{"id":10211,"date":"2017-11-01T05:00:17","date_gmt":"2017-11-01T13:00:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/01\/news-3984\/"},"modified":"2017-11-01T05:00:17","modified_gmt":"2017-11-01T13:00:17","slug":"news-3984","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/01\/news-3984\/","title":{"rendered":"Beyond Catching Sender Spoofing \u2013 using AI to stop email fraud and Business Email Compromise"},"content":{"rendered":"<p><strong>Credit to Author: Joyce Huang| Date: Wed, 01 Nov 2017 12:00:15 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"BEC attacks have become more sophisticated to fool users.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-440x294.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-380x254.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>In September, we <a href=\"http:\/\/blog.trendmicro.com\/the-new-email-security-technologies-powered-by-xgen\/\">announced<\/a> our new email security technologies powered by XGen\u2122 and a new product, <a href=\"http:\/\/www.trendmicro.com\/office365\">Smart Protection for Office 365<\/a>. One key technology introduced was our new AI based Email fraud, or <a href=\"https:\/\/documents.trendmicro.com\/assets\/primers\/enterprise-network-protection-bec.pdf\">Business Email Compromise (BEC)<\/a>, detection technique.<\/p>\n<p>A user receiving a BEC email will have a difficult time telling whether it is fake or real. He or she would likely focus on the action they need to take to satisfy the urgent request of an executive and miss subtle indications that the email was fake. Traditional email security solutions struggle with these attacks since there is usually no attachment or URL to examine and content looks the same as a legitimate email. These facts make BEC attacks difficult to detect and damaging with the average loss per incident of $132,000 according to the <a href=\"https:\/\/www.ic3.gov\/media\/2017\/170504.aspx\">FBI<\/a>.<\/p>\n<p>Trend Micro Hosted Email Security includes email authentication standards (SPF, DKIM, and most recently DMARC) to prevent domain\/sender spoofing but this only solves part of the equation. These standards prevent your domain\/senders from being spoofed but don\u2019t prevent other <a href=\"http:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/email-xgen-office365.html?modal=email-protection\">email forging techniques<\/a>, like \u201cfree email account abuse\u201d (using a free but legit email domain name) and \u201ccompromised email account abuse\u201d (using a compromised account attacking internally). Additional BEC technologies are needed to fully protect email users.<\/p>\n<p><strong>How Trend Micro use A.I. to detect BEC <\/strong><\/p>\n<p>Let\u2019s take a closer look at how we detect fake emails or Business Email Compromise attacks. A user receiving a BEC email will have a difficult time telling if it is fake. The content looks legitimate and the attackers will play into the employee\u2019s desire to be responsive to the executive they are impersonating.<\/p>\n<p>Trend Micro uses artificial intelligence that combines the knowledge of a security expert with a self-learning mathematical model to identify the fake emails. A security expert examining an email would look at both the <strong>behavioral<\/strong> factors of an email and the <strong>intention<\/strong> of the email.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-540107\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3.jpg\" alt=\"\" width=\"813\" height=\"338\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3.jpg 813w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3-300x125.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3-768x319.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3-640x266.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3-440x183.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog-3-380x158.jpg 380w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>In the mail header the security researcher would look at factors such as: is the email coming from an insecure email provider, is the sender\u2019s domain similar to the target organization, is the sender using a name of an executive at the recipient\u2019s organization, and many other factors.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-540109\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog1-4.jpg\" alt=\"\" width=\"715\" height=\"295\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog1-4.jpg 715w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog1-4-300x124.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog1-4-640x264.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog1-4-440x182.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog1-4-380x157.jpg 380w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The researcher would also read the content of the email to decipher its intention. Suspicious factors would include a sense of urgency, a request for action, or a financial implication. None of these factors are suspicious on their own, but they paint a more complete picture when combined with the attacker behavioral factors.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-540110\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog2-3.jpg\" alt=\"\" width=\"704\" height=\"316\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog2-3.jpg 704w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog2-3-300x135.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog2-3-640x287.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog2-3-440x198.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog2-3-380x171.jpg 380w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>We can mimic the decision-making process of the security researcher with a form of artificial intelligence called an <strong>Expert System<\/strong>. The rules of the researcher decide which factors of the email to examine and rank whether they are suspicious.<\/p>\n<p>We then use a second form of artificial intelligence called <strong>machine learning<\/strong> which takes the results of the expert system and uses a computer-generated algorithm to determine if the email is real, fake or suspicious. The machine learning algorithm is based on millions of good and fake emails and is constantly learning and improving. It weighs the results of the expert rules and more accurately detects the fraudulent email as fake.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-540111\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3.jpg\" alt=\"\" width=\"820\" height=\"320\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3.jpg 820w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3-300x117.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3-768x300.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3-640x250.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3-440x172.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/blog3-380x148.jpg 380w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Even trained users struggle to spot phishing emails. Trend Micro combines the decision-making rules of a security expert with the power of machine learning to find fake emails and avoid damaging Business Email Compromise attacks.<\/p>\n<p><strong>Why is Trend Micro\u2019s BEC detection technique different?<\/strong><\/p>\n<p><strong>1. Protecting from not only sender spoofing, but also suspicious content<\/strong><\/p>\n<p>We analyze not only email behavior (ex: forged sender), but also intention (ex: urgency), by using both Expert System and machine learning.<\/p>\n<p><strong>2. Includes internal BEC protection for compromised email account<\/strong><\/p>\n<p>When a user\u2019s account or mailbox is compromised, usually after a phishing attack, the attacker can use the compromised account to send internal phishing or BEC emails. Because the email is coming from a legitimate user\u2019s mailbox, there won\u2019t be anything suspicious on the mail header or sender address. Therefore, sender authentication techniques are not able to detect this. Trend Micro\u2019s <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/email-and-collaboration\/cloud-app-security.html\">Cloud App Security<\/a>, which is included in <a href=\"http:\/\/www.trendmicro.com\/office365\">Smart Protection for Office 365<\/a>, can detect internal BEC attacks on Office 365 email.<\/p>\n<p><strong>3. Includes high-profile users protection<\/strong><\/p>\n<p>Since BEC scams target high profile users such as company executives, extra scrutiny is applied to high-profile users which are identified by the customer using Active Directory groups or by entering their email address. Trend Micro will check incoming email messages claimed to be sent from those users and apply fraud checking criteria to identify forged messages.<\/p>\n<p><strong>4. No extra charge<\/strong><\/p>\n<p>BEC protection is included in Smart Protection for Office 365, which includes Hosted Email Security (cloud email gateway) and Cloud App Security (API-based service integration). No extra charge is needed as we think all customers deserve the best BEC protection.<strong>\u00a0<\/strong><\/p>\n<p><strong>Complete threat protection for your Office 365 email and file sharing<\/strong><\/p>\n<p><a href=\"http:\/\/www.trendmicro.com\/office365\">Smart Protection for Microsoft Office 365<\/a> gives you the advantages of both a gateway and service integrated solution. The gateway provides pre-delivery against phishing, fraud, and advanced threats along with outbound compliance using DLP and encryption. The service integrated layer protects internal email, OneDrive, Box, Dropbox and SharePoint and is able to search existing mailboxes and files for threats.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/beyond-catching-sender-spoofing-using-ai-stop-email-fraud-business-email-compromise\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Joyce Huang| Date: Wed, 01 Nov 2017 12:00:15 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"BEC attacks have become more sophisticated to fool users.\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-440x294.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500-380x254.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/08\/BEC-attacks-have-become-more-sophisticated-to-fool-users-_459_40163810_0_14136806_500.jpg 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>In September, we announced our new email security technologies powered by XGen\u2122 and a new product, Smart Protection for Office 365. One key technology introduced was our new AI based Email fraud, or Business Email Compromise (BEC), detection technique. A user receiving a BEC email will have a difficult time telling whether it is fake&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-10211","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10211"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10211\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10211"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}