SlideShare uma empresa Scribd logo
1 de 27
Social Engineering
The Art of Human Hacking
www.facebook.com/realexninja
€24bn
processed annually
12,000clients
3 offices:
London. Dublin. Paris.
170employees
Social Engineering: Content
• Content:
– What is social engineering?
– Types of social engineering & new age threats
– How to use Facebook to ruin someone’s life
– Countermeasures
– Q&A
Social Engineering: Intro
Which city is on the picture?
Social Engineering: Intro
Firewalls
Social Engineering: Intro
• Victims of social engineering
– RSA
• Infected Excel attachment, over $100 million of damage
– Well Fargo Bank
• “Catholic Healthcare” phone call, $2.1 million vanished
– Vodafone Help Desk
• Malware and fraud call, end user lost everything
Social Engineering: Intro
Social Engineering: Basics to Succeed
• What is social engineering?
The attempt to control social behaviour.
– The 3 Critical Success Factors:
• trust
• satisfaction
• relationship
Social Engineering: Basics to Succeed
Social Engineering: Basics to Succeed
• The first “touch” with social engineering
Happy
mom
Happy
child
Social Engineering: Basics to Succeed
Good Evil
Social Engineering: Types
• Old-Fashioned Types of Social Engineering Techniques:
– Direct approach
– Important user
– Helpless user
– Technical support
– Mail-outs
– Social media - Facebook
Social Engineering: Types
• 1. Direct approach • 2. Important user
Social Engineering: Types
• 3. Helpless user • 4. Technical support
Social Engineering: Types
• 6. Social media• 5. Mail-outs
Social Engineering: Types
• New-Fashioned Types of Social Engineering Techniques:
– 1. Phishing with new lethal-strains of ransomware
Social Engineering: Types
• New-Fashioned Types of Social Engineering Techniques:
– 2. IVR and robocalls for credit card information
Did you purchase a flat screen TV for
$3,295? Press 1 for yes or 2 for no.
Social Engineering: Types
• New-Fashioned Types of Social Engineering Techniques:
– 3. Phishing with funerals
Social Engineering: Practical example
How to use Facebook to ruin someone’s life
(attack on an employee)
Social Engineering: Practical example
• 1st step: Protect your identity
– Install new operation system on a new disk
– Encrypt your disk
– Use anonymous proxy
– Use free Wi-Fi in a bar
– Preform attack drinking cold beer
Social Engineering: Practical example
• 2nd step: Fake e-mail and Facebook account
– The character must be:
• Woman*
• 25 to 35 years old
• Single
• High educated
• Interesting
* Statistically is proven that the success rate using a woman character
is more than 100 times (!) higher then using a male profile.
Social Engineering: Practical example
• 3rd step: Select the victim(s)
– Before sending the invitation:
• Get him/her friends
• Get him/her interests
Social Engineering: Practical example
• 4th step: Get the victim(s) as friend
– Start chatting and get sensitive information
– Start chat and get “sensitive” photos
– Post link to an infected site
– …
Social Engineering: How to spot
• How to spot Social Engineering attack?
– unusual requirements
– requiring respect for authority
– threating with negative consequences
– giving praise and flattery
– offering something for nothing
– seems too good to be true, etc…
Social Engineering: Countermeasure
• Social Engineering Countermeasure
– Slow down and Research the facts
– Delete any request for financial information or passwords.
– Reject requests for help or offers of help
– Don’t let a link in control of where you land
– Do not post yours personal data or photos
– Do not reveal sensitive data (e.g. passwords)
– Do not avoid policies and procedures
– Report any suspicious activity
Social Engineering: Last Slide… Promise!
• Questions and discussion
“There is no such thing as a stupid question, only stupid answers“: Colin Powell
www.facebook.com/realexninja
Social Engineering: The end
Thank you!

Mais conteúdo relacionado

Mais procurados

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

Mais procurados (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Phishing
PhishingPhishing
Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 

Destaque

Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
BbAOC
 
Web application security
Web application securityWeb application security
Web application security
Jin Castor
 

Destaque (20)

Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
social engineering
 social engineering social engineering
social engineering
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Social Engineering
Social Engineering Social Engineering
Social Engineering
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 
Kevin mitnick
Kevin mitnickKevin mitnick
Kevin mitnick
 
Cos 432 web_security
Cos 432 web_securityCos 432 web_security
Cos 432 web_security
 
Web application security
Web application securityWeb application security
Web application security
 
Web security
Web securityWeb security
Web security
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 

Semelhante a Presentation of Social Engineering - The Art of Human Hacking

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Infosecurity2010
 

Semelhante a Presentation of Social Engineering - The Art of Human Hacking (20)

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Social Engineering - By Chris Hills
Social Engineering - By Chris HillsSocial Engineering - By Chris Hills
Social Engineering - By Chris Hills
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social Engineering
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Module 9 (social engineering)
Module 9 (social engineering)Module 9 (social engineering)
Module 9 (social engineering)
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
LinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering ThreatLinkedIn to Your Network - The Social Engineering Threat
LinkedIn to Your Network - The Social Engineering Threat
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptxreport_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
report_ThhhhhhhhhhhhhhhhhhhhhTL TTL.pptx
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.ppt
 

Último

+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 

Último (20)

Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCRElite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.MODERN PODCASTING ,CREATING DREAMS TODAY.
MODERN PODCASTING ,CREATING DREAMS TODAY.
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCRElite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nizammuddin Delhi NCR
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 

Presentation of Social Engineering - The Art of Human Hacking

  • 1. Social Engineering The Art of Human Hacking www.facebook.com/realexninja
  • 3. Social Engineering: Content • Content: – What is social engineering? – Types of social engineering & new age threats – How to use Facebook to ruin someone’s life – Countermeasures – Q&A
  • 4. Social Engineering: Intro Which city is on the picture?
  • 6. Social Engineering: Intro • Victims of social engineering – RSA • Infected Excel attachment, over $100 million of damage – Well Fargo Bank • “Catholic Healthcare” phone call, $2.1 million vanished – Vodafone Help Desk • Malware and fraud call, end user lost everything
  • 8. Social Engineering: Basics to Succeed • What is social engineering? The attempt to control social behaviour. – The 3 Critical Success Factors: • trust • satisfaction • relationship
  • 10. Social Engineering: Basics to Succeed • The first “touch” with social engineering Happy mom Happy child
  • 11. Social Engineering: Basics to Succeed Good Evil
  • 12. Social Engineering: Types • Old-Fashioned Types of Social Engineering Techniques: – Direct approach – Important user – Helpless user – Technical support – Mail-outs – Social media - Facebook
  • 13. Social Engineering: Types • 1. Direct approach • 2. Important user
  • 14. Social Engineering: Types • 3. Helpless user • 4. Technical support
  • 15. Social Engineering: Types • 6. Social media• 5. Mail-outs
  • 16. Social Engineering: Types • New-Fashioned Types of Social Engineering Techniques: – 1. Phishing with new lethal-strains of ransomware
  • 17. Social Engineering: Types • New-Fashioned Types of Social Engineering Techniques: – 2. IVR and robocalls for credit card information Did you purchase a flat screen TV for $3,295? Press 1 for yes or 2 for no.
  • 18. Social Engineering: Types • New-Fashioned Types of Social Engineering Techniques: – 3. Phishing with funerals
  • 19. Social Engineering: Practical example How to use Facebook to ruin someone’s life (attack on an employee)
  • 20. Social Engineering: Practical example • 1st step: Protect your identity – Install new operation system on a new disk – Encrypt your disk – Use anonymous proxy – Use free Wi-Fi in a bar – Preform attack drinking cold beer
  • 21. Social Engineering: Practical example • 2nd step: Fake e-mail and Facebook account – The character must be: • Woman* • 25 to 35 years old • Single • High educated • Interesting * Statistically is proven that the success rate using a woman character is more than 100 times (!) higher then using a male profile.
  • 22. Social Engineering: Practical example • 3rd step: Select the victim(s) – Before sending the invitation: • Get him/her friends • Get him/her interests
  • 23. Social Engineering: Practical example • 4th step: Get the victim(s) as friend – Start chatting and get sensitive information – Start chat and get “sensitive” photos – Post link to an infected site – …
  • 24. Social Engineering: How to spot • How to spot Social Engineering attack? – unusual requirements – requiring respect for authority – threating with negative consequences – giving praise and flattery – offering something for nothing – seems too good to be true, etc…
  • 25. Social Engineering: Countermeasure • Social Engineering Countermeasure – Slow down and Research the facts – Delete any request for financial information or passwords. – Reject requests for help or offers of help – Don’t let a link in control of where you land – Do not post yours personal data or photos – Do not reveal sensitive data (e.g. passwords) – Do not avoid policies and procedures – Report any suspicious activity
  • 26. Social Engineering: Last Slide… Promise! • Questions and discussion “There is no such thing as a stupid question, only stupid answers“: Colin Powell www.facebook.com/realexninja
  • 27. Social Engineering: The end Thank you!

Notas do Editor

  1. Company HistoryFounded in 2000 – Founder Colm Lyon remains our CEO – still heavily involved.Key Focus on connecting CNP multi-channel merchants to banksPayment solutions,
  2. You probably remember the story of the Trojan War, because this war was one of the most important events in Greek mythology. You probably also remember that Achaean (ARKIJN) troops besieged the city of Troy for ten years without any results and a lot of soldiers died in vain. Because the raw Attack on Trojans technology or walls did not work, the army of Achaean decided to attack the Trojans mind. And then the city fell to the ruse of the Trojan Horse made by wood in just one day. Why the wooden trick was so efficient? Because of usage of the power of social engineering.
  3. An unidentified scammer managed to convince Well Fargo Bank to transfer $2.1 million to him from Catholic Healthcare West&apos;s bank account.&quot;The brazen theft was pulled off ingeniously, but the biggest responsibility for its successful realization seems to lay with the Wells Fargo escrow agent who authorized the transfer without thoroughly checking on the legitimacy of the requests,&quot; writes Help Net Security&apos;s ZeljkaZorz.&quot;Armed with the name of the bank where Catholic Healthcare West had the account and the name and signature of the chain&apos;s CFO, the fraudster put the plan in motion in December 2011, Forbes reports,&quot; Zorz writes.
  4. An unidentified scammer managed to convince Well Fargo Bank to transfer $2.1 million to him from Catholic Healthcare West&apos;s bank account.&quot;The brazen theft was pulled off ingeniously, but the biggest responsibility for its successful realization seems to lay with the Wells Fargo escrow agent who authorized the transfer without thoroughly checking on the legitimacy of the requests,&quot; writes Help Net Security&apos;s ZeljkaZorz.&quot;Armed with the name of the bank where Catholic Healthcare West had the account and the name and signature of the chain&apos;s CFO, the fraudster put the plan in motion in December 2011, Forbes reports,&quot; Zorz writes.
  5. CryptoDefense