EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

Similar documents
EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

Machine-Powered Learning for People-Centered Security

2018 Edition. Security and Compliance for Office 365

with Advanced Protection

Security and Compliance for Office 365

Automated Context and Incident Response

REPORT. proofpoint.com

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

REPORT. Year In Review. proofpoint.com

ybersecurity for the Modern Era Three Steps to Stopping malware, Credential Phishing, Fraud and More

TABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...

Evolution of Spear Phishing. White Paper

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Trustwave SEG Cloud BEC Fraud Detection Basics

The. Guide. Managing Business Compromise and Impostor Threats to Keep Your Organization Protected

THE CLOUD SECURITY CHALLENGE:

2018 Edition. A Practical Guide to Protecting Your Organization. proofpoint.com

Data Privacy in Your Own Backyard

building an effective action plan for the Department of Homeland Security

Proofpoint, Inc.

Phishing: When is the Enemy

WHITEPAPER. Protecting Against Account Takeover Based Attacks

PEOPLE CENTRIC SECURITY THE NEW

BUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST FRAUD

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

An Ounce of Prevention

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Turning the Tide: Fending off Cyber Threats

Longline Phishing: -borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks. A Proofpoint White Paper WHITE PAPER

Security & Phishing

The Mimecast Security Risk Assessment Quarterly Report May 2017

FRAUD DEFENSE: How To Fight The Next Generation of Targeted BEC Attacks

CloudSOC and Security.cloud for Microsoft Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365

Train employees to avoid inadvertent cyber security breaches

Phishing in the Age of SaaS

An Executive s FAQ About Authentication

Are you YOUR COMPANY S DIGITAL FOOTPRINT?

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Sectigo Security Solution

THE ACCENTURE CYBER DEFENSE SOLUTION

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Personal Cybersecurity

Who We Are! Natalie Timpone

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

Protecting from Attack in Office 365

Copyright 2018 Trend Micro Incorporated. All rights reserved.

Symantec Protection Suite Add-On for Hosted Security

THE EVOLUTION OF SIEM

9 Steps to Protect Against Ransomware

Security. The DynaSis Education Series for C-Level Executives

Panda Security 2010 Page 1

Security Protection

FAQ. Usually appear to be sent from official address

One Phish, Two Phish, Three! Building an Active Threat Management Framework for Malicious

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

Power of the Threat Detection Trinity

Cisco Security: Advanced Threat Defense for Microsoft Office 365

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

How to recognize phishing s

How Cyber-Criminals Steal and Profit from your Data

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)

See how proofpoint helps you connect with confidence across all digital channels

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

ELECTRONIC BANKING & ONLINE AUTHENTICATION

6 Ways Office 365 Keeps Your and Business Secure

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

The Dilemma: Junk, Spam, or Phishing? How to Classify Unwanted s and Respond Accordingly

Correlation and Phishing

Webomania Solutions Pvt. Ltd. 2017

Introduction to

IBM Next Generation Intrusion Prevention System

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Security Gaps from the Field

FOR FINANCIAL SERVICES ORGANIZATIONS

Best Practices in Securing a Multicloud World

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

Securing Digital Healthcare:

Make security part of your client systems refresh

Security Using Digital Signatures & Encryption

Protecting Against Account Takeover Based Attacks

Retail Security in a World of Digital Touchpoint Complexity

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

KASPERSKY SECURITY FOR MICROSOFT OFFICE s are sent every second. It only takes one to bring down your business.

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Layer by Layer: Protecting from Attack in Office 365

Go mobile. Stay in control.

IBM Security Network Protection Solutions

Fighting Phishing I: Get phish or die tryin.

Transcription:

EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com

EBOOK Stopping Email Fraud 2 Today s email attacks have evolved. Unfortunately, most security tools haven t evolved with them. Attackers are moving and adapting faster than most cyber defenses. They re bypassing security tools with new techniques and delivery methods. And some are avoiding legacy controls altogether through novel attacks that don t use malware at all. Email fraud, sometimes called business email compromise (BEC), is one of them. Cyber criminals can easily spoof executives and business partners to trick people into sending money and other valuable information. Email fraud has cost victims more than $5.3 billion since the FBI began tracking it in late 2013. The average attack nets about This growing threat has cost victims more than $5.3 billion since the FBI began tracking it in late 2013. 1 The average attack nets about $130,000. 2 Partner spoofing attacks, where a fraudster pretends to be an organization s trusted vendor, is also growing. In just one example, a Lithuanian man is accused of stealing more than $100 million in separate attacks on Google and Facebook in July 2017. 3 The man allegedly spoofed a vendor in the companies supply chains. These attacks are sophisticated and highly targeted. They exploit people, not technology. And stopping them requires a new people-centered approach. Proofpoint Advanced Email Security uses a multilayered defense to stop unsafe email from reaching people s inbox and keep sensitive information in your environment when something goes wrong. $130,000USD A Lithuanian man is accused of stealing more than $100 million in separate attacks on Google and Facebook in July 2017. 1 FBI. Business E-Mail Compromise/E-Mail Account Compromise: The 5 Billion Dollar Scam. May 2017. 2 Ibid. 3 Reuters. Lithuanian court upholds extradition of man to U.S. in $100 million fraud case. August 2017.

EBOOK Stopping Email Fraud 3 Consider how airports manage a vast and changing mix of potential security issues. Most take a two-pronged approach, each of those prongs featuring multiple checks and procedures. At Proofpoint, we take a similar approach to securing your email. This guide explains how our multilayered defense uses identity control and content analysis to protect organizations from email fraud. 1 First, they check the flyer s passport and boarding pass to ensure that the person is authorized to travel and is, indeed, who the person claims to be. We call this identity control. 2 Second, the airport screens the luggage and has the person pass through an X-Ray machine or scanner. This ensures that nothing bad is getting on the plane and that nothing s leaving that shouldn t be. We call this content analysis.

EBOOK Stopping Email Fraud 4 Email fraud can be hard to detect with conventional cyber defenses. That s Due to the nature of email fraud, you need to validate the true identity of the because it is highly targeted, sent in low volumes aimed at specific people or email sender. If you can verify whether the email was sent by who it says it s job roles. These emails don t have a payload. So there s no attachment or URL from and block any impostors you can stop many of these threats outright. for security tools to detect, analyze, and sandbox. The messages are socially engineered to one sole purpose: tricking people into doing something on the attacker s behalf. Jump to Authentication > Jump to Lookalike Domains >

EBOOK Stopping Email Fraud 5 AUTHENTICATION For identity control, we start with email authentication. This step stops attackers who try to hijack your email domain, a technique called domain spoofing. With email authentication, only someone from your company or someone you authorize can send email using your domain. This stops many attacks in their tracks. DMARC authentication allows email senders to indicate that their messages are protected by two popular authentication techniques. And it and tells receivers what to do if neither of those authentication methods passes. Proofpoint helps you implement DMARC authentication quickly and confidently. We give you visibility into all the email coming into and going out of your organization. With this visibility, you can authorize all legitimate senders trying to send email on your behalf and block any malicious email spoofing your trusted domains or those of your suppliers.

EBOOK Stopping Email Fraud 6 LOOKALIKE DOMAINS But even with authentication, it s easy for attackers to register domains that look a lot like yours. This tactic is sometimes called typosquatting. Some lookalike domains may swap out characters, such as the numeral 0 for the letter O, an uppercase I for a lowercase L, or a V for a U. Others might insert additional characters, such as an S at the end of the domain name, that a casual viewer won t easily notice. Still others might use typographs or homographs characters that look just like Latin characters to a human reader but are actually different to a computer. A domain that uses the Cyrillic A, for example, looks the same as one that uses a Latin A. But the Cyrillic version could be registered separately by an email attacker. There are countless combinations fraudsters can use to counterfeit trusted email domains. And unless your organization has registered them all, DMARC alone won t stop them. That s why we also help you find lookalike domains and shut them down before attackers get the chance to use them.

EBOOK Stopping Email Fraud 7 CONTENT ANALYSIS: WHAT S IN THE EMAIL? While domain spoofing and lookalike domains are common tactics used to commit email fraud, fraudsters have other ways of reaching their targets. You need to be able to identify malicious emails that show up at your gateway and block them before they reach your employees. Jump to Dynamic Classification > Jump to Data loss Prevention > With Proofpoint Advanced Email Security, you can stop advanced attacks, mitigate their impact, and keep your business running.

EBOOK Stopping Email Fraud 8 DYNAMIC CLASSIFICATION Beyond authentication and lookalike domain protection, another layer of defense against email fraud attacks is dynamic classification. Dynamic classification analyzes and manages email based on several factors, including: The email s content The sender s reputation The relationship between the sender and recipient We typically look at several factors. Does the email come from a trusted sender and does that sender have a good reputation? Does the email include a suspicious subject? Do the sender and the receiver have an existing email relationship? Does the body of the email look suspicious? DATA LOSS PREVENTION The final layer is data loss prevention, or DLP. If an unsafe message somehow gets through all your other layers and manages to trick someone in your organization, DLP can make sure that no sensitive information leaves your environment. Our smart identifiers detect and analyze email fraud-related content, such as tax records and wire-transfer information. These identifiers work within the email body and across a range of file types, including Microsoft Word, Adobe Acrobat and photo files. We score the email based on its level or riskiness. Then you can decide what to do with it according to that score let it through, block it, or route it to a quarantined folder.

EBOOK Stopping Email Fraud 9 A COMPLETE SOLUTION Today s email threats require complete email protection. That s why our multilayered approach solves your entire email security challenge not just parts of it. With Proofpoint Advanced Email Security, you can stop advanced attacks, mitigate their impact, and keep your business running. With Proofpoint Email Protection, you can configure anti-spoofing policies and classify each email with the Impostor Classifier at the gateway. Proofpoint Email Fraud Defense gives you the visibility, tools, and services to help you implement DMARC authentication quickly and confidently. Proofpoint Domain Discover for Email automates the process of identifying, analyzing, and taking down malicious lookalike domains. Finally, Proofpoint Email Data Loss Prevention helps you understand and act on the sensitive information leaving your environment through email COMPLETE VISIBILITY POLICY AUTHENTICATION CLASSIFICATION LOOKALIKE DOMAIN DISCOVERY ADVANCED DLP

LEARN MORE To learn more about how Proofpoint can help you stop email fraud, visit proofpoint.com/email.

ABOUT PROOFPOINT Proofpoint, Inc. (NASDAQ:PFPT), a next-generation cybersecurity company, enables organizations to protect the way their people work today from advanced threats and compliance risks. Proofpoint helps cybersecurity professionals protect their users from the advanced attacks that target them (via email, mobile apps, and social media), protect the critical information people create, and equip their teams with the right intelligence and tools to respond quickly when things go wrong. Leading organizations of all sizes, including over 50 percent of the Fortune 100, rely on Proofpoint solutions, which are built for today s mobile and social-enabled IT environments and leverage both the power of the cloud and a big-data-driven analytics platform to combat modern advanced threats. Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners. www.proofpoint.com 0118-041