Overview
Syllabus
Introduction
How many of you like me
BEC attack example
BEC attack definition
How in the world is it
How banks can help
What can we do
What actually happens
What happens to your data
An anonymized list
Verifying email addresses
Generating targets
Vendor email compromise
The gray zone
What we were able to do
Over some period of time
Putting it all together
Why this is such a big problem
Deep Dives
Questions
OASIS
Vendor Compromise
Identifying Fraudulent Transactions
Authentication of Customers
Romance Scam
Reporting Fresh Accounts
Vendor Email Accounts
How Many Mules
Mule Accounts
API
API Automation
Gift Card Vector
Payroll Diversion
Thank you
Taught by
RSA Conference