Phishing Malware: How and Where - PowerPoint PPT Presentation

About This Presentation
Title:

Phishing Malware: How and Where

Description:

Learn more about Phishing Malware, such as email phishing campaigns, Remote Access Trojans, phishing attacks, phishing criminals and more. How to Protect Against Them ? – PowerPoint PPT presentation

Number of Views:84

less

Transcript and Presenter's Notes

Title: Phishing Malware: How and Where


1
Welcome to iZOOlogic
  • Anti-Phishing Solutions
  • Fraud Prevention
  • Brand Protection
  • Malware Protection

www.izoologic.com
2
About Us
iZOOlogic is an internet company dedicated to
providing niche brand protection and phishing
solutions. The iZOOlogic platform is an
integrated suite of solutions allowing real time
intelligence into the online threat landscape and
provides a seamless 24x7x365 Global Incident
Response. iZOOlogic is headquartered in the UK,
with operations in US and Australia, protecting
major brands and organisations across the
world. Learn More
www.izoologic.com
3
Phishing Additional Malware to the Arsenal of
Tactics
A group of phishing criminals called Silver
Terrier originating from Nigeria was known to
change its tactics to improve its success rate on
getting more victims. The group is not known to
conduct sophisticated phishing attacks, and they
still heavily rely on email phishing campaigns.
However the group seemed to be dedicated to do
more and succeed more, therefore they added
off-the-shelf malware on top of their already
modus mass phishing campaign in their tactics.
www.izoologic.com
4
Phishing Malware How and Where?
Apparently the group has access to various
malware types such as Remote Access Trojans and
information sniffers which were distributed
aiming to infect victims and stealing data. The
group has launched off an average of 17600 spam
emails per month while using 15 different
families of malware according to the researchers
at Palo Alto Networks who has been keen on
tracking them. The groups activities were
interpreted to have increased by 45 percent from
2016.
www.izoologic.com
5
Phishing Malware
Lets admit that it is cheap and easy to send
malicious emails, but the real effort lies on how
attentive the malware authors are when it comes
to materializing their attacks.
www.izoologic.com
6
Phishing Malware How and Where?
The tools and tactics utilized by SilverTerrier
are not the best of technology or methods but
what makes them successful is their opportunistic
mindset and methods. Vulnerable victims are
those businesses that do not employ anti-phishing
methods nor even has phishing intelligence to
begin with.
www.izoologic.com
7
Phishing Malware How and Where?
Common contents in the phishing emails that are
distributed focuses on the subject of fake
shipping notifications, invoices, requests for
quotes and purchase orders. One thing that is
surely surprising is the origin of the malware in
the groups inventory came from the Dark Web
where malware can easily be sold and purchased
through Darkweb Marketplaces. Off-The-Shelf
Malware is like a generic disease which can
easily be detected by software security programs,
with the success of the group SilverTerrier, then
the awareness of the victims can be attributed to
it.
www.izoologic.com
8
Contact Us
14 Hanover Street, W1S 1YH City of Westminster,
London UNITED KINGDOM
44 20 3734 2726
info_at_izoologic.com
www.izoologic.com
Write a Comment
User Comments (0)
About PowerShow.com