Главная
Study mode:
on
1
Introduction
2
How many of you like me
3
BEC attack example
4
BEC attack definition
5
How in the world is it
6
How banks can help
7
What can we do
8
What actually happens
9
What happens to your data
10
An anonymized list
11
Verifying email addresses
12
Generating targets
13
Vendor email compromise
14
The gray zone
15
What we were able to do
16
Over some period of time
17
Putting it all together
18
Why this is such a big problem
19
Deep Dives
20
Questions
21
OASIS
22
Vendor Compromise
23
Identifying Fraudulent Transactions
24
Authentication of Customers
25
Romance Scam
26
Reporting Fresh Accounts
27
Vendor Email Accounts
28
How Many Mules
29
Mule Accounts
30
API
31
API Automation
32
Gift Card Vector
33
Payroll Diversion
34
Thank you
Description:
Explore trends in business email compromise (BEC) and learn how the financial service industry combats this $26 billion problem in this 50-minute RSA Conference talk. Gain insights into BEC criminal gangs' tactics, techniques, and procedures, as well as BEC intelligence gathering and disruption methods. Discover FS-ISAC's groundbreaking fraud intelligence sharing initiatives. Delve into topics such as BEC attack examples and definitions, the role of banks in prevention, data handling in attacks, email address verification, vendor email compromise, and the challenges of operating in the "gray zone." Examine deep dives into OASIS, vendor compromise, fraudulent transaction identification, customer authentication, romance scams, fresh account reporting, mule accounts, API automation, gift card vectors, and payroll diversion.

Disrupting BEC Attacks Utilizing Kill Chain

RSA Conference
Add to list