an unexpected target - fireeye€¦ · damage due to advanced persistent threats $9.4 million 5...
Post on 14-Jul-2020
13 Views
Preview:
TRANSCRIPT
Learn more at FireEye.com/email1 Radicati Group Email Statistics Report, 2015-2019.
2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/
3 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.”
4 Ponemon Institute LLC (June 2016). “2016 Cost of Data Breach Study: Global Analysis.”
5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014.
© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Protect your people, data and assets with FireEye email security
Reduces business risk of unauthorized access
Saves operational costs Deploys in minutes with no physical infrastructure
THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT
FINANCIAL
REMEDIATION
REPUTATION
$4MILLION3
82to containa breach
average cost of brand damage due to advanced persistent threats
$9.4MILLION5
DAYS4
F I R E E Y E E M A I L S E C U R I T Y : Better protection from email-borne attacks
Industry-leading detection of, and protection from, targeted threats such as ransomware to
safeguard business assets
Real-time, automated protection from spear-phishing and other socially engineered attacks to
minimize impostor ‘calls-to-action’
Flexible deployment models to support cloud, on-premise and
hybrid email environments
Always up-to-date protection; no upgrades needed
Comprehensive, contextual threat intelligence to provide your
security team the information it needs to respond to threats
Protection from hard-to-detect multi-vector, multi-flow attacks
Attackers typical ly target
However, attackers are beginning to focus oninformation that allows them to go after physical assets.
I N T EL L ECT UA L PR O PER T YFINANCIAL DATAHIGH-VALUE PEOPLE
215 BILLIONT H E R E A R E A P P R OX I M AT E LY
E M A I L S S E N T E V E R Y D AY 1
2 3 SPAM 2
Nearly emails areof every
The attacker targets a global shipping company and identifies an IT manager inside — learning
about them through social media.
An email is crafted to appear like it’s from the IT manager’s boss, recommending a critical
software update.
The IT manager, assuming the email is real, clicks on a link embedded in the email toinstall the software update.
Malware is downloaded from the attacker’s server and infects the
IT manager’s machine.
Passcodes that control the shipping company’s closed circuit television network are exfiltrated.
The attacker disables the closed-circuit television cameras, steals the
containers and flees the scene.
RECON SOCIAL ENGINEERING SPEAR PHISHING
INFECTION EXFILTRATION MISSION ACCOMPLISHED
How attackers steal shipping containers with a single spear-phishing email
A N U N E X P E C T E D TA R G E T
SECURITY GAP TARGETED BY ATTACKERSEMAIL THE FIRST
top related