attackers steal shipping containers with a single spear-phishing email AN UNEXPECTED TARGET SECURITY GAP TARGETED BY ATTACKERS EMAIL THE FIRST

AN UNEXPECTED TARGET - FireEye€¦ · damage due to advanced persistent threats $9.4 MILLION 5 DAYS4 FIREEYE EMAIL SECURITY: Better protection from email-borne attacks Industry-leading

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: AN UNEXPECTED TARGET - FireEye€¦ · damage due to advanced persistent threats $9.4 MILLION 5 DAYS4 FIREEYE EMAIL SECURITY: Better protection from email-borne attacks Industry-leading

Learn more at FireEye.com/email1 Radicati Group Email Statistics Report, 2015-2019.

2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/

3 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.”

4 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.”

5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014.

© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Protect your people, data and assets with FireEye email security

Reduces business risk of unauthorized access

Saves operational costs Deploys in minutes with no physical infrastructure

THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT

FINANCIAL

REMEDIATION

REPUTATION

$4MILLION3

82to containa breach

average cost of brand damage due to advanced persistent threats

$9.4MILLION5

DAYS4

F I R E E Y E E M A I L S E C U R I T Y : Better protection from email-borne attacks

Industry-leading detection of, and protection from, targeted threats such as ransomware to

safeguard business assets

Real-time, automated protection from spear-phishing and other socially engineered attacks to

minimize impostor ‘calls-to-action’

Flexible deployment models to support cloud, on-premise and

hybrid email environments

Always up-to-date protection; no upgrades needed

Comprehensive, contextual threat intelligence to provide your

security team the information it needs to respond to threats

Protection from hard-to-detect multi-vector, multi-flow attacks

Attackers typical ly target

However, attackers are beginning to focus oninformation that allows them to go after physical assets.

I N T EL L ECT UA L PR O PER T YFINANCIAL DATAHIGH-VALUE PEOPLE

215 BILLIONT H E R E A R E A P P R OX I M AT E LY

E M A I L S S E N T E V E R Y D AY 1

2 3 SPAM 2

Nearly emails areof every

The attacker targets a global shipping company and identifies an IT manager inside — learning

about them through social media.

An email is crafted to appear like it’s from the IT manager’s boss, recommending a critical

software update.

The IT manager, assuming the email is real, clicks on a link embedded in the email toinstall the software update.

Malware is downloaded from the attacker’s server and infects the

IT manager’s machine.

Passcodes that control the shipping company’s closed circuit television network are exfiltrated.

The attacker disables the closed-circuit television cameras, steals the

containers and flees the scene.

RECON SOCIAL ENGINEERING SPEAR PHISHING

INFECTION EXFILTRATION MISSION ACCOMPLISHED

How attackers steal shipping containers with a single spear-phishing email

A N U N E X P E C T E D TA R G E T

SECURITY GAP TARGETED BY ATTACKERSEMAIL THE FIRST