The art of information gathering.

The art of information gathering.

Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss “From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering.” Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails.  The research states “While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse…

Read More

Hiding in Plain Sight: How Subdomain Attacks Use Your Email Authentication Against You

Hiding in Plain Sight: How Subdomain Attacks Use Your Email Authentication Against You

For years, analysts, security specialists, and security architects alike have been encouraging organizations to become DMARC compliant. This involves deploying email authentication to ensure their legitimate email has the best chance of getting to the intended recipients, and for domain owners to be quickly notified of any unauthorized usage of their domains. While together we are making progress thanks to DMARC adoption and reporting services such as Cisco’s OnDMARC offering, there’s an opportunity to do…

Read More

Council Post: How To Protect Your Consumers Against Email Fraud

Council Post: How To Protect Your Consumers Against Email Fraud

Global Resident Chief Information Security Officer (CISO) for Proofpoint. getty While shopping online, consumers regularly hand over their personal and financial data, so retailers should protect their domains from unauthorized use. If they don’t, their domains could be used in business email compromise (BEC) attacks, phishing emails, email scams and other cyber threat activities, putting their customers at risk. At Proofpoint, we did our own research using the domain-based message authentication, reporting and conformance (DMARC) records…

Read More