Everyone who uses email should be aware of the man-in-the-email scam. In this scheme, a hacker compromises a user’s email and gains access to the email traffic. The attacker can view some or all of the email traffic depending on the method of compromise. The hacker then waits for the right opportunity to strike—often by altering a legitimate email chain or impersonating a legitimate email user.

This attack can be used to trick a user into providing confidential information (computer credentials, personal information, or trade secrets), but it is most often used to trick users into unknowingly sending money to the attacker. Imagine that the attacker sees that two business partners are discussing an upcoming financial transaction. The attacker gains access to a company’s email and inserts himself into the email chain, impersonating each user to the other and requesting the payment be provided to a different bank. An attacker who has monitored prior emails can have detailed knowledge of the transaction, which makes for a convincing fake email. Because the attacker is impersonating each user to the other, often no one figures out the scam until after the money has already been transferred out of the country.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]