SlideShare a Scribd company logo
Page 1 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
What are the possible damages of Phishing and
spoofing mail attacks? | Part 2#9
We are living in a dangerous world that produces many types of threats and risks to our
organizational mail infrastructure, to our users and to us.
In the current article, I would like to review some of the possible damages that we can
experience in a scenario, in which Spoof or Phishing mail attacks are realized.
The Great Market Of Mail Threats, Possible Damages And Phishing Mail
Attack
Page 2 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Regarding the threats and risks to our mail infrastructure, there are a variety of threats which we
should be aware of and prepare accordingly.
So why did I prefer to talk about the specific threat describe as “Phishing mail attack”, and his
relative – the Spoof mail attacks?
The reason is that Phishing mail attacks are very interesting from the risk management and
security perspective and very challenging from the “possible solutions” perspective.
Phishing mail attacks are the representative of a modern threat that belongs to the famous
family of advanced threats
The main character of Phishing mail attacks is, that this type of attack considered as a very
sophisticated attack that can cause a very serious damage.
To be able to protect our users and our organization from the threat of Phishing mail attack, we
will need to complete a couple of phases:
 Be familiar with the specific characters and the behavior (the DNA) of the Phishing mail
attack and Spoof mail attacks. For example, how does Phishing mail attack uses different
tools and methods such as Spoof mail attack for getting the required results.
 Be familiar with the possible damages in the case that the Phishing mail attack threat is
realized.
 Be familiar with all the common obstacles that prevent us from successfully dealing with
the threat of Spoof E-mail attacks and Phishing mail attacks.
 Be familiar with the complexity of “solutions cocktail” that we need to use for dealing with
Phishing mail attacks and Spoof mail attacks.
 Be familiar with the specific characters and the concept of each of the possible solutions,
the strengths and the weaknesses of each of the solutions, etc.
Page 3 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Bottom line
To acknowledge that the subject of Phishing mail attack is a very serious threat that needs our
full attention.
Page 4 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The Existing Threats And Risks To Your Mail Infrastructure.
The modern mail environment includes a variety of “risks” and “threats” that we need to deal
with.
A very general classification of these “mail threats” could be:
Mail attacks | Threats and risks that are executed by hostile elements.
This type of these “threats” is executed by a hostile element, that tries to exploit existing
vulnerabilities of our mail infrastructure, or the vulnerabilities our users.
The results of such attacks could be a minor damage – such as the damage of spam mail in
which the damage is harassment of our users, by sending a mail that includes inappropriate
content, such as advertising persuasion to purchase products, which will increase certain body
organs.
The other side of the story could be mail attack such as a Phishing mail attack that can cause
serious damage such as: stealing intellectual property, stealing money, stealing passwords,
infects our infrastructure with malware and so on.
As an example, we can mention the following mail attacks:
1. Spoof E-mail attacks – a scenario in which hostile element uses a false identity, usually an
identity of a “trusted sender” in which the victim can trust.
2. Phishing mail attacks –attack that can be described as – advanced or sophisticated
attack, which combines a variety of methods such as – Spoof mail, social engineering,
Phishing website, malware and so on for attacking the victim.
3. Spam mail attacks – spam mail that can flood the organization mail infrastructure
harasses and annoying mail users.
4. Malware – a hostile code that could cause a minor damage, but at the same time, can
cause a huge damage.
Another type of threats and risks
1. Data leak – a scenario in which sensitive data is leaking by using the organization mail
infrastructure as a “bridge”.
2. Data privacy, data confidentiality and data integrity – a scenario in which hostile element
access data that is transferred via the communication line etc.
3. Availability of mail infrastructure – a scenario in which the mandatory need of 7 X 24
availability of the organization mail infrastructure may be affected by various factors such
as – failure of the mail server’s hardware, failure of communication lines and so on.
Page 5 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Although each of this “mail threats” that are mentioned above is – an Important and respected
threat, in the current article series, I would like to focus on the subject of “Mail attacks” and
especially on the subject of Spoof mail attack and Phishing mail attacks.
Additional reading
 Addressing Your CxO’s Top Five Cloud Security Concerns
 Phishing Detecton and Remediation
 Email Security Threats
 Guarding Beyond the Gateway: Challenges of Email Security
Page 6 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The Possible Damages Of Phishing Mail Attack
One of the most “interesting” characters of Phishing mail attack is, that there is a wide range of
“damages” that could be realized by the Phishing mail attack.
The type of the “damage” depends upon the creativity and imagination of the attacker.
Just in case, I would like to review the most common results from the Phishing mail attack:
1. Fraud
Under the section of “fraud,” there are a variety of possible types of frauds, for example – Finical
fraud, in which the victim is seduced to deposit money in the attacker bank account.
2. Theft  Access to user or organization private information
A scenario in which hostile element gets access to a private information about the victim such as
user password, bank account number and so on.
Another option is – A scenario in which hostile element gets access to the organization private
data by using the victim as a “bridge” to enter that protected organization perimeter.
3. Variable type of “damages” to the organization infrastructure
I use this vague definition because, the severity of the possible damage that can be caused by
the attacker, depend upon the type of the Phishing mail attack that is executed.
For example, the Phishing mail attack can tempt the victim to download and activate a specific
file that is actually a malware such as – Trojan horse.
The damages that can be caused by a Trojan horse can be a minor damage such as in a scenario
in which the Trojan horse serves as an adware (collect information about the user habit, etc.) Or
can be translated into a very serious damage in which the Trojan horse serves as a back door for
the attacker, that take control on the victim’s desktop, and uses the victim’s desktop as a
“bridge” to the rest of the organization infrastructure.
Page 7 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The wicked structure of the Phishing mail attack
As mentioned, the Phishing mail attack considered as a sophisticated attack which combined
many malicious methods for implementing a successful attack.
For example, in a common Phishing mail attack, the attacker will use a spoofed sender identity,
which looks like trusted sender identity that the victim can trust.
The E-mail message content will include some “narrative” which is based on social engineering
methods, that will address a specific human vulnerability or a specific human character that will
seduce and lead the victim “to do something” such as – download and open a specific file, click
on a specific link that will lead the victim to a Phishing website and so on.
The result of the “user action” (the victim) could be data theft, money fraud, infect the user
desktop with a malware etc.
Page 8 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
What is my point?
My point is that if we manage to “catch the head of the snake”, we can avoid from the of a
snake bite!
If we use a less metaphorically description – in case that we manage to identify and block the
Spoof mail attack and Phishing mail attacks, we can prevent the painful results from the attack.
Page 9 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part
2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
For example, along the current article series, we will review in details the subject of – “Spoof mail
attack”.
We will review the characters of Spoof mail attack, and the way that we can use for dealing with
a Spoof mail attack (by implementing sender verification mechanisms).
The Spoof mail attack doesn’t have a “life of its own”.
The meaning is that from the attacker’s point of view, the ability to spoof the sender’s identity,
have a “value” only as “bridge” which will pave the way for the “reset” of the Phishing mail
attacks.
In case that we will be able to identify and block most of the Spoof mail attack, the derivative is
that we also be able to block most of the Phishing mail attack!
Page 10 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
An important observation is that not all the Phishing mail attack uses Spoof mail attack and in
addition, there is not granted that we will be able to identify 100% of Spoof mail attack.
Why Do I Want To Focus On Spoof Mail And Phishing Mail Attacks?
The answer to the question is that in the current time, there is a deadly cocktail that is served at
the local pub which includes the following Ingredients:
1. The significant damage that is caused by Phishing attacks (and Spoof mail attack that is
part of the Phishing mail attack).
2. The incredible ease of performing Spoof mail and Phishing mail attacks.
3. The incredible lack of knowledge and understanding about the mechanism, and the
characters of Spoof mail and Phishing mail attacks.
Page 11 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
My main goal is – to be your wake-up call!
The lack of awareness of the risks that involved in Spoof mail and Phishing
mail attacks.
Although it seems like that everyone knows the meaning of – Spoof mail and Phishing mail
attacks, the simple truth is that most of the time, most of us, not really understand the huge
impact of this type of attacks, how this attack is implemented, what are the main characters this
attack and so on.
From my personal acquaintance with customers and organizations, there are a number of core
beliefs, that prevent us from dealing with the risks of risks of Spoof mail and Phishing mail:
 It will not happen to me!
 Don’t rock the boat!
 We will deal with the problem when we get to it!
Page 12 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The type the above approach, causes us to close our eyes to this Immediate and tangible threat,
and hope that – if and when this risk will be realized, we will know how to deal with this “issue”
or most of the time, find a way to “outsource the responsibility” to another factor that we can
blame.
The less good news is that in the case of Spoof mail attack and Phishing mail attacks, we can
rely on the famous Murphy’s law – “If anything can go wrong, it will!”
Alternatively, if you want to put it differently – it’s not a matter of “if”, it’s a matter of “when.”
To emphasize my point, let’s do a little test that will enable us to be impressed from the
“level of interest” regarding two important subjects: Identifying phishing mail, and Kim
Kardashian.
For the purpose of this test, let’s use the YouTube site as an indicator of the “level of interest.”
In the following screenshot, we can see the search results for the term “Identifying phishing
mail.” We can clearly see that this issue is not a very popular subject.
The sum of the results that deal with this subject of Phishing mail is 700~.
The first result is a video that created a year ago, and the average number of “views” for the
video results that appear on the first page is measured in hundreds.
Page 13 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
In the next screenshot, we can see the search results for the term – “Kim Kardashian.” We can
clearly see that this issue is a very popular subject.
The sum of the results that deal with this subject is 1, 630, 000~.
The average number of “views” for the video results that appear on the first page is measured in
thousands, and some video was watched 4,500,000 ~.
Page 14 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
A Little About Spam Mail Before We Continue With The Subject Of Spoof E-
Mail Attacks And Phishing Mail Attacks.
When reading a technical article about the subject of mail security and mail threats, the Phishing
mail attack is frequently described as – a “subcategory” of spam mail.
I am strongly opposed to the above definition because this classification minimizes and reduces
our awareness of the big risk of Phishing mail attack versus spam mail.
If we want to condense the main goal of all the types of mail attacks, the simple answer is – “to
earn money”.
Page 15 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The main difference between spam mail attack and Phishing mail attack is – the “way” that the
element uses for getting the amount of money.
The similar characters of spam mail and Phishing mail
The common denominator of spam mail and Phishing mail is that way that the E-mail message
is “distributed” among many destination recipients.
The main target of “element” that sends spam mail and the element that sends Phishing mail is
– to reach the largest possible number of target recipients, by using the option of bulk mail or
mass mail.
The method for getting the E-mail address of the “victims,” could be similar such as using the
option of Harvested E-mail address.
Page 16 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Note – this observation is not complete accurately because, when using a specific Phishing mail
attack that described as – spear phishing, the attacker doesn’t use the option of bulk mail, but
instead, aim his attack to a very specific organization recipient such as the company CEO and so
on.
The difference between spam mail and Phishing mail
The main difference between spam mail attack versus Phishing mail attack is the level of
damage or the level of “wickedness.”
Most of the times, the “standard spam mail” can be considered as an E-mail that includes some
kind of a message, that tries to convince you to buy “something.”
Apart from the harassment that is caused by accepting “unwanted E-mail message” that
compels the user to waste the time required for read or delete the spam mail, there is no other
critical damage.
Note – there are “other damages” that are caused by spam mail such as flooding of an
organization, communication lines and the waste of storage space on the mail server but, from
the “user perspective,” the spam mail is considered as a non-useful mail, and that’s all.
Regarding the subject on – possible damage that is caused by a Phishing mail attack, in this
case, the story is totally different!
The Phishing mail attacks “damage” could be translated into a specific user damage such as –
breaking into a specific person’s bank account and stealing his money or can be realized as an
attack, that infects the organization infrastructure with malware that can take control over the
organization infrastructure, encrypts hard disks and asking for a ransom and so on.
Page 17 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Regarding the “damage level” which can be caused by a Phishing mail attack, the sky is the limit!
Spam Mail, A Very Brief Review
Although this article series is dedicated to the subject of Spoof E-mail attacks and Phishing mail
attacks, I would like to “pay my debt” to the subject of spam mail, by providing a very brief
review on this subject.
Know your enemy | What is the motivation of the spammers?
The main motivation of the elements which perform spam mail attack is – money.
A very useful way to make money and even a lot of money is – by selling something to
someone.
One of the easiest and the profitable way of addressing a huge amount of “potential buyers” is –
by using the Internet infrastructure.
The “thing” that the spammer wants to sell, could be a product, a service or even an “idea.”
 The spammer may wish to promote a specific product  service which he provides.
 The spammer may wish to promote a specific product  service someone else’s product
(affiliate programs).
 Other – I add the “other,” as a space holder for any other thing that the spammer has an
interest to promote.
Page 18 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Spam mail | The risk level and the consequence
In general, we can define the “risk level” of spam mail as low or medium.
Although no one would like to get a spam mail, the damage of spam mail is not considered as a
real threat to crucial assets of the organization.
The possible damage from the spam mail attack could be:
 Annoying our users
 A waste of time that is required for reading the spam mail sends the spam mail to the
junk folder, inform the IT staff about the spam mail.
 Lead our users to problematic websites
Another type of damages that are caused by spam mail are the damage of the organizational
infrastructure such as communication line and storage:
 Spoof E-mails that causes communication lines are overloaded.
 Mail server storage that is wasted on storing the spam mail.
Page 19 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
The way that spammers get our E-mail address
The last thing that I would like to relate to the subject of “spam mail” is the method which the
spammers use for getting the information about the E-mail address of their “victims” (our users).
In a spam mail scenario, the most common complaint of the users is – that they never registered
a specific mail list or didn’t provide their E-mail address to the element that sends the spam
mail.
The simple answer is that most of the time, they are right!
The spammer gets the required information about the “E-mail address” of their victims by
purchase E-mail lists of mediators who have a database of harvested email address.
These “mediators” know how to harvest this E-mail address from many types of resources such
as – chat rooms, newsgroups, websites, social networking, blogs, Internet directories and so on.
Additional methods that spammer use described as – running a dictionary attack.
The dictionary attacks are implemented by software engineers who know how to generate
billions of combinations, which create “optional E-mail address” that are used by the spammer.
Page 20 of 20 | What are the possible damages of Phishing and spoofing mail attacks? |
Part 2#9
Written by Eyal Doron | o365info.com | Copyright © 2012-2016
Note – the same methods for getting the E-mail address of the potential victims is used by the
hostile elm nets that perform Phishing mail attacks.
The next article in the current article series is
What is so special about Spoof mail attack? |Part 3#9

More Related Content

What's hot

Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
Sarim Khawaja
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
Eyal Doron
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
IJECEIAES
 
Ransomware_PDF
Ransomware_PDFRansomware_PDF
Ransomware_PDFRen Hao
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
Symantec
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
A Review on Antiphishing Framework
A Review on Antiphishing FrameworkA Review on Antiphishing Framework
A Review on Antiphishing Framework
IJAEMSJORNAL
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
KloudLearn
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
mahesh43211
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability reportSayali Sawant
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
saivarun91
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
Mark Mair
 

What's hot (16)

Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
A Novel Approach for Phishing Emails Real Time Classification Using K-Means A...
 
Ransomware_PDF
Ransomware_PDFRansomware_PDF
Ransomware_PDF
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
A Review on Antiphishing Framework
A Review on Antiphishing FrameworkA Review on Antiphishing Framework
A Review on Antiphishing Framework
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 

Viewers also liked

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
pathsproject
 
PATHS: Personalised Access to Cultural Heritage Spaces
PATHS: Personalised Access to Cultural Heritage SpacesPATHS: Personalised Access to Cultural Heritage Spaces
PATHS: Personalised Access to Cultural Heritage Spaces
pathsproject
 
IND-2012-277 St.Xavier’s High School -Zero Garbage Campaign
IND-2012-277 St.Xavier’s High School -Zero Garbage CampaignIND-2012-277 St.Xavier’s High School -Zero Garbage Campaign
IND-2012-277 St.Xavier’s High School -Zero Garbage Campaign
designforchangechallenge
 
PATHS presentation at York University
PATHS presentation at York UniversityPATHS presentation at York University
PATHS presentation at York University
pathsproject
 
TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode designforchangechallenge
 
My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17Eyal Doron
 
Introduction to Arema Connect
Introduction to Arema ConnectIntroduction to Arema Connect
Introduction to Arema Connect
Arema Connect
 
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
 User-Centred Design to Support Exploration and Path Creation in Cultural Her... User-Centred Design to Support Exploration and Path Creation in Cultural Her...
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
pathsproject
 
Ozon
OzonOzon
OzonAyu P
 
De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...
Eyal Doron
 
The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...
The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...
The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...
Eyal Doron
 
Presentación Drupal Commerce en OpenExpo Ecommerce
Presentación Drupal Commerce en OpenExpo EcommercePresentación Drupal Commerce en OpenExpo Ecommerce
Presentación Drupal Commerce en OpenExpo Ecommerce
OpenExpo
 
Arema connect partnership introduction
Arema connect partnership introductionArema connect partnership introduction
Arema connect partnership introduction
Arema Connect
 
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
pathsproject
 
The old exchange environment versus modern exchange environment part 02#36
The old exchange environment versus modern exchange environment  part 02#36The old exchange environment versus modern exchange environment  part 02#36
The old exchange environment versus modern exchange environment part 02#36
Eyal Doron
 
My E-mail appears as spam - Troubleshooting path | Part 11#17
My E-mail appears as spam - Troubleshooting path | Part 11#17My E-mail appears as spam - Troubleshooting path | Part 11#17
My E-mail appears as spam - Troubleshooting path | Part 11#17
Eyal Doron
 
Fund EcoMarket 2016
Fund EcoMarket 2016Fund EcoMarket 2016
Fund EcoMarket 2016
juliadreblow
 
тренинговый центр «настрой»
тренинговый центр «настрой»тренинговый центр «настрой»
тренинговый центр «настрой»Datnov Fedor
 

Viewers also liked (20)

PATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, ViennaPATHS at EuropeanaTech 2011, Vienna
PATHS at EuropeanaTech 2011, Vienna
 
PATHS: Personalised Access to Cultural Heritage Spaces
PATHS: Personalised Access to Cultural Heritage SpacesPATHS: Personalised Access to Cultural Heritage Spaces
PATHS: Personalised Access to Cultural Heritage Spaces
 
IND-2012-277 St.Xavier’s High School -Zero Garbage Campaign
IND-2012-277 St.Xavier’s High School -Zero Garbage CampaignIND-2012-277 St.Xavier’s High School -Zero Garbage Campaign
IND-2012-277 St.Xavier’s High School -Zero Garbage Campaign
 
PATHS presentation at York University
PATHS presentation at York UniversityPATHS presentation at York University
PATHS presentation at York University
 
TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode TAM-2012-08 Govt Higher sec School Mathicode
TAM-2012-08 Govt Higher sec School Mathicode
 
My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17My E-mail appears as spam - troubleshooting path - part 11 of 17
My E-mail appears as spam - troubleshooting path - part 11 of 17
 
Introduction to Arema Connect
Introduction to Arema ConnectIntroduction to Arema Connect
Introduction to Arema Connect
 
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
 User-Centred Design to Support Exploration and Path Creation in Cultural Her... User-Centred Design to Support Exploration and Path Creation in Cultural Her...
User-Centred Design to Support Exploration and Path Creation in Cultural Her...
 
Ozon
OzonOzon
Ozon
 
De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...De-list your organization from a blacklist | My E-mail appears as spam | Part...
De-list your organization from a blacklist | My E-mail appears as spam | Part...
 
The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...
The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...
The checklist for preparing your Exchange 2007 infrastructure for Exchange 20...
 
Presentación Drupal Commerce en OpenExpo Ecommerce
Presentación Drupal Commerce en OpenExpo EcommercePresentación Drupal Commerce en OpenExpo Ecommerce
Presentación Drupal Commerce en OpenExpo Ecommerce
 
Arema connect partnership introduction
Arema connect partnership introductionArema connect partnership introduction
Arema connect partnership introduction
 
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...Aletras, Nikolaos  and  Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
Aletras, Nikolaos and Stevenson, Mark (2013) "Evaluating Topic Coherence Us...
 
The old exchange environment versus modern exchange environment part 02#36
The old exchange environment versus modern exchange environment  part 02#36The old exchange environment versus modern exchange environment  part 02#36
The old exchange environment versus modern exchange environment part 02#36
 
Presentation
PresentationPresentation
Presentation
 
第10回word bench熊本
第10回word bench熊本第10回word bench熊本
第10回word bench熊本
 
My E-mail appears as spam - Troubleshooting path | Part 11#17
My E-mail appears as spam - Troubleshooting path | Part 11#17My E-mail appears as spam - Troubleshooting path | Part 11#17
My E-mail appears as spam - Troubleshooting path | Part 11#17
 
Fund EcoMarket 2016
Fund EcoMarket 2016Fund EcoMarket 2016
Fund EcoMarket 2016
 
тренинговый центр «настрой»
тренинговый центр «настрой»тренинговый центр «настрой»
тренинговый центр «настрой»
 

Similar to What are the possible damages of phishing and spoofing mail attacks part 2#9 | Eyal Doron | o365info.com

Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Eyal Doron
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
MahdiRahmani15
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaks
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
MehwishAnsari11
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Email Hacking
Email Hacking Email Hacking
Email Hacking
InsecureLab
 
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
IRJET Journal
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
anbersattar
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
Ayu Anita
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
CSCJournals
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
Haley Johnson
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...
Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...
Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...
CSCJournals
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
GARDENGAMERZE77Fancl
 
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
IJNSA Journal
 
Cyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptxCyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptx
Sample Assignment
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 

Similar to What are the possible damages of phishing and spoofing mail attacks part 2#9 | Eyal Doron | o365info.com (20)

Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Email Hacking
Email Hacking Email Hacking
Email Hacking
 
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
Emotet: A Sophisticated and Persistent Malware for Stealing Information, its ...
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...
Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...
Prevention of Phishing Attacks Based on Discriminative Key Point Features of ...
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...
 
Cyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptxCyber Security and types of internet threats.pptx
Cyber Security and types of internet threats.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

More from Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Eyal Doron
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Eyal Doron
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Eyal Doron
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Eyal Doron
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Eyal Doron
 

More from Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...Microsoft remote connectivity analyzer (exrca)  autodiscover troubleshooting ...
Microsoft remote connectivity analyzer (exrca) autodiscover troubleshooting ...
 
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...Microsoft connectivity analyzer (mca)  autodiscover troubleshooting tools  pa...
Microsoft connectivity analyzer (mca) autodiscover troubleshooting tools pa...
 
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...Outlook test e mail auto configuration  autodiscover troubleshooting tools  p...
Outlook test e mail auto configuration autodiscover troubleshooting tools p...
 
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...Microsoft remote connectivity analyzer (ex rca)  autodiscover troubleshooting...
Microsoft remote connectivity analyzer (ex rca) autodiscover troubleshooting...
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (16)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

What are the possible damages of phishing and spoofing mail attacks part 2#9 | Eyal Doron | o365info.com

  • 1. Page 1 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and to us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail attacks are realized. The Great Market Of Mail Threats, Possible Damages And Phishing Mail Attack
  • 2. Page 2 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Regarding the threats and risks to our mail infrastructure, there are a variety of threats which we should be aware of and prepare accordingly. So why did I prefer to talk about the specific threat describe as “Phishing mail attack”, and his relative – the Spoof mail attacks? The reason is that Phishing mail attacks are very interesting from the risk management and security perspective and very challenging from the “possible solutions” perspective. Phishing mail attacks are the representative of a modern threat that belongs to the famous family of advanced threats The main character of Phishing mail attacks is, that this type of attack considered as a very sophisticated attack that can cause a very serious damage. To be able to protect our users and our organization from the threat of Phishing mail attack, we will need to complete a couple of phases:  Be familiar with the specific characters and the behavior (the DNA) of the Phishing mail attack and Spoof mail attacks. For example, how does Phishing mail attack uses different tools and methods such as Spoof mail attack for getting the required results.  Be familiar with the possible damages in the case that the Phishing mail attack threat is realized.  Be familiar with all the common obstacles that prevent us from successfully dealing with the threat of Spoof E-mail attacks and Phishing mail attacks.  Be familiar with the complexity of “solutions cocktail” that we need to use for dealing with Phishing mail attacks and Spoof mail attacks.  Be familiar with the specific characters and the concept of each of the possible solutions, the strengths and the weaknesses of each of the solutions, etc.
  • 3. Page 3 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Bottom line To acknowledge that the subject of Phishing mail attack is a very serious threat that needs our full attention.
  • 4. Page 4 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The Existing Threats And Risks To Your Mail Infrastructure. The modern mail environment includes a variety of “risks” and “threats” that we need to deal with. A very general classification of these “mail threats” could be: Mail attacks | Threats and risks that are executed by hostile elements. This type of these “threats” is executed by a hostile element, that tries to exploit existing vulnerabilities of our mail infrastructure, or the vulnerabilities our users. The results of such attacks could be a minor damage – such as the damage of spam mail in which the damage is harassment of our users, by sending a mail that includes inappropriate content, such as advertising persuasion to purchase products, which will increase certain body organs. The other side of the story could be mail attack such as a Phishing mail attack that can cause serious damage such as: stealing intellectual property, stealing money, stealing passwords, infects our infrastructure with malware and so on. As an example, we can mention the following mail attacks: 1. Spoof E-mail attacks – a scenario in which hostile element uses a false identity, usually an identity of a “trusted sender” in which the victim can trust. 2. Phishing mail attacks –attack that can be described as – advanced or sophisticated attack, which combines a variety of methods such as – Spoof mail, social engineering, Phishing website, malware and so on for attacking the victim. 3. Spam mail attacks – spam mail that can flood the organization mail infrastructure harasses and annoying mail users. 4. Malware – a hostile code that could cause a minor damage, but at the same time, can cause a huge damage. Another type of threats and risks 1. Data leak – a scenario in which sensitive data is leaking by using the organization mail infrastructure as a “bridge”. 2. Data privacy, data confidentiality and data integrity – a scenario in which hostile element access data that is transferred via the communication line etc. 3. Availability of mail infrastructure – a scenario in which the mandatory need of 7 X 24 availability of the organization mail infrastructure may be affected by various factors such as – failure of the mail server’s hardware, failure of communication lines and so on.
  • 5. Page 5 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Although each of this “mail threats” that are mentioned above is – an Important and respected threat, in the current article series, I would like to focus on the subject of “Mail attacks” and especially on the subject of Spoof mail attack and Phishing mail attacks. Additional reading  Addressing Your CxO’s Top Five Cloud Security Concerns  Phishing Detecton and Remediation  Email Security Threats  Guarding Beyond the Gateway: Challenges of Email Security
  • 6. Page 6 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The Possible Damages Of Phishing Mail Attack One of the most “interesting” characters of Phishing mail attack is, that there is a wide range of “damages” that could be realized by the Phishing mail attack. The type of the “damage” depends upon the creativity and imagination of the attacker. Just in case, I would like to review the most common results from the Phishing mail attack: 1. Fraud Under the section of “fraud,” there are a variety of possible types of frauds, for example – Finical fraud, in which the victim is seduced to deposit money in the attacker bank account. 2. Theft Access to user or organization private information A scenario in which hostile element gets access to a private information about the victim such as user password, bank account number and so on. Another option is – A scenario in which hostile element gets access to the organization private data by using the victim as a “bridge” to enter that protected organization perimeter. 3. Variable type of “damages” to the organization infrastructure I use this vague definition because, the severity of the possible damage that can be caused by the attacker, depend upon the type of the Phishing mail attack that is executed. For example, the Phishing mail attack can tempt the victim to download and activate a specific file that is actually a malware such as – Trojan horse. The damages that can be caused by a Trojan horse can be a minor damage such as in a scenario in which the Trojan horse serves as an adware (collect information about the user habit, etc.) Or can be translated into a very serious damage in which the Trojan horse serves as a back door for the attacker, that take control on the victim’s desktop, and uses the victim’s desktop as a “bridge” to the rest of the organization infrastructure.
  • 7. Page 7 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The wicked structure of the Phishing mail attack As mentioned, the Phishing mail attack considered as a sophisticated attack which combined many malicious methods for implementing a successful attack. For example, in a common Phishing mail attack, the attacker will use a spoofed sender identity, which looks like trusted sender identity that the victim can trust. The E-mail message content will include some “narrative” which is based on social engineering methods, that will address a specific human vulnerability or a specific human character that will seduce and lead the victim “to do something” such as – download and open a specific file, click on a specific link that will lead the victim to a Phishing website and so on. The result of the “user action” (the victim) could be data theft, money fraud, infect the user desktop with a malware etc.
  • 8. Page 8 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 What is my point? My point is that if we manage to “catch the head of the snake”, we can avoid from the of a snake bite! If we use a less metaphorically description – in case that we manage to identify and block the Spoof mail attack and Phishing mail attacks, we can prevent the painful results from the attack.
  • 9. Page 9 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 For example, along the current article series, we will review in details the subject of – “Spoof mail attack”. We will review the characters of Spoof mail attack, and the way that we can use for dealing with a Spoof mail attack (by implementing sender verification mechanisms). The Spoof mail attack doesn’t have a “life of its own”. The meaning is that from the attacker’s point of view, the ability to spoof the sender’s identity, have a “value” only as “bridge” which will pave the way for the “reset” of the Phishing mail attacks. In case that we will be able to identify and block most of the Spoof mail attack, the derivative is that we also be able to block most of the Phishing mail attack!
  • 10. Page 10 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 An important observation is that not all the Phishing mail attack uses Spoof mail attack and in addition, there is not granted that we will be able to identify 100% of Spoof mail attack. Why Do I Want To Focus On Spoof Mail And Phishing Mail Attacks? The answer to the question is that in the current time, there is a deadly cocktail that is served at the local pub which includes the following Ingredients: 1. The significant damage that is caused by Phishing attacks (and Spoof mail attack that is part of the Phishing mail attack). 2. The incredible ease of performing Spoof mail and Phishing mail attacks. 3. The incredible lack of knowledge and understanding about the mechanism, and the characters of Spoof mail and Phishing mail attacks.
  • 11. Page 11 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 My main goal is – to be your wake-up call! The lack of awareness of the risks that involved in Spoof mail and Phishing mail attacks. Although it seems like that everyone knows the meaning of – Spoof mail and Phishing mail attacks, the simple truth is that most of the time, most of us, not really understand the huge impact of this type of attacks, how this attack is implemented, what are the main characters this attack and so on. From my personal acquaintance with customers and organizations, there are a number of core beliefs, that prevent us from dealing with the risks of risks of Spoof mail and Phishing mail:  It will not happen to me!  Don’t rock the boat!  We will deal with the problem when we get to it!
  • 12. Page 12 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The type the above approach, causes us to close our eyes to this Immediate and tangible threat, and hope that – if and when this risk will be realized, we will know how to deal with this “issue” or most of the time, find a way to “outsource the responsibility” to another factor that we can blame. The less good news is that in the case of Spoof mail attack and Phishing mail attacks, we can rely on the famous Murphy’s law – “If anything can go wrong, it will!” Alternatively, if you want to put it differently – it’s not a matter of “if”, it’s a matter of “when.” To emphasize my point, let’s do a little test that will enable us to be impressed from the “level of interest” regarding two important subjects: Identifying phishing mail, and Kim Kardashian. For the purpose of this test, let’s use the YouTube site as an indicator of the “level of interest.” In the following screenshot, we can see the search results for the term “Identifying phishing mail.” We can clearly see that this issue is not a very popular subject. The sum of the results that deal with this subject of Phishing mail is 700~. The first result is a video that created a year ago, and the average number of “views” for the video results that appear on the first page is measured in hundreds.
  • 13. Page 13 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 In the next screenshot, we can see the search results for the term – “Kim Kardashian.” We can clearly see that this issue is a very popular subject. The sum of the results that deal with this subject is 1, 630, 000~. The average number of “views” for the video results that appear on the first page is measured in thousands, and some video was watched 4,500,000 ~.
  • 14. Page 14 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 A Little About Spam Mail Before We Continue With The Subject Of Spoof E- Mail Attacks And Phishing Mail Attacks. When reading a technical article about the subject of mail security and mail threats, the Phishing mail attack is frequently described as – a “subcategory” of spam mail. I am strongly opposed to the above definition because this classification minimizes and reduces our awareness of the big risk of Phishing mail attack versus spam mail. If we want to condense the main goal of all the types of mail attacks, the simple answer is – “to earn money”.
  • 15. Page 15 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The main difference between spam mail attack and Phishing mail attack is – the “way” that the element uses for getting the amount of money. The similar characters of spam mail and Phishing mail The common denominator of spam mail and Phishing mail is that way that the E-mail message is “distributed” among many destination recipients. The main target of “element” that sends spam mail and the element that sends Phishing mail is – to reach the largest possible number of target recipients, by using the option of bulk mail or mass mail. The method for getting the E-mail address of the “victims,” could be similar such as using the option of Harvested E-mail address.
  • 16. Page 16 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Note – this observation is not complete accurately because, when using a specific Phishing mail attack that described as – spear phishing, the attacker doesn’t use the option of bulk mail, but instead, aim his attack to a very specific organization recipient such as the company CEO and so on. The difference between spam mail and Phishing mail The main difference between spam mail attack versus Phishing mail attack is the level of damage or the level of “wickedness.” Most of the times, the “standard spam mail” can be considered as an E-mail that includes some kind of a message, that tries to convince you to buy “something.” Apart from the harassment that is caused by accepting “unwanted E-mail message” that compels the user to waste the time required for read or delete the spam mail, there is no other critical damage. Note – there are “other damages” that are caused by spam mail such as flooding of an organization, communication lines and the waste of storage space on the mail server but, from the “user perspective,” the spam mail is considered as a non-useful mail, and that’s all. Regarding the subject on – possible damage that is caused by a Phishing mail attack, in this case, the story is totally different! The Phishing mail attacks “damage” could be translated into a specific user damage such as – breaking into a specific person’s bank account and stealing his money or can be realized as an attack, that infects the organization infrastructure with malware that can take control over the organization infrastructure, encrypts hard disks and asking for a ransom and so on.
  • 17. Page 17 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Regarding the “damage level” which can be caused by a Phishing mail attack, the sky is the limit! Spam Mail, A Very Brief Review Although this article series is dedicated to the subject of Spoof E-mail attacks and Phishing mail attacks, I would like to “pay my debt” to the subject of spam mail, by providing a very brief review on this subject. Know your enemy | What is the motivation of the spammers? The main motivation of the elements which perform spam mail attack is – money. A very useful way to make money and even a lot of money is – by selling something to someone. One of the easiest and the profitable way of addressing a huge amount of “potential buyers” is – by using the Internet infrastructure. The “thing” that the spammer wants to sell, could be a product, a service or even an “idea.”  The spammer may wish to promote a specific product service which he provides.  The spammer may wish to promote a specific product service someone else’s product (affiliate programs).  Other – I add the “other,” as a space holder for any other thing that the spammer has an interest to promote.
  • 18. Page 18 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Spam mail | The risk level and the consequence In general, we can define the “risk level” of spam mail as low or medium. Although no one would like to get a spam mail, the damage of spam mail is not considered as a real threat to crucial assets of the organization. The possible damage from the spam mail attack could be:  Annoying our users  A waste of time that is required for reading the spam mail sends the spam mail to the junk folder, inform the IT staff about the spam mail.  Lead our users to problematic websites Another type of damages that are caused by spam mail are the damage of the organizational infrastructure such as communication line and storage:  Spoof E-mails that causes communication lines are overloaded.  Mail server storage that is wasted on storing the spam mail.
  • 19. Page 19 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 The way that spammers get our E-mail address The last thing that I would like to relate to the subject of “spam mail” is the method which the spammers use for getting the information about the E-mail address of their “victims” (our users). In a spam mail scenario, the most common complaint of the users is – that they never registered a specific mail list or didn’t provide their E-mail address to the element that sends the spam mail. The simple answer is that most of the time, they are right! The spammer gets the required information about the “E-mail address” of their victims by purchase E-mail lists of mediators who have a database of harvested email address. These “mediators” know how to harvest this E-mail address from many types of resources such as – chat rooms, newsgroups, websites, social networking, blogs, Internet directories and so on. Additional methods that spammer use described as – running a dictionary attack. The dictionary attacks are implemented by software engineers who know how to generate billions of combinations, which create “optional E-mail address” that are used by the spammer.
  • 20. Page 20 of 20 | What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 Written by Eyal Doron | o365info.com | Copyright © 2012-2016 Note – the same methods for getting the E-mail address of the potential victims is used by the hostile elm nets that perform Phishing mail attacks. The next article in the current article series is What is so special about Spoof mail attack? |Part 3#9