Webinar On-Demand: 2016 Phishing Trends & Intelligence Report: Hacking the Human
There is no doubt that phishing remains the top threat vector for cyberattacks. Exploiting the human vulnerability continues to be the most attractive and successful path for threat actors targeting the assets of organizations and individuals. For this reason, phishing is used prevalently across the adversary spectrum, from novice cybercriminals to advanced nation-state cyber operations.
Listen to former FBI malware reverse engineering Subject Matter Expert (SME), Joseph Opacki and PhishLabs' Director of Threat Intelligence, Don Jackson for a data-rich discussion on the recently released PhishLabs 2016 Phishing Trends & Intelligence (PTI). They dive into the details of the report providing trend analysis in phishing attacks and insight into the techniques being used in those attacks.
Key findings that are discussed:
- Spear phishing remains the primary initial attack vector used by APT actors. However, 22 percent of spear phishing attacks analyzed in 2015 were motivated by financial fraud or related crimes.
- The number of organizations targeted with Business Email Compromise (BEC) spear phishing attacks grew tremendously in 2015 as threat actors refined BEC techniques and sought new victims.
- 90% of consumer-focused phishing attacks targeted financial institutions, cloud storage/file hosting sites, webmail and online services, ecommerce sites, and payment services.
About the Speakers:
Don Jackson is an established subject matter expert (SME) on cyber security and intelligence with extensive experience researching and protecting financial institutions against advanced cybercrime malware. As the discoverer of the Gozi Trojan and one of the foremost authorities on modern crimeware such as ZeuS and Citadel, Don has been featured for his expertise in major media outlets including CNBC, USA Today, 60 Minutes, The Register and The Guardian. His specialties include threat research, intelligence analysis, investigations, digital forensics, reverse engineering, and malware analysis.