<img height="1" width="1" style="display:none" src="https://q.quora.com/_/ad/1fa075f6a9144556974dd51ae0b653c7/pixel?tag=ViewContent&amp;noscript=1">
All Posts

Anatomy of Attack - Attack Vectors

Trent: Hi there welcome back to TechScoop, thanks for joining us now today I am joined by a very very special guest, Ryan Economos from Mimecast. Thanks for joining me Ryan.

Ryan: thanks Trent, good to be here.

Trent: Now can you just tell us a little bit about Mimecast and what you guys get up to over there?

Ryan: Yeah, absolutely so Mimecast is a vendor that focuses on resiliency for email, which is all around providing protection at the gateway, but also ensuring that you’ve got durability of your system so you can continue to operate in the event of unexpected downtime and you’ve got a platform to automate recovery and that’s really important because today email remains the #1 attack vector with over 91% of attacks starting with email.

Trent: So, what I want to talk about today is the anatomy of an attack. Now when you said that email is one of the primary attack vectors or the main one can you break that up into further attack vectors so we can understand it a little bit more.

Ryan: Sure, there’s a lot of attack vectors out there but I generally break them down into two key categories. One’s the shotgun approach to phishing or attacks, where an attacker has a large degree of anonymity they don’t particularly care about targeting any one individual. They just want to spread the attack as wide as possible, so it’s very much that shotgun approach. Some of the common examples may include the likes of your postal tracking emails where it provokes you to click on a link. Or an overdue amount on your electricity bills they typically use emotive or language that generates a sense of urgency which promotes a click on that link.

Trent: The opposite of that I suppose

Ryan: Of course, and there was two so we definitely need to go through the second one. The second one very much focuses on the more sniper rifle approach to phishing where it’s far more targeted, the attacker will spend a lot more time investigating who it is they’re going to attack as well as who are they going to potentially impersonate. Generally you want to make sure that this is as targeted as possible and the best way to get an action out of an employee is to impersonate someone with a high degree of seniority within a business. Think along the lines of your CEO, your CFO we’re seeing impersonation attacks asking for money to be transferred or it might be looking for intellectual property about the organisation to be disclosed. We’ve even started to see that evolve now to not just be impersonation of internal people, but impersonation of contractors that an organisation works with. So again that sort of evolution.

Trent: So the main difference that I’m getting is that the shotgun approach is just for everyone. They’re using that type of language to evoke emotions and get someone to click, download something, take some kind of action where as the sniper rifle approach is very targeted towards an individual. So the language would be completely different. It would try and mimic someone, like a CEO or someone of seniority.

Ryan: Correct

Trent: Thanks for that Ryan really appreciate it, I appreciate your time. Now next time I just want to talk about the actual process of how an attack unfolds. So from this shotgun sniper rifle into next steps of what’s going on.

Thanks for watching.

Related Posts

5 Reasons Your Disaster Recovery Plan Will Fail

A Disaster Recovery Plan is like an insurance policy. It’s the thing you never hope to need, but are thankful to have when you do. If accidentally putting your phone through the wash feels like a chilly Spring breeze, suffering an organisation–wide operations failure would be a category 5 tornado in the dead of winter. That insurance with the help of IT Managed Services would come in handy, wouldn’t it? For something so critical to maintaining the function and security of a business, you’d be surprised just how many don’t take disaster recovery seriously. You might even be one of them. And you’re not alone. 40% of all businesses rate their organisation’s ability to swiftly recover operations after a disaster as fair to poor, and 3 out of 4 businesses receive a fail grading for DR strategy. Ironically, 95% of businesses experience system failures due to incidents unrelated to natural disasters. These operational disasters account for 45% of all system disasters, with natural disasters and human error accounting for 35% and 19%. And then there’s that 1% of freak, what the hell just happened?!?! occurrences. So if the chance of suffering some kind of system disaster is so high, why aren’t more businesses investing in an effective DRP? Think you’ve got DR covered on your own? Here are 5 reasons your disaster recovery plan will fail.

Techware Rebranded

We’ve been working hard on this project and are extremely proud to be revealing our refreshed branding in 2019!

Anatomy of Attack - What a successful attack looks like

Trent: Welcome back to TechScoop, thankyou for joining us now today I am joined by an exceptionally special guest Mr Ryan Economos from Mimecast. Thanks for joiing us Ryan, good to see you again.