Recently a business I’m working with had an email that was sent to some vendors of theirs using emails that were remarkably similar to their own emails. The attackers used letter substitution to mimic the business’s domain (e.g. exarnple@dornain.com — notice the use of “r” and “n” to imitate an “m”).
Luckily, the vendors contacted by these people were diligent enough to catch the mismatched email addresses. However, I’m concerned that similar attacks will hit other vendors of our that might not have the same protocols in place.
Aside from contacting every one of vendors, is there anything the business can do on their end to mitigate these attacks? Or are they reliant on vendors being diligent with double-checking their contacts?
Continue reading Dealing with a fraudulent email that went to vendors→