【24h】

Business E-mail Compromise — Techniques and Countermeasures

机译:商业电子邮件妥协 - 技术和对策

获取原文

摘要

Business Email Compromise (BEC) is a method through which the attacker defrauds the organization and all its stake holders by the use of the business email that the employees carelessly use in public domain. This paper discusses about Business Email Compromise (BEC) that can be identified and categorized into five broad categories which are, CEO Fraud, Bogus Invoice Scheme, Account Compromise, Lawyer/Attorney Impersonation, and Data Theft. The research majorly focuses on finding the techniques used for BEC, detection techniques that could be used for taking the corrective measures against the attack and finding the possible countermeasures for preventing the BEC attack. The major techniques used by attackers and criminals for performing a BEC attack are usually Credential- grabbing and Email-only Method. Credential-grabbing techniques include techniques like phishing-related techniques and malware-related techniques. Phishing-related techniques can include compromise using various methods like from Direct Links, PDF Files, HTML or File-hosting services. Detection of such attacks can be done by various methods, such as Impersonation classifier, content classifier, text classifier, link classifier, classifier algorithm. There is BEC-Guard that can be installed in order to track these methods. Name and nickname matching is a method where in order to detect name spoofing, the impersonation classifier needs to match the sender name with a name of an employee. Countermeasures are the best possible way to prevent the BEC attack in the first place and the best defense for countermeasure is a well-informed workforce. Majorly, the countermeasures used includes, training and awareness programs, Phishing attack trainings, using of SPF, DKIM, DMARC anti-spoofing and email authentication techniques.
机译:商业电子邮件妥协(BEC)是攻击者通过使用员工在公共领域不小心使用的商业电子邮件来欺骗组织和所有股权持有人的方法。本文讨论了商业电子邮件损害(BEC),可以被识别和分为五大类,即首席执行官欺诈,虚假发票计划,账户妥协,律师/律师冒充和数据盗窃。该研究主要侧重于寻找用于BEC的技术,可用于采取攻击攻击的纠正措施的检测技术,找到防止BEC攻击的可能对策。攻击者和犯罪分子用于执行BEC攻击的主要技术通常是凭据抓取和仅电子邮件的方法。凭证抓取技术包括与网络钓鱼相关技术和与恶意软件相关技术等技术。网络钓鱼相关的技术可以包括使用从直接链接,PDF文件,HTML或文件托管服务中使用各种方法的妥协。可以通过各种方法检测这种攻击,例如模拟分类器,内容分类器,文本分类器,链接分类器,分类器算法。可以安装可以安装的守卫,以跟踪这些方法。名称和昵称匹配是一种方法,其中才能检测名称欺骗,模拟分类器需要将发件人名称与员工的名称匹配。对策是防止BEC攻击首先攻击的最佳方法,最佳防御对策是一个知情的劳动力。主要是,使用的对策包括,培训和意识计划,网络钓鱼攻击培训,使用SPF,DKIM,DMARC防欺骗和电子邮件认证技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号