"the big catch : how whaling attacks target top executives when a hedge fund manager opened up an innocuous zoom meeting invite, he had little idea of the corporate carnage that was to follow. that invite was booby - trapped with malware, enabling threat actors to hijack his email…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
75%
"##iator from a typical spearphishing or bec attack is the target. why are “ whales ” attractive targets? after all, there are fewer of them to victimize than regular employees. three key attributes stand out. senior executives ( including the c - suite ) are typically : - short o…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
63%
"target. there should be no shortage of publicly available information to help them, including social media accounts, their company website, media interviews and keynote videos. aside from the basics, they ’ ll want to know information on key subordinates and colleagues, or corpor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.002Spearphishing Attachment
49%
"##iator from a typical spearphishing or bec attack is the target. why are “ whales ” attractive targets? after all, there are fewer of them to victimize than regular employees. three key attributes stand out. senior executives ( including the c - suite ) are typically : - short o…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
36%
"target. there should be no shortage of publicly available information to help them, including social media accounts, their company website, media interviews and keynote videos. aside from the basics, they ’ ll want to know information on key subordinates and colleagues, or corpor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
35%
"##iator from a typical spearphishing or bec attack is the target. why are “ whales ” attractive targets? after all, there are fewer of them to victimize than regular employees. three key attributes stand out. senior executives ( including the c - suite ) are typically : - short o…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
32%
"target. there should be no shortage of publicly available information to help them, including social media accounts, their company website, media interviews and keynote videos. aside from the basics, they ’ ll want to know information on key subordinates and colleagues, or corpor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.003Spearphishing Link
30%
"target. there should be no shortage of publicly available information to help them, including social media accounts, their company website, media interviews and keynote videos. aside from the basics, they ’ ll want to know information on key subordinates and colleagues, or corpor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Is your organization’s senior leadership vulnerable to a cyber-harpooning? Learn how to keep them safe.