- SPAM
SPAM, also called junk mail,
consists of sending mail to millions
of addresses, they just need to answer a limited numberof people to be successful.
The addresses collected are sold to other spammers,
There are various forms of e-mail, who commit fraud or fraud or induce users to to reveal personal data as access credentials.- MALWARE
criminals use e-mail to let in in the computer malicious software said malware
Volumetric malware attacks en masse known vulnerabilities ZERO-DAY malware uses vulnerabilities never attacked- EXFILTRATION OF DATA
DATA EXFILTRATION is the transfer of data from computer to computer attacker access to data considered important the damage is also due to incorrect restore, as an untested backup system
DATA EXFILTRATION
- PHISHING VIA URL
Also known as website counterfeiting, induces the user to insert credentials in a counterfeit web site for further attacks using credentials, is directed to theft of data or money, is indirect as access to networks with credible credentials
just a few recipients who click the fake site that the campaign is successful thanks to worm propagation technology from one computer to another
- SCAM
with fake job listings or false payouts induce you to put your data personal in the fake site for further attacks. Very often they do fake fundraisers for tragedies like hurricanes, covid-19 and fail to be given money directly via the web
SCAM
- SPEAR PHISHING
for other offences, such as fraud or identity theft
also called whaling or targeted phishing Often leads to reputational damage of the company attachedSPEAR PHISHING
- IMPERSONATION OF THE DOMAIN
Domains are created similar to the real one, maybe with a different letter or a different suffix. Victim mistakenly opens dangerous domain Thinking he’s gonna open the real thing. Initially criminals buy the domain with the fake name and then fill it up of malware to attack
DOMAIN IMP
- IMPERSONATION OF THE MARK
There are some types of such attack, simulating a known company or common business application used to capture important data personal, credit card numbers also called Vendor E.Mail Compromise
- BRAND HIJHACHING
BRAND hijacking is a common form of phishing with false or counterfeit domain names also called domain spooling
- BLACKMAIL
Blackmail is getting more sophisticated exploit the stolen credentials of the victim to contact and threaten her to have money or claim to be in possession of a compromising video to be disseminated among all contacts of the victim if he does not pay and maybe they do it anyway also called sextortion
BLACKMAIL
- BUSINESS EMAIL COMPROMISE
The crooks who snatched credentials of an employee of a company for scam employees, customers, suppliers and the same company sometimes they do it with fake credentials also called CEO Fraud , wholing Social Engineering or CFO fraud
BEC
- CONVERSATOR HJIACKING
Hackers get into conversations company with accounts already taken and start new conversations to steal personal data or directly money but above all to have information commercial, business and other procedures for new attacks It’s less common than impersonation of the domain, but makes dangerous targeted attacks
CONVERSATOR HJIACKING
- SIDE PHISHING
Accounts are used already taken from to do phishing attacks to partners or email addresses of the victim’s contact list are very successful attacks
SIDE PHISHING
- THEFT OF ACCOUNTS
Using Social Engineering, impersonating brand and phishing , they take an account therefore access to company data, gain other account credentials and exploit such accounts for other attacks
THEFT OF ACCOUNTS