83
© 2017 Agari. All rights reserved. Confidential and Proprietary. The Rising Threat of Email Based Attacks, and How To Counter It October 9, 2017 Markus Jakobsson

The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

The Rising Threat of Email Based Attacks, and How To Counter It

October 9, 2017

Markus Jakobsson

Page 2: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.2

The last fifteen years in one minute

Page 3: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, circa 2004

3

Page 4: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, circa 2004

4

Page 5: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, circa 2004

5

L\

Look for misspellingsLook for poor grammar

Is it not addressed to you?Does it look unprofessional?

Page 6: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, 2016

6

Page 7: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, 2016

7

Hi John

CHANGE PASSWORD

Slick logos

Page 8: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, 2016

8

Hi John

CHANGE PASSWORD

Slick logos

L\

Look for misspellingsLook for poor grammar

Is it not addressed to you?Does it look unprofessional?

L\

Page 9: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, 2016

9

Cyrillic o

Page 10: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Email Identity Deception, 2016

10

Spoofed partially

protected subdomain

Page 11: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.11

The amount of emailin one minute

Page 12: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.12

Wanted email: ~60 million

The amount of emailin one minute

Page 13: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.13

Wanted email: ~60 millionScattershot attacks: ~3000

The amount of emailin one minute

Page 14: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.14

Wanted email: ~60 millionScattershot attacks: ~3000

Targeted enterprise attacks: ~55

The amount of emailin one minute

Page 15: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.15

Targeted enterprise attacks: ~55

The amount of emailin one minute

2370% increase 2015-2016 (FBI/IC3)

Page 16: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedimproved psychologybetter design competenceand a confluence of attack tools

16

$5Bn

Page 17: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

17

Page 18: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

18

16%

“Social Phishing”, Jagatic et al.

Yield of generic attack

16%

Page 19: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

19

16%

“Social Phishing”, Jagatic et al.

16%

Yield of targeted attack

73%

Page 20: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

20

Page 21: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

21

Page 22: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychology

22

Incoming eFax: Elections Outcome Could Be revised [Facts of Elections Fraud]

Page 23: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychology

23

Taylor Fax <[email protected]>

Page 24: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychology

24

PIN CODE: 3209

Page 25: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

25

PhishMe 2016 Enterprise Phishing Susceptibility and Resiliency Report

20.2%

Page 26: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

26

Page 27: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of attack tools

27

Page 28: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of capabilities

28

Page 29: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of capabilities

29

Page 30: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of capabilities

30

Page 31: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Trend: increasing sophistication

greedmore targetingimproved psychologybetter design competenceand a confluence of capabilities

31

Page 32: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.32

Things can (and will)

get worse

Page 33: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

33

1 3 1 4

11

Page 34: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

34

1 3 1 4

11

Page 35: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

35

Page 36: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

36

Page 37: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

37

your spam filter is not tuned correctly

Page 38: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

38

your spam filter is not tuned correctly

look for a message sent by Google

Page 39: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

39

your spam filter is not tuned correctly

look for a message sent by Google

If the message is in your spam folder

Page 40: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

40

your spam filter is not tuned correctly

look for a message sent by Google

If the message is in your spam folder

Make sure to review the alert first

Page 41: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

41

From: [email protected]

Page 42: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

Inbox

42

Spam folder (quarantine)

~0%

~10%

~20%

Page 43: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Why do people look in their spam folders?

43

trust transfer trick(For more details, look for my upcoming paper with

Hossein Siadati, Toan Nguyen, Nasir Memon)

Page 44: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

44

Page 45: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

45

Page 46: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

46

Page 47: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

47

There’s no account associated with this email.

Page 48: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

48

Page 49: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

49

Page 50: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

50

You may need to check your Junk or Spam folder.

Page 51: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

51

Page 52: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

52

Page 53: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

53

Page 54: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

54

Page 55: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

55

[email protected]

Page 56: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

56

[email protected]

Page 57: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

57

[email protected]

Att_Update <[email protected]>

Page 58: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

58

[email protected]

Click here

Page 59: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

How attackers can turn services into opportunity

59

just anothertrust transfer trick

Page 60: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.60

use yourknowledgeagainst you

Another way attackers can

Page 61: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Did you know this?

61

bank checks can bounce

Page 62: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Did you know this?

62

Page 63: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Did you know this?

63

wirescan not

bounce

Page 64: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Attacker does: Victim thinks:

64

Ask victim for wire information

Drop fake checkin night deposit

I will receive money

Money was wired

Page 65: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Attacker does: Victim thinks:

65

Ask victim for wire information

Drop fake checkin night deposit

I will receive money

Money was wired

To sum it up:You may think you were paid. Maybe you were not.

Page 66: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Account Take Over on the rise

66

Page 67: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Account Take Over on the rise

67

Page 68: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.68

Account Take Over on the rise

corrupt

Page 69: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.69

monetize

corrupt

Account Take Over on the rise

Page 70: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.70

corrupt

collect + launch

Account Take Over on the rise

monetize

Page 71: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.71

Understandthensolve

Page 72: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.72

Impostor Authentic

Spoof Look-alike Domain Display Name Deception Account OwnerCompromiseSender

Source Internal External

Classification

Fraud Legitimate Email

URL Attachment

Social Engineering

Unsolicited Email

Grey Mail

Con

TargetedScattershot

SPAM

Destination Internal External

StrangerTrusted partyEmployee webmail

Objective Monetary Data/Credential Theft Denial of Service

First understand the problem – then solve it

Page 73: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.73

Impostor

Spoof Look-alike Domain Display Name Deception CompromiseSender

First understand the problem – then solve it

6%

10% 84%puny

but

exploding

Page 74: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Addressing deceptive display names

1.List of trusted parties.“Bo Bigboss <[email protected]>”

2.Incoming email “Bo BigBoss <[email protected]>”

3.High risk? Warn-and-deliver!“Stranger Danger! <[email protected]>”74

Page 75: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Addressing deceptive display names

1.List of trusted parties.“Bo Bigboss <[email protected]>”

2.Incoming email. “Bo BigBoss <[email protected]>”

3.High risk? Warn-and-deliver!“Stranger Danger! <[email protected]>”75

Page 76: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Addressing deceptive display names

1.List of trusted parties.“Bo Bigboss <[email protected]>”

2.Incoming email. “Bo BigBoss <[email protected]>”

3.High risk? Warn-and-deliver!“Stranger Danger! <[email protected]>”76

Page 77: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.77

Impostor Authentic

Spoof Look-alike Domain Display Name Deception Account OwnerCompromiseSender

Addressing compromised accounts

OriginCompromised device Compromised credentials Compromised API access

Local scriptOAuth

Easiest for the attackersEasiest for the defenders

Page 78: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Addressing compromised accounts

78

Page 79: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Addressing compromised accounts

79

SMS to associated phone number

Proprietary

Page 80: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.80

but filteringis not everything

Page 81: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Our view Attacker’s view

Filtering?keeps us safe

81

Filtering? press pedal harder!

Malicious emails sentrisk: loss/threat

Malicious emails sentopportunity: money

Page 82: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.

Our view Attacker’s view

Filtering?keeps us safe

82

Filtering? press pedal harder!

Malicious emails sentrisk: loss/threat

Malicious emails sentopportunity: moneyrisk: loss/threat opportunity: intelligence

(Look out for upcoming papers, one of which is with Hossein Siadati and Yifan Tian)

Page 83: The Rising Threat of Email Based Attacks, and How To ... · Fraud Legitimate Email URL Attachment Social Engineering Unsolicited Email Grey Mail Con Scattershot Targeted SPAM Destination

© 2017 Agari. All rights reserved. Confidential and Proprietary.83

Want to talk?

[email protected]