Dissecting and Preventing Advanced Phishing Attacks
How FedEX, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign
File-borne attacks are on the rise, and 80% of successful breaches are new, unknown, or zero-day attacks that are not recognized by traditional signature-based detection solutions, such as antivirus. An example of this is an April 2020 attack that delivered Dridex ransomware to FedEx, UPS, and DHL customers. Sophisticated phishing emails--cleverly disguised to appear to be from company email accounts were sent with legitimate-looking attachments that delivered the payload. This threat's signature was not recognized in antivirus databases for 2 entire days, leaving the business' vulnerable.
In the past, detection and alert-based security tools were best-in-class. But in a world of zero-days and an overwhelming amount of attacks, these solutions miss massive quantities of threats--as much as 40%--leaving security teams fighting both alert fatigue and new threats from all fronts.
In this talk, Brent Hansen, Thales TCT's CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at file security company, Votiro, dissects the April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.
Speaker and Presenter Information
Brent Hansen, Chief Technology Officer, Thales TCT
Richard Hosgood, North America Director of Engineering, Votiro
Relevant Government Agencies
Office of Personnel Management, Federal Government, State & Local Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Tue, Jul 28, 2020, 2:00pm - 3:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Thales, Votiro
Organizer
Thales Government Team at Carahsoft