• Latest
  • Trending
What the FBI Hoax Blast Reveals About Email Deception

What the FBI Hoax Blast Reveals About Email Deception

November 24, 2021
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 30 January, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

What the FBI Hoax Blast Reveals About Email Deception

by ITECHNEWS
November 24, 2021
in Opinion
0 0
0
What the FBI Hoax Blast Reveals About Email Deception

In today’s digital world, distinguishing between friend and foe has never been more challenging. For example, imagine that you receive an email from a legitimate FBI address and server warning of an imminent threat to your infrastructure – would your first impulse be to assume the FBI sender was really a hacker? Probably not.

Over 100,000 recent email recipients had to address this exact question when they received an email blast from ‘eims@ic.fbi.gov,’ which corresponds to the FBI’s Criminal Justice Information Services. The email came from a legitimate FBI server, so it slipped right past legacy email security tools and successfully reached inboxes, justifiably alarming recipients. 

YOU MAY ALSO LIKE

Making Biometrics Work: 3 Ways To Jumpstart the Process

How to prevent cyberbullying: Keeping students safe

But the email was not sent by the FBI. Instead, it was reportedly sent by a hacker with the apparent intention to damage a security researcher’s reputation, falsely identifying him in the message as a threat actor.

Compromised Supply Chain Email… the Scariest Spearphish 

One of the most sophisticated email attack types is hijacking a trusted third-party account to position it as a genuine and validated contact. This technique is scary, as attackers specifically target an organization and an individual from a trusted and vetted contact, taking digital deception to another level – easily deceiving the human victim and slipping past legacy email security technologies. 

In this case, these emails came from a trusted FBI email server, not a spoofed FBI email address, with the threat actor abusing a coding error on an FBI website to blast out the hoax message. Despite cyber-hygiene, a traditional email gateway in place and anti-phishing training, the reality is that it is becoming an almost impossible human task to distinguish a legitimate domain versus a malicious one, particularly when a trusted supplier or partner was spoofed.

In essence, attackers today are forcing organizations to choose between blindly trusting their suppliers or potentially risking business disruption. This security challenge is simply no longer a human-scale problem, and businesses must rely on advanced and innovative technologies to protect their digital environments as targeted attacks increase in number, scale and complexity.

In one similar instance, Darktrace discovered an attack in which several trusted suppliers performed account hijacking and used these compromised credentials to send tailored phishing emails to the target company. These emails appeared to contain file storage links to RFP documents from trusted partners but were actually a means of further Microsoft 365 credential harvesting. Because this organization had Darktrace autonomous response for email, Antigena Email (AGE), in passive mode, attackers were able to use this malicious email to successfully compromise an internal account, elicit sensitive information from that account and pivot to using the credentials to send out further malicious emails across the business.

Self-Learning AI: Understanding the Communications, Context and Behaviors  

Rather than an approach that looks at historical attacks and categorizes email addresses into binary lists of ‘good’ and ‘bad,’ organizations should adopt security approaches that can review myriad aspects of the email. It should do this from the details of the message’s content to a rich understanding of the typical communication habits of senders and recipients to determine what should and should not reach recipients’ inboxes. Today’s security tools need to understand businesses communications, context and behaviors to combat sophisticated and socially engineered attacks. 

Organizations cannot rely on education or traditional email security tools that only stop human-observable anomalies or known historical threats. Today’s security tools need to understand businesses communications, context and behaviors to combat sophisticated email attacks. Fortunately, even if these emails come from legitimate addresses from authoritative government agencies like the FBI, self-learning AI can autonomously assess many factors, including subtle deviations in language, to sniff out when something is not quite right. 

Marcus Fowler Director of Strategic Threat , Darktrace | infosecurity-magazine.com

ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version