www.safeguardcyber.com
Open in
urlscan Pro
2606:2c40::c73c:671f
Public Scan
Submitted URL: https://sales.safeguardcyber.com/t/102527/c/c9f4d7a0-2230-4a13-b5ce-4c377e436009/NB2HI4DTHIXS653XO4XHGYLGMVTXKYLSMRRXSYTFOIXGG33N...
Effective URL: https://www.safeguardcyber.com/blog/security/multi-channel-communication-attacks-demo?d_utk=5dfe6f6f-222e-4a46-ac1c-f627e84280e...
Submission: On June 22 via api from US — Scanned from DE
Effective URL: https://www.safeguardcyber.com/blog/security/multi-channel-communication-attacks-demo?d_utk=5dfe6f6f-222e-4a46-ac1c-f627e84280e...
Submission: On June 22 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3918364/cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45
<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3918364/cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45" enctype="multipart/form-data"
id="hsForm_cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" method="POST"
class="hs-form stacked hs-custom-form hs-form-private hsForm_cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45 hs-form-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45 hs-form-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_54096bda-aef3-49f4-9988-8c7e62bb7972"
data-form-id="cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45" data-portal-id="3918364" target="target_iframe_cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" data-reactid=".hbspt-forms-0">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" class="" placeholder="Enter your "
for="email-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0"></span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" class="hs-input" type="email" name="email" required="" placeholder="Email*" value="" autocomplete="email"
data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
</div>
<div class="legal-consent-container" data-reactid=".hbspt-forms-0.2">
<div data-reactid=".hbspt-forms-0.2.1:0">
<div class="hs-dependent-field" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805">
<div class="hs_LEGAL_CONSENT.subscription_type_15995805 hs-LEGAL_CONSENT.subscription_type_15995805 hs-fieldtype-booleancheckbox field hs-form-field"
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805">
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805">
<ul class="inputs-list" required="" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.0">
<li class="hs-form-booleancheckbox" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.0.0"><label
for="LEGAL_CONSENT.subscription_type_15995805-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" class="hs-form-booleancheckbox-display"
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.0.0.0"><input
id="LEGAL_CONSENT.subscription_type_15995805-cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_15995805" value="true"
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.0.0.0.0"><span
data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.$LEGAL_CONSENT=1subscription_type_15995805.0.0.0.1">
<p>I agree to receive the SafeGuard Cyber newsletter and other communications from SafeGuard Cyber news, products, services, and events. I have read the
<a href="https://www.safeguardcyber.com/privacy-policy" target="_blank" rel="noopener">Privacy Policy</a> and agree to it.</p><span class="hs-form-required">*</span>
</span></label></li>
</ul>
</div>
</div>
</div>
<legend class="hs-field-desc checkbox-desc" style="display:none;" data-reactid=".hbspt-forms-0.2.1:0.1"></legend>
</div>
</div>
<div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
<div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
<div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Subscribe Now" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
</div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
value="{"rumScriptExecuteTime":1869.900001525879,"rumServiceResponseTime":2150.599998474121,"rumFormRenderTime":3.200000762939453,"rumTotalRenderTime":2154.900001525879,"rumTotalRequestTime":276.5999984741211,"isLegacyThemeAllowed":"true","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[4534317],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":15995805,\"label\":\"<p>I agree to receive the SafeGuard Cyber newsletter and other communications from SafeGuard Cyber news, products, services, and events. I have read the <a href=\\\"https://www.safeguardcyber.com/privacy-policy\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Policy</a> and agree to it.</p>\",\"required\":true}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentCheckboxLabel\":\"<p>I agree to receive the SafeGuard Cyber newsletter and other communications from SafeGuard Cyber news, products, services, and events. I have read the <a href=\\\"https://www.safeguardcyber.com/privacy-policy\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">Privacy Policy</a> and agree to it.</p>\",\"isLegitimateInterest\":false}","embedAtTimestamp":"1655906884739","formDefinitionUpdatedAt":"1645739263507","pageUrl":"https://www.safeguardcyber.com/blog/security/multi-channel-communication-attacks-demo?d_utk=5dfe6f6f-222e-4a46-ac1c-f627e84280e0&sbrc=14qHHKDkqNoJ7OWQ3pg1iLw%3D%3D%24ma1Al8vjwFt3-Lk4C2ZpmA%3D%3D","pageTitle":"Multi-Channel Communication Attacks: A Demonstration | Blog","source":"FormsNext-static-5.508","sourceName":"FormsNext","sourceVersion":"5.508","sourceVersionMajor":"5","sourceVersionMinor":"508","timestamp":1655906884742,"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36","originalEmbedContext":{"portalId":"3918364","formId":"cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45","formInstanceId":"2139","pageId":"75696837232","region":"na1","pageName":"Multi-Channel Communication Attacks: A Demonstration | Blog","inlineMessage":true,"rawInlineMessage":"Thanks for submitting the form.","hsFormKey":"9d2d2a4eabab1bda4c7753e70250648b","target":"#hs_form_target_newsletter","contentType":"blog-post","formsBaseUrl":"/_hcms/forms/","formData":{"cssClass":"hs-form stacked hs-custom-form"}},"canonicalUrl":"https://www.safeguardcyber.com/blog/security/multi-channel-communication-attacks-demo","pageId":"75696837232","pageName":"Multi-Channel Communication Attacks: A Demonstration | Blog","boolCheckBoxFields":"LEGAL_CONSENT.subscription_type_15995805","formInstanceId":"2139","urlParams":{"d_utk":"5dfe6f6f-222e-4a46-ac1c-f627e84280e0","sbrc":"14qHHKDkqNoJ7OWQ3pg1iLw==$ma1Al8vjwFt3-Lk4C2ZpmA=="},"renderedFieldsIds":["email","LEGAL_CONSENT.subscription_type_15995805"],"rawInlineMessage":"Thanks for submitting the form.","hsFormKey":"9d2d2a4eabab1bda4c7753e70250648b","formTarget":"#hs_form_target_newsletter","correlationId":"8409022c-7f41-48ff-8a40-fcd0516aa9cd","contentType":"blog-post","hutk":"dfdf5a349e226070ba1a1768fa1cf5ce","captchaStatus":"NOT_APPLICABLE","isHostedOnHubspot":true}"
data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_cb5c80e0-72aa-4216-b7ea-cb9dbf8ccb45_2139" style="display:none;" data-reactid=".hbspt-forms-0.8" data-lf-yt-playback-inspected-p1e024bod1pagb6d="true"></iframe>
</form>
Text Content
When you visit our website, the site asks your browser to store a small piece of data (text file) called a cookie on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies, which are cookies from a domain different than the domain of the website you are visiting, e.g. for our advertising and marketing purposes. More specifically, we use cookies and other tracking technologies for the purposes identified below. If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. Cookies settings Accept Decline * Product * PRODUCT * SECURITY SafeGuard Cyber’s patented technology empowers organizations to understand risks in the context and intent of communications. * COMPLIANCE Comprehensive risk management for collaboration, mobile chat, social media, and email applications that enable your cloud workplace. * INTEGRATIONS Explore the 30 communication channels that SafeGuard Cyber protects. * THREAT REPORT: ECHELON MALWARE DETECTED IN MOBILE CHAT FORUMS Learn More * TAKE A 5-MINUTE COMPLIANCE PRODUCT WALKTHROUGH. Take Tour * Solutions * * SECURITY * Social Engineering * Malware & Ransomware * Insider Threats * COMPLIANCE * CRM Free Text * Mobile Messaging * Social Media * BY INDUSTRY * Financial Services * Life Sciences * Technology * EXPLORE THE 30 COMMUNICATION CHANNELS THAT SAFEGUARD CYBER PROTECTS. Learn More * Resources * * RESOURCES * Video Hub * Blog * Whitepapers * Resource Center * Webinars * First Watch Podcast * KNOWLEDGE BASE * Secure Collaboration Tools * Secure Cloud Applications * Spear Phishing * THREAT REPORT: ECHELON MALWARE DETECTED IN MOBILE CHAT FORUMS Learn More * EXPLORE THE 30 COMMUNICATION CHANNELS THAT SAFEGUARD CYBER PROTECTS. Learn More * Partner Program * * PARTNER PROGRAM * PARTNER OVERVIEW The Illuminate Partner Program drives strategic alignment and shared common goals with its alliance and value-added reseller partners. * THREAT REPORT: ECHELON MALWARE DETECTED IN MOBILE CHAT FORUMS Learn More * EXPLORE THE INTERSECTION OF SECURITY AND DIGITAL TRANSFORMATION Listen Now * Company * * COMPANY * About * Careers * News and Press * Press Kit * Leadership * Events * Vision & Voice * VISION & VOICE Join Community * WE ARE GROWING Explore Opportunities * REQUEST DEMO * BLOG MULTI-CHANNEL COMMUNICATION ATTACKS: HOW THREAT ACTORS EXPLOIT YOUR APPLICATIONS By Storm Swendsboe 3 Min. Read Multi-channel communication attacks, or simply multi-channel attacks, are a common tactic amongst threat actors and cybercriminals. If you have ever responded to a bad actor (knowingly or unknowingly), a frequent follow-up that you may get from them is a request to move the conversation to a different communication channel. This is normally done under the pretext of security or privacy of the communication and is commonly used in romance schemes or attacks that weaponize fake job opportunity scams. This tactic accomplishes two major things for the threat actor: * First, it generates commitment from the victim in continuing the conversation. Criminals operate in a business model where they look for the greatest return on the effort that they put into each attack. While the first email response may indicate some level of commitment from the target to the scam messaging, moving to a second communication channel indicates that the target will likely listen to the entire message and has a higher probability of becoming a victim. Therefore, an attacker can better understand who they invest effort into with further social engineering based on if the target is willing to move to a secondary communication application. * Second, moving to a second channel allows the actor to bypass most native security controls. Most multi-channel communication attacks start on email, as that is the easiest method to contact massive lists of targets, but most email solutions nowadays have some controls built-in, such as spam filters, malicious file detections, and link analysis. Moving the conversation to a messaging app like Telegram, Slack, or WhatsApp, multi-channel communication allows for the actor to leverage environments that have little to no native security protocols in place or controls that feed information to centralized security teams. This move allows the actor to use more common social engineering language, and distribute malicious links or files with less of a chance of getting detected by the messaging platform. Multi-channel attacks are a nightmare for defenders, as they generally have limited visibility and analysis capabilities in these multi-channel communications. While email attack detection solutions have been around for years and are quite sophisticated, very few of these solutions cover multi-channel platforms. Even if the defenders are archiving messages in a messaging application like Slack, and importing the events into a SIEM, they would have to build out their own analysis, detection, and alerting functions on their own - and then do that again for any other messaging applications that the company uses. This coordination is a logistical nightmare at best. The reality is that security teams today do not have the resources to build out this capability from scratch. To that end, SafeGuard Cyber has been building and improving upon its multi-channel communication detection capabilities over the past several years. SafeGuard Cyber solutions can now ingest thousands of messages from various platforms, such as: * Email solutions like Microsoft 365 * Collaboration platforms like Teams and Slack, and; * Messaging applications like WhatsApp and Telegram We can provide uniform detection and analysis upon all the messages collected and provide alerts and a single pane of glass for visualizing events in all of these channels (or exported with our API to another solution). This allows defenders to identify and investigate multi-channel communication attacks in one solution. To demonstrate the capability, we connected some Email and Telegram accounts to SafeGuard Cyber and simulated a basic multi-channel phishing attack across the applications. EXAMPLES AND PATTERNS OF MULTI-CHANNEL COMMUNICATION ATTACKS For our sample attack, we decided to run a typical fake job scam. We would start on Email, move the conversation to Telegram, and then attempt to deliver a piece of malware to the victim. Click through the interactive multi-channel attack demonstration below to see what these messages looked like and how this information appears in the SafeGuard Cyber platform. MULTI-CHANNEL ATTACKS VS SAFEGUARD CYBER PLATFORM Since the attack leveraged multi-channel communications and moved from one application to another, it would be more difficult for a defender to identify and respond to. Effectively, our platform is designed to help defenders quickly and easily correlate multi-channel communication attacks within a single solution. Organizations around the world have now relied on various communication and collaboration tools to ensure business continuity. This multi-channel communication setup should be heavily guarded and secured, lest companies run the risk of social engineering and system infiltration. As we’ve demonstrated above, the SafeGuard Cyber platform is more than capable of protecting your systems, your data, and your business. If you are interested in learning more about the SafeGuard Cyber solution, schedule time for a deeper dive our engineers. Learn More Cybersecurity, Collaboration Security, Cybercrime, Communications, Featured, Channel Share: RELATED CONTENT Blog Why the EA Games Breach Matters, and How You Can Defend Yourself June 14, 2021 Read More Blog Ready for New 2022 SEC Compliance Requirements for Social Selling? December 17, 2021 Read More Blog Lapsus$ Playbook in the Open, and Companies Are Not Ready March 25, 2022 Read More EXPERT INSIGHTS ON CLOUD APP RISKS Stay up-to-date on the latest social engineering, insider threats, and ransomware vulnerabilities. * I agree to receive the SafeGuard Cyber newsletter and other communications from SafeGuard Cyber news, products, services, and events. I have read the Privacy Policy and agree to it. * SafeGuard Cyber protects the connections we need to thrive by securing communication wherever it exists. Tel: +1-800-974-3515 * PRODUCT * Security * Compliance * Integrations * KNOWLEDGE BASE * Secure Collaboration Tools * Secure Cloud Applications * Spear Phishing * PARTNER PROGRAM * Partner Program * COMPANY * About * Careers * News and Press * Press Kit * Leadership * Events * Vision & Voice * RESOURCES * Video Hub * Blog * Whitepapers * Resource Center * First Watch Podcast Solutions * Security * Insider Threats * Malware & Ransomware * Social Engineering * Compliance * CRM Free Text * Mobile Messaging * Social Media * By Industry * Financial Services * Life Sciences * Technology * * Security * Insider Threats * Malware & Ransomware * Social Engineering * Compliance * CRM Free Text * Mobile Messaging * Social Media * By Industry * Financial Services * Life Sciences * Technology * * @ 2022 SafeGuard Cyber * Privacy * Terms of Use * Support * Contact Us