According to the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) have caused $12 billion in losses since October 2013.1 These scams target businesses and individuals performing wire transfer payments, using social engineering and intrusion techniques to gain access to business email accounts. With financially-sensitive information constantly owing through company emails, these inboxes are lucrative targets for attackers. In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.
Error - something went wrong!
SANS DFIR Cyber Threat Intelligence Summit 2019 – Extracting More Value from Your CTI Program
We were fortunate to attend the 2019 SANS DFIR Cyber Threat Intelligence Summit this year, which brings tog...
Other content in this Stream
Too Much Information: The Sequel | New Research
There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.
Digital Shadows Photon Research Team
Photon is Digital Shadows’ external facing security research team, comprised of security researchers, security practitioners and intelligence analysts. Photon is dedicated to researching trends in the
The CyberWire Daily Podcast: Too Much Information: The Sequel
Tamika Smith speaks with Harrison Van Riper from Digital Shadows aboutour recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.
Leaky SMB File Shares – So Many Bytes!
Everyone loves a sequel. If you’re an avid Marvel fan, you’re probably sitting on the edge of your seat waiting ...
Google Calendar Phishing, Exim Email Server Vulnerability, and Diversity in Cybersecurity
This week Alex and Jamie (@TheCollierJam) chat with Harrison (@pseudohvr) on a cyber-threat campaign involving the abuse of legitimate features in Google Calendar. Then they dive into other...
FBI IC3: Cybercrime Surges in 2018, Causing $2.7 Billion in Losses
This week, the Federal Bureau of Investigation released its 2018 Internet Crime Complaints Center (IC3). In 2018, the IC3 responded ...
Predator: Modeling the attacker’s mindset
Author: Richard Gold The phrases “attacker’s mindset” or “think like an attacker” are often used in cyber security to encourage ...
Dark Web Typosquatting: Scammers v. Tor
Time and time again, we see how the cybercriminal ecosystem often mirrors what happens in the business world. This can ...
A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure
Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.
Easing into the extortion game
One of the main ideas which flowed through Photon’s most recent research report, A Tale of Epic Extortions, was that cyber ...
Cyber Risks and High-frequency Trading: Conversation with an Insider
Research from the Carnegie Endowment for International Peace published this week focused the attention on how financial systems around the ...
Episode 59: Practitioner’s Guide to Email Spoofing
Senior security engineer, Simon Hall joins Rafael Amado to explain how IT teams and defenders can combat email spoofing, one of the most popular techniques used by phishers. Simon discusses why...
How to Reduce Your Extortion Risks: Avoiding the Shakedown
In this webinar we will cover recent sextortion tactics, thedarkoverlord, and SamSam Group campaigns to demonstrate how the barriers to entry for extortionists are decreasing, and how businesses can r
Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™
Authors: Simon Hall, Isidoros Monogioudis Here at Digital Shadows we perform regular purple team exercises to continually challenge and ...
SamSam But Different: MITRE ATT&CK and the SamSam Group Indictment
In our latest research report, A Tale of Epic Extortions, the Digital Shadows Photon Research Team highlight how cybercriminals abuse our ...
Extortion Exposed: Sextortion, thedarkoverlord, and SamSam
In our most recent research, A Tale of Epic Extortions, the Digital Shadows Photon Research Team approached the topic of ...
Photon Research Team Shines Light On Digital Risks
I’m very excited to announce the launch of the Digital Shadows’ Photon Research Team. We have decided to bolster our ...
SamSam and Mitre ATT&CK
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we ...
Weekly Intelligence Summary: Ep 9