What is That Email "Really" Telling Me by Keith Turpin
Countering the Attacks by Erich Kron
Despite the use of many good spam filters and email security gateways, malicious emails still get through. A good security awareness program can help users spot and report these often dangerous messages. Many incident response teams simply instruct users to delete these messages, drop them into a spam bucket or just do it for them. Some go a step further and block the senders. These are great first steps, but there is more that can be and should be done for certain types of messages.
For instance, if the message appears to come from a business partner or customer, it may be a spoof or it might indicate an actual compromised email account, in which case we can help our partners by notifying them. If the email is executive fraud, leveraging highly targeted phishing in an attempt to steal money or PII, there may be steps that can be to disrupt the attacker's infrastructure by reporting the issue to service providers.
What happens if an attacker spoofs your company as the sender and is targeting your customers? This presentation will examine some real-world examples in order to help you understand what email headers can tell you about the email's life cycle and dependencies and how you can leverage this data to enhance your security awareness program. From there we will use tools like Who Is to find out a lot about the who, what, when and where of these malicious messages. Sometimes it is a trail to nowhere, but sometimes it's not.