Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
A cybersecurity analyst or engineer wakes up every morning, flips on their laptop, and defends others from attacks, responding at the speed of lightning to beat cyber villains, and with unmatched adaptability and agility stops cyber villains from getting into your inboxes and organizations – all while calling it just a normal day at the office.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
Goals for cyber campaigns consistently provide the advantage. Whether to steal data, earn financial rewards, manipulate information, or cause physical destruction, cyber attackers don’t limit themselves to a direct attack on their targets. Instead, they often use their imaginations and go after the digital supply chain of their targets, without increasing the need for technical sophistication, and without risking or compromising the success of their campaigns.
In the Summer of 2017, Iranian cyber actors identified by Area 1 Security as IRN2 and previously referred to as the “OilRig” campaign compromised a website belonging to Doosan Power Systems India (DPSI) to conduct a targeted phishing campaign against Saudi Aramco affiliates. Our research, including technical details and indicators of compromise for this supply chain phishing campaign are available here.
This phishing campaign used multiple vectors: luring victims through a career website to submit resumes; supply chain targeting; and phishing emails with malware.
First, Iranian hackers compromised DPSI’s website, a trusted and legitimate domain, to host a weaponized, encrypted, and password-protected .zip archive. Second, unsuspecting affiliates of Saudi Aramco received an email inviting them to apply for a position at DPSI; if they clicked the link within the email, a password-protected .zip archive would be downloaded to their computer, surreptitiously installing malware. This malware, a new variant of the Helminth backdoor, provided persistent access for attackers to the target’s network. The download also launched a phishing website with DPSI careers as the theme, inviting targets to register and submit a resume.
Digital supply chain attacks exploit an organization’s reliance on suppliers, partners, and vendors to find and prey on the weakest links in the chain. Suppliers, partners, vendors, and affiliates hold sensitive data; their IT infrastructure is typically less secure, or is ineffectively defended. Thus, it can serve as a stepping stone, providing surreptitious opportunities to hackers for enhancing their phishing campaigns against a primary target.
Many prominent campaigns have been the result of supply chain phishing:
The Target data breach, which exposed 40 million customer credit card numbers, was the result of attackers who initially gained access to the network using credentials obtained from heating, ventilation, and air-conditioning (HVAC) subcontractor Fazio Mechanical Services via a phishing attack.
A data breach at Home Depot, which exposed 56 million customer credit card numbers, was the result of a supply chain phishing attack wherein a third-party vendor’s username and password were used to enter Home Depot’s network.
Leaders and practitioners responsible for email security are faced with a few truths every day. It’s likely true that their email is cloud-delivered and comes with some built-in protection that does an OK job of stopping spam and commodity malware.
https://www.area1security.com/wp-content/uploads/2022/08/image3-16.png10131800William Cloudhttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngWilliam Cloud2022-08-23 11:36:342022-08-23 11:39:08How to replace your email gateway with Cloudflare Area 1
Today is National Superhero Day, and we would like to dedicate this day to you—the SOC teams and the security experts on the frontline of the phish fight.
https://www.area1security.com/wp-content/uploads/2022/05/BlogBanner_PoTWSuperhero_2022MAY.png20845209Shalabh Mohanhttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngShalabh Mohan2022-04-28 13:51:312022-07-15 10:20:08Superhero strategies for the Phish Fight