SlashNext's Generative AI and Session Emulation (SEER) technologies employ Natural Language Processing (NLP) and Computer Vision to thoroughly inspect suspicious websites and email content. These advanced detection tools allow SlashNext to identify over 30 types of phishing and social engineering attacks, as well as four categories of unsolicited commercial emails (Spam and Bulk Mail). Many of these threats have not been extensively researched, and their classification and names have been developed through detailed research by SlashNext Labs.
We recommend that anyone considering SlashNext products review this document thoroughly to fully understand the nature and risk level associated with each threat.
Business Email Compromise (BEC) attacks are designed to commit financial fraud against organizations. These attacks commonly involve impersonating trusted individuals via email, such as colleagues, superiors, or vendors, to execute various fraudulent schemes like Invoice Fraud, Payroll Theft, Unauthorized wire scams, and more. By exploiting established professional relationships, these scams deceive employees, resulting in substantial financial losses or the exposure of sensitive information for the targeted organization.
Spam and BulkMail are unsolicited emails sent without the recipient's explicit permission. These are primarily sent for commercial purposes. The content often includes advertisements for various products, services, or upcoming events. While spam is not inherently malicious, it can still overwhelm inboxes. This can significantly reduce the productivity of individual users. IT teams tasked with managing these messages also face increased challenges.
Emails with phishing links direct users to malicious content, including sites designed for stealing credentials, those laden with malware, deceptive sites promising free gifts, and pages that falsely intimidate users for baseless reasons.
Often, these emails imitate genuine communications from credible sources like banks, social media platforms, or even colleagues and employers, aiming to convince recipients that the request is legitimate and requires immediate attention.
Phishing attachments often carry various forms of malicious content, including malware, phishing links, HTML pages designed for phishing, and messages crafted through social engineering. These attachments typically disguise themselves as harmless files, such as documents or ZIP files. The accompanying email usually features a social engineering message designed to entice users into downloading and opening these seemingly harmless attachments.
Social Engineering (SE)
Social engineering scams target individuals rather than businesses. These schemes exploit human psychology to deceive victims. Examples include phony job offers, where victims pay up front for non-existent positions, buying scams involving fraudulent online sales, and deceptive investment opportunities that promise high returns with minimal risk. Such scams manipulate trust and urgency to trick individuals. The goal is to capitalize on the victim's hopes or fears, leading to financial loss or compromised personal information.
Social Engineering Threat Types