BD Platform
Security Operations, Accelerated.
In this blog post we wanted to talk about the first indicator to 99% of the attacks we detect and handle within our customers’ environments: phishing!
Glad you asked. Phishing is an attack method which an attacker attempts to trick the users into giving-up their sensitive personal identifiable information (PII), such as email credentials, passwords, credit card number, and/or home address. While phishing is the most common form of social engineering, other areas that this is becoming more common includes text-messaging & SMS (smishing), and the newest form through social media ads and posts.
Below is a recreation of a real phishing email that was sent to one of our employees.

In the example above, it’s not difficult to see this did not originate from our Co-Founder and CTO Dave Kennedy, but rather an amateur attacker attempting to pull a quick-one. The first indication is the actual email address. If this was work-related, the email address would contain a specific email address associated with Binary Defense, not a generic email address like this example thisisnotdavidkennedy@gmail.com. Note that anyone can create a Gmail account. Other identifiers to be aware of include the following:
This attempt was humorous, and we didn’t redact any information.
Let’s imagine that our user is following along with the attacker and provides their phone number. They would most likely be sent a text message containing a malicious link to a fake O365 login page. This is an example of smishing this is when an attacker pretends to be a legitimate entity and sends an informative text that contains links to a malicious website.
If they have successfully obtained the user’s credentials and unfortunately, if your company hasn’t instituted any type of MFA (multi-factor authentication) for accessing their O365 services. Multi-factor authentication is having two or more authentication that prove your credentials such as passwords, biometrics, secure tokens and PIN number. Without having the MFA, the attacker can now potentially impersonate the user and cause additional havoc throughout the environment to include but not be limited to:
Cybersecurity is a team effort, which means everyone must play the game. One uninformed or careless person could bring-down an entire organization.
Do your part, if you receive anything suspicious, the first thing you should do is inform your local information security team and strictly adhere to your organization’s policy regarding the handling of spam or phishing emails.
As always … Defend. Protect. Secure.