
My MSBlaster Story
We looked after about 3-3500 endpoint devices. We were running Windows servers/clients and we leveraged technologies such as:
- Dameware Tools
- Remote Desktop Protocol
- GFI LanGuard
- RCP/SMB/WMI
- McAfee Antivirus
We looked after about 3-3500 endpoint devices. We were running Windows servers/clients and we leveraged technologies such as:
Business email compromise can be a prelude to a range of attacks but commonly it’s either Ransomware of Scammers. In this post we are focsing on scammer activity which uses a ‘man in the mailbox’ attack to get in between two parties in an email converstation with the aim of attempting theft by fradulently altering a wire transfer so that the third party sends funds to the scammers not to the victim. There are cleary other avenues that can be leveraged (the compromised mailbox may be used to phish or email malware to another victim).
To gain access to the mailbox a range of techniques can be employed which includes:
Once they have your logon credentials, they now will attempt to access your mailbox.
A scammer may use a public VPN service (such as services from AVAST etc.) to move their internet connection the target mailbox region. They can usually locate a person through some OSINT.
By moving to the normal area of the user they are less likely to trip geo location alerts. Read more “Business Email Compromise in Office 365”