How Hackers are Leveraging Google Tools For BEC Attacks
Read the White Paper

 

Business Email Compromise (BEC) 3.0 involves the usage of legitimate sites, like Google, PayPal, Dropbox and more. By leveraging the trust of these sites, the emails always get into the inbox, and even advanced tools won’t detect them as illegitimate—because they are not!


By leveraging legitimate tools for illegitimate means, hackers can bypass security tools and get more
end-users to click and respond.


In this whitepaper, we’ll take a deep dive into how hackers are specifically using Google to launch these attacks. By leveraging Google tools, hackers can send out these attacks at scale, with limited chance for detection. 

5-Ways-to-Stop-BEC-booklet
The Avanan solution allows us to have a comprehensive email security solution that integrates seamlessly with our Office 365 environment while "staying enough out of the way" as to not hinder productivity.

— Infrastructure and Operations Analyst in Manufacturing