Traditional email security products struggle to detect email impersonation threats such as Business Email Compromise (BEC) and spear phishing campaigns. These threats consistently bypass defenses that rely on signatures and policies like Secure Email Gateways and native-cloud email filters. This guide breaks down how Fortra uses advanced data science, including machine learning models, to find and mitigate attacks that slip past traditional email defenses.
As Microsoft’s security capabilities continue to evolve, many organizations are questioning how much they should rely on Microsoft for their email security needs. In this guide, we observe where Microsoft may not be enough and how deploying Fortra Advanced Email Security solutions can provide a more comprehensive protection.
This white paper takes an expansive look at the hidden threats lurking around email inboxes, and how layered email security with a clear understanding of goals can keep your organization better protected.
Let our experts give you a personalized live demo of Fortra's Customer Phishing Protection Bundle and learn how you can prevent email domain spoofing, detect phishing attempts, and disrupt them with takedown APIs.
Table of Contents
Who is Scarlet Widow?
Femmes Fictionale and Counterfeit Romeos
The Long Con: Making Moves for Money
Starry Eyes for Starling Michael
Up Close and Personal: The Case of "Robert Blackwell"
...
Take our quick simulated tour to learn how Agari Active Defense can help you:
Gain actionable intelligence
Understand threats, and
Reduce risk from Business Email Compromise (BEC) attacks
Credential phishing leads to compromised accounts, and compromised accounts lead to more credential phishing.
In order to uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you’ll discover more about how cybercriminals access and use compromised accounts, including
How...
Organized criminals are targeting businesses with identity deception attacks that cause financial losses and broken trust, but Agari is changing the game. Using responsible active defense techniques to analyze criminal email accounts, the Agari Cyber Intelligence Division (ACID) unmasked 10 cybercriminal groups during a 10-month period. ACID has used the results of its work to:
Warn financial...
Cosmic Lynx is a Russia-based BEC cybercriminal organization that has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks.
In this threat dossier, you’ll discover key details about Cosmic Lynx, including:
How Cosmic targets global corporations with incredibly sophisticated BEC attacks
How Cosmic Lynx exploits DMARC controls to impersonate...
Exaggerated Lion is a BEC cybercrime ring that operates out of Africa with members in Nigeria, Ghana, and Kenya.
This is one of the most prolific BEC groups ever discovered, targeting more than 3,000 employees at nearly 2,100 companies throughout the United States.
Download this report for details including:
How they name, register and host domains disguised to mimic trusted infrastructure.
...
FS-ISAC members–Join Fortra for a cocktail reception at Roy’s San Diego
When: Monday, March 4th, 6:30pm - 8:30pm (directly following the FS-ISAC Booth Crawl)
Where: Roy’s San Diego Waterfront restaurant, Marriott Marquis San Diego Marina Hotel
Please RSVP by February 28th to secure vour spot!
...
The secure email gateway no longer works for business email compromise and advanced email threats. Discover why you need the Fortra Advanced Email Security.
Frost & Sullivan has released the Frost Radar: Email Security, providing a benchmarking system to help you protect your email from cyber attacks.
Download the report for more information about:
Why email is a top threat vector for cyber attacks, and how working from home has increased the risk
How the email security market will continue to grow as more organizations transition to the cloud,...
Discover why cybercriminals target enterprise email channels for phishing schemes and how you can protect yourself from phishing by implementing DMARC.
You'll see how Agari DMARC Protection can help you to:
Set up your records to implement a strong DMARC policy
Identify your senders and configure your domains
Leverage data analytics to monitor email threats & spoofing attempts
...
During the tour, you will see how Agari Phishing Defense can help:
Prevent impersonation attempts by imposters
Remove emails before they hit users’ inboxes
Detect account takeover-based attacks
Take our quick simulated tour to learn how Agari Phishing Response allows you to:
Prioritize phishing threats
Deliver cost savings
Reduce remediation time
Save your security operation team thousands of hours – all while running alongside your existing infrastructure or other security tools
...
While many cybercriminal gangs scam medium-sized and large corporations, Agari has now uncovered and documented the practices of a Nigeria-based scammer group, dubbed Scarlet Widow, that has evolved a different strategy focused on more vulnerable sectors such as school districts, universities, and nonprofits.
In this report, we uncover:
How Scarlet...
Business email compromise (BEC) has continued to grow into a billion-dollar industry as cybercriminals turn to it as their preferred scam. But with the West African gang we’ve named Scattered Canary, we have deeper insight into how BEC is connected to the rest of cybercrime, and why it has grown in recent years.
Download the threat dossier to learn:
How Scattered Canary grew from a one-man...