Dissecting and Preventing Advanced Phishing Attacks



How FedEX, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign
 
 File-borne attacks are on the rise, and 80% of successful breaches are new, unknown, or zero-day attacks that are not recognized by traditional signature-based detection solutions, such as antivirus. An example of this is an April 2020 attack that delivered Dridex ransomware to FedEx, UPS, and DHL customers. Sophisticated phishing emails--cleverly disguised to appear to be from company email accounts were sent with legitimate-looking attachments that delivered the payload. This threat's signature was not recognized in antivirus databases for 2 entire days, leaving the business' vulnerable.
 
In the past, detection and alert-based security tools were best-in-class. But in a world of zero-days and an overwhelming amount of attacks, these solutions miss massive quantities of threats--as much as 40%--leaving security teams fighting both alert fatigue and new threats from all fronts.
 
In this talk, Brent Hansen, Thales TCT's CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at file security company, Votiro, dissects the April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.

Speaker and Presenter Information

Brent HansenChief Technology Officer, Thales TCT
Richard HosgoodNorth America Director of Engineering, Votiro

Relevant Government Agencies

Office of Personnel Management, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Tue, Jul 28, 2020, 2:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

Thales, Votiro


Organizer
Thales Government Team at Carahsoft


Contact Event Organizer



Return to search results