Resources

Guide

Anatomy of a Compromised Account

Credential phishing leads to compromised accounts, and compromised accounts lead to more credential phishing. In order to uncover the mechanics, the Agari Cyber Intelligence Division seeded more than 8,000 phishing sites with fake credentials and then monitored what happened next. In this report, you’ll discover more about how cybercriminals access and use compromised accounts, including How...
Guide

Silent Starling Threat Dossier: BEC to VEC

Vendor email compromise is a new form of advanced email attack that uses compromised email accounts to target the global supply chain. With the cybercriminal group we’ve named Silent Starling, we see how devastating these attacks can be. Download the threat actor dossier to: How Silent Starling uses phishing email lures to target their victims Why compromised email accounts make email...
Guide

Scarlet Widow Part 2: BEC Bitcoin Laundry—Scam, Rinse, Repeat

While many cybercriminal gangs scam medium-sized and large corporations, Agari has now uncovered and documented the practices of a Nigeria-based scammer group, dubbed Scarlet Widow, that has evolved a different strategy focused on more vulnerable sectors such as school districts, universities, and nonprofits. In this report, we uncover: How...
Guide

Cosmic Lynx Threat Dossier: The Rise of Russian BEC

Cosmic Lynx is a Russia-based BEC cybercriminal organization that has significantly impacted the email threat landscape with sophisticated, high-dollar phishing attacks. In this threat dossier, you’ll discover key details about Cosmic Lynx, including: How Cosmic targets global corporations with incredibly sophisticated BEC attacks How Cosmic Lynx exploits DMARC controls to impersonate...
Guide

Exaggerated Lion Threat Dossier: BEC Check Fraud Ring

Exaggerated Lion is a BEC cybercrime ring that operates out of Africa with members in Nigeria, Ghana, and Kenya. This is one of the most prolific BEC groups ever discovered, targeting more than 3,000 employees at nearly 2,100 companies throughout the United States. Download this report for details including: How they name, register and host domains disguised to mimic trusted infrastructure. ...
Guide

The Total Economic Impact™ of Agari Phishing Defense

Agari commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Agari Phishing Defense. Quantified benefits expressed in risk-adjusted present value generated return on investment of 97% over three years, including: $270k value from improved IT security and reduced level of effort...
Guide

Threat Intelligence Brief: The Geography of BEC

Business Email Compromise (BEC) is a worldwide scourge affecting more than three-fourths of the world’s economies. Around the globe, BEC cybercriminals operate with impunity to steal $26 billion each year. The Agari Cyber Intelligence Division conducted nearly 10,000 active engagements with BEC threat actors and captured the scope of BEC’s global footprint and trends. In this report, you’ll...
Guide

Scattered Canary Threat Dossier

Business email compromise (BEC) has continued to grow into a billion-dollar industry as cybercriminals turn to it as their preferred scam. But with the West African gang we’ve named Scattered Canary, we have deeper insight into how BEC is connected to the rest of cybercrime, and why it has grown in recent years.Download the threat dossier to learn:How Scattered Canary grew from a one-man startup...
Guide

Getting Started with DMARC

Discover why cybercriminals target enterprise email channels for phishing schemes and how you can protect yourself from phishing by implementing DMARC.
Guide

Download the 2022 Email Fraud & Identity Deception Trends Report

In 2021 alone, the FBI's IC3 report published that over $44 million in losses were a direct result of effective phishing and advanced email scams. The Agari Cyber Intelligence Division analyzed trillions of emails and nearly 500 million Internet domains to uncover the scope and impact of this email fraud… and the trends that benchmark enterprise security teams’ ability to respond to email threats....
Guide

Ransomware: Exploring the Leading Cyber Extortion Tool

Ransomware has evolved from targeting individuals to extorting large sums of money from businesses with the threat of releasing or destroying their private company data. This type of email-based attack can cause tremendous financial losses as well as reputation damage that’s difficult and expensive to repair. Read our ransomware white paper now for insights from Agari Chief Scientist Markus...
Datasheet

Financial Services Tips for Securing Email

Financial Services Tips for Securing EmailAlthough email is one of the primary digital channels for customer interaction within financial services institutions, it has never been secure. Today, with phishing more common than ever, anyone can spoof your brand and leverage it to hijack sensitive information from your customers. Phishing has played a role in almost every type of cybercrime. In fact,...
Datasheet

Agari App for Splunk

Why Integrated Email Threat Data Matters Email is a primary vector for attacks on your business today—and email threats are evolving faster than ever. But actionable data about email attacks is often inaccessible to time-strapped security operations and incident response teams. That disconnect leaves your business vulnerable and unable to mitigate hidden email threats. Improve Visibility with...
Datasheet

Fortra's Integration for Palo Alto Networks Cortex XSOAR

Why Integrated Email Threat Data Matters Email is a primary vector for attacks on your business today—and email threats are evolving faster than ever. But actionable data about email attacks is often inaccessible to time-strapped security operations and incident response teams. That disconnect leaves your business vulnerable and unable to mitigate hidden email threats. Improve Visibility with...
Datasheet

Post-Enforcement Advantages of Agari DMARC Protection

AT A GLANCEAfter reaching a DMARC enforcement policy, Agari DMARC Protection continues to provide immense value to customers.BENEFITSImproves customer trust by protecting your brand from being used in phishing attacks.Decreases time to reject by automating implementation.Maximizes marketing efficacy and improves email engagement with trusted communications.Reduces operational costs associated with...
Guide

Domains Associated with Exaggerated Lion BEC Campaigns

Below is the list of domains associated with Exaggerated Lion BEC Campaigns. You can access the PDF version of this list by clicking the "Download PDF Version" button at the top of this page. 1secure-portal-server.online admin-office-exec-ssl-secure-server-portal-exec.management admin-office-exec-ssl-secured-server-portal-exec.management admin-server-apps.management admin-servers-apps.management...
Guide

Getting Started with DMARC: A Guide for Healthcare Organizations

Advanced email attacks against healthcare organizations can result in breached patient data, stolen funds, and brand damage. With DMARC, your organization can secure its email channel, prevent phishing, and maintain the trust you’ve earned with your patients, partners, and providers. Read this white paper to learn: What DMARC is and how it works; The benefits of DMARC for your employees,...
Guide

Federal Agency Plan of Action Guide & Template

To meet DHS’ Binding Operational Directive (BOD) 18-01, agencies were required to submit a Federal agency plan of action to improve email and web security by November 15th. If this deadline came and went without submission – we have you covered. Leverage our Agency Plan of Action template and follow our guide that includes a timeline with key milestones to ensure you comply with BOD 18-01. Our...