Home

BEC: The inner-workings of West African cybercriminal gangs

%3CLINGO-SUB%20id%3D%22lingo-sub-872649%22%20slang%3D%22en-US%22%3EBEC%3A%20The%20inner-workings%20of%20West%20African%20cybercriminal%20gangs%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-872649%22%20slang%3D%22en-US%22%3EPhishing%20via%20non-technical%20social%20engineering%20methods%2C%20such%20as%20business%20email%20compromise%2C%20is%20one%20of%20the%20predominant%20threats%20impacting%20enterprises%20today.%20Cybercriminals%20know%20that%20social%20engineering%20attacks%20offer%20a%20much%20higher%20ROI%20than%20other%20types%20of%20technically%20sophisticated%20attacks.%20This%20presentation%20covers%20how%20cybercriminals%20are%20evolving%20their%20tactics%20to%20exploit%20core%20human%20characteristics%20through%20social%20engineering.%20We%20dig%20into%20research%20on%20cybercrime%20organizations%20to%20better%20understand%20the%20full%20attack%20cycle%20of%20email-based%20social%20engineering%20attacks%2C%20from%20BEC%20target%20selection%20to%20laundering%20stolen%20proceeds.%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-872649%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ETHR3158%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Community Manager
Phishing via non-technical social engineering methods, such as business email compromise, is one of the predominant threats impacting enterprises today. Cybercriminals know that social engineering attacks offer a much higher ROI than other types of technically sophisticated attacks. This presentation covers how cybercriminals are evolving their tactics to exploit core human characteristics through social engineering. We dig into research on cybercrime organizations to better understand the full attack cycle of email-based social engineering attacks, from BEC target selection to laundering stolen proceeds.

View this session in the session catalog

View session