1 00:00:00,390 --> 00:00:08,060 Now we will discuss business, email, compromise, attack a business email compromises when an attacker 2 00:00:08,070 --> 00:00:15,150 hacks into a corporate email account and impersonate the real owner to defraud the company, its customer 3 00:00:15,360 --> 00:00:22,890 partners and employees into sending money or sensitive data to the attackers account business email 4 00:00:22,890 --> 00:00:26,910 compromise is also a type of man in the middle attack. 5 00:00:27,360 --> 00:00:33,750 This is derived from the man in the middle attacked where two parties thinks that they are talking to 6 00:00:33,750 --> 00:00:34,920 each other directly. 7 00:00:35,070 --> 00:00:41,010 But in reality, an attacker is listening in and possibly altering the communication. 8 00:00:41,670 --> 00:00:47,650 The attacker will try to gain access to the executive's email account to remain undetected. 9 00:00:47,790 --> 00:00:54,720 He or she might use in walks rules or change the reply to address so that when the scam is executed, 10 00:00:54,930 --> 00:00:56,970 the executive will not be alert. 11 00:00:57,900 --> 00:01:01,680 Another trick is to create an email with a spoofed a domain. 12 00:01:02,040 --> 00:01:10,410 For example, the attacker might use John Lloyd-Smith Ateret same one each dot com instead of doing 13 00:01:10,410 --> 00:01:19,350 not make a direct simple dot com or John dot smith head, believe me, dot com instead of John Smith 14 00:01:19,350 --> 00:01:21,000 had, believe me, dot com. 15 00:01:21,210 --> 00:01:30,380 Here he changes the spelling of believe me from me and I leave it to me and EIB. 16 00:01:31,050 --> 00:01:36,890 If you do not pay close attention, it is easy to get fooled by this slight difference. 17 00:01:37,470 --> 00:01:44,850 One of the most famous spoofed domain tricks ever was the PayPal dot com, where the attacker changed 18 00:01:44,850 --> 00:01:46,950 the spelling from Betawi. 19 00:01:46,950 --> 00:01:50,250 Be able to be a VIP one.