Business Email Compromises (BEC) continue to plague organizations world-wide, inflicting catastrophic, financial damages to the tune of $7.7 million dollars of loss a day. This presentation will put you in the driver’s seat during a live demo of an actual BEC using the same TTP’s criminal organizations are currently employing to attack their victims. We will dissected each step of the scheme and learn how to identify pre-attack signatures to help detect and defend against an imminent attack. Lastly, we will discuss tips and best practices when coordinating with law enforcement.
Aaron Sherman currently serves as Senior Director of Cyber Threat Intelligence at Braintrace. Bringing nearly 15 years of cyber threat detection and neutralization success for the U.S. government, Sherman most recently held the position as Cyber Special Agent with the Federal Bureau of Investigation in the Washington, DC and Salt Lake City Field Offices. While at the FBI, Sherman responded to and investigated cyber intrusions and data breaches perpetrated by Advanced Persistent Threat (APT) actors originating from China and elsewhere. Prior to that role, he was a Counterintelligence Special Agent in the US Army, where he conducted intelligence operations to detect, identify and neutralize threats to the United States military. Sherman has successfully led investigations into criminal cyber intrusions, data breaches, denial of service attacks, ransomware, botnets, business email compromise, identity theft, insider threats, dark web criminal services, account takeovers and payment card fraud. As a leading authority on emerging threats, he has implemented new methodologies for targeting and monitoring cybercriminals on the dark and deep web. His efforts have resulted in the detection and disruption of numerous cybercriminal campaigns targeting US organizations.