CEO impersonation: Inside BEC attacks

CEO Impersonation

Cover

Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization.

They will typically request money via wire transfer, but they may also request personnel files or other sensitive information. Read this white paper to see some examples.

Vendor:
Inky Technology
Posted:
02 Oct 2020
Published:
02 Oct 2020
Format:
PDF
Length:
10 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!