1
FireEye Email Security: Better Protection from Email-Borne Attacks PROTECT YOUR PEOPLE, DATA AND ASSETS WITH FIREEYE EMAIL SECURITY Reduces business risk of unauthorized access Saves operation costs Deploys in minutes with no physical infrastructure Learn More at FireEye.com/email Industry-leading detection of, and protection from, advanced persistent threats to safeguard business assets Real-time, automated protection from spear-phishing and other socially engineered attacks to minimize impostor ‘calls-to-action’ Flexible deployment models to support on-premise, cloud and hybrid email environments Always up-to-date on the latest protection; no upgrades needed Comprehensive, contextual threat intelligence to provide your security team the information it needs to respond to threats Protection from hard-to-detect multi-vector, multi-flow attacks THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT FINANCIAL REMEDIATION REPUTATION $3.8 MILLION 3 82 TO CONTAIN A BREACH AVERAGE COST OF BRAND DAMAGE DUE TO ADVANCED PERSISTENT THREATS $9.4 MILLION 5 DAYS 4 The attacker targets a global shipping company and identifies an IT manager inside — learning about them through social media. An email is crafted to appear like it’s from the IT manager’s boss, recommending a critical software update. The IT manager, assuming the email is real, clicks on a link embedded in the email to install the software update. Malware is downloaded from the attacker’s server and infects the IT manager’s machine. Passcodes that control the shipping company’s closed circuit television network are exfiltrated. The attacker disables the closed-circuit television cameras, steals the containers, and flees the scene. RECON SOCIAL ENGINEERING SPEAR PHISHING INFECTION EXFILTRATION MISSION ACCOMPLISHED How attackers steal shipping containers with a single spear-phishing email. 1 Radicati Group Email Statistics Report, 2015-2019. 2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/ 3 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute. 4 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute, https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF 5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014. © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. ATTACKERS TYPICALLY TARGET AN UNEXPECTED TARGET However, attackers are beginning to focus on information that allows them to go after physical assets. INTELLECTUAL PROPERTY FINANCIAL DATA HIGH-VALUE PEOPLE EMAIL THE FIRST SECURITY GAP TARGETED BY ATTACKERS 2.5 BILLION THERE ARE APPROXIMATELY EMAILS SENT EVERY DAY 1 2 3 SPAM 2 NEARLY EMAILS ARE OF EVERY

[Infographic] Email: The First Security Gap Targeted by Attackers

Embed Size (px)

Citation preview

Page 1: [Infographic] Email: The First Security Gap Targeted by Attackers

FireEye Email Security: Better Protection from Email-Borne Attacks

PROTECT YOUR PEOPLE, DATA AND ASSETS WITH FIREEYE EMAIL SECURITY

Reduces business risk of unauthorized access

Saves operation costs Deploys in minutes with no physical infrastructure

Learn More at FireEye.com/email

Industry-leading detection of, and protection from, advanced persistent threats to safeguard

business assets

Real-time, automated protection from spear-phishing and other socially engineered attacks to minimize impostor

‘calls-to-action’

Flexible deployment models to support on-premise, cloud and

hybrid email environments

Always up-to-date on the latest protection; no upgrades

needed

Comprehensive, contextual threat intelligence to provide

your security team the information it needs to respond

to threats

Protection from hard-to-detect multi-vector, multi-flow attacks

THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT

FINANCIAL

REMEDIATION

REPUTATION

$3.8MILLION3

82TO CONTAIN A BREACH

AVERAGE COST OF BRAND DAMAGE DUE TO ADVANCED PERSISTENT THREATS

$9.4MILLION5

DAYS4

The attacker targets a global shipping company and identifies an IT manager inside — learning

about them through social media.

An email is crafted to appear like it’s from the IT manager’s boss,

recommending a critical software update.

The IT manager, assuming the email is real, clicks on a link embedded in the email to

install the software update.

Malware is downloaded from the attacker’s server and infects the IT

manager’s machine.

Passcodes that control the shipping company’s closed circuit television network are exfiltrated.

The attacker disables the closed-circuit television cameras,

steals the containers, and flees the scene.

RECON SOCIAL ENGINEERING SPEAR PHISHING

INFECTION EXFILTRATION MISSION ACCOMPLISHED

How attackers steal shipping containers with a single spear-phishing email.

1 Radicati Group Email Statistics Report, 2015-2019.

2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/

3 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute.

4 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute, https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF

5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014.

© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

ATTACKERS TYPICALLY TARGET

AN UNEXPECTED TARGET

However, attackers are beginning to focus oninformation that allows them to go after physical assets.

INTELLECTUAL PROPERTYFINANCIAL DATAHIGH-VALUE PEOPLE

EMAIL THE FIRST SECURITY GAP

TARGETED BY ATTACKERS

2.5 BILLIONTHERE ARE APPROXIMATELY

EMAILS SENT EVERY DAY1

2 3 SPAM2

NEARLY EMAILS AREOF EVERY