Predict your next investment

GreatHorn company logo
INTERNET | Internet Software & Services / Monitoring & Security
greathorn.com

See what CB Insights has to offer

Founded Year

2015

Stage

Series B | Alive

Total Raised

$22.13M

Last Raised

$13M | 2 yrs ago

About GreatHorn

GreatHorn provides a cloud-based email security threat detection and response platform that safeguards organizations before, during, and after an email attack.

GreatHorn Headquarter Location

260 Charles St Ste 300

Waltham, Massachusetts, 02453,

United States

855-478-4676

Latest GreatHorn News

BEC attacks: Scammers’ latest tricks

Oct 18, 2021

BEC attacks: Scammers’ latest tricks BEC attacks are generally low-volume but, according to a recent survey by GreatHorn, 71% of organizations experienced at least one in the past year. Trend Micro’s latest research has revealed that scammers have been ramping up their efforts and that some have switched to impersonating and targeting ordinary employees instead of executives or ranking management personnel. “From our observations, BEC attacks don’t only target high-profile users but also any employee that can be found on social media networks with significant personal information published (such as LinkedIn). These pieces of information can be used to spoof employees and partners, and cause significant financial damage to businesses,” threat researchers and analysts Marshall Chen, Loseway Lu, Paul Pajares and Fyodor Yarochkin shared . BEC attacks are often difficult to detect Business email compromise (BEC) scams have been among the top three most lucrative cybercriminals schemes for the last several years . Email security solutions have trouble detecting BEC scam emails because they are targeted toward specific recipients, generally don’t include malicious attachments or links, and often begin with innocuous requests. Also, the scammers use various other tricks, such as inserting spaces in between words (“I NVOICE” istead of “INVOICE”). Intended targets, on the other hand, often fail to spot that these emails have spoofed senders / use spoofed email addresses, or don’t find the various email addresses / domains the scammers use suspect. Tricks employed by the scammers One of the tricks employed by BEC scammers is to register domain names with telecommunications industry-related keywords and names of service providers: sprint-mobile.net, 5g-tmobile.com, verizone4g-device.com, and so on. Another is registering domains with lengthy names, common keywords, and new generic top-level domain (TLD) words: servermail-reply-office-works-secure-protecty-inbound-netsuite.one, systerm-proctection-outlook.management, reply-netsuite-mails.management, etc. Sometimes the scammers will use other trust-inducing keywords in email addresses, such as mail_ceoofficial, chiefexecutiveoffice, officepresident and offshoreoffice. To less tech-savvy employees, seeing some of these keywords is enough to consider the email legitimate and trustworthy. Some may even be fooled by the scammers’ use of free email services such as Gmail, Hotmail, and Outlook, since we’re all used to receiving legitimate emails from those popular email services. Aside from free email services, BEC scammers also take advantage of: Local email services (e.g., virginmedia.com in the UK, or naver.com in South Korea); Encrypted email services (e.g., Tutanota, Protonmail, Cryptex); Self-registered domains and direct-to featured email service, so they can create look-alike domains (e.g., trendmjcro.com), local-looking ones (e.g., example-tw.com), and take advantage of positive email authentication ( SPF , DKIM ) results; and Stolen email credentials, to spam and reply to previous email conversations (especially finance- or purchase-themed threads). Since security solutions can’t detect and block every BEC attack, it’s on companies to keep their workforce regularly updated on the latest scammers’ techniques and trained in spotting them and reporting them to IT or IT security teams. Daily Newsletter - E-mail sent every business day with a recap of the last 24 hours Weekly Newsletter - E-mail sent every Monday with a recap of the last 7 days (IN)SECURE Magazine - E-mail sent when a new issue is released

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing GreatHorn

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned GreatHorn in 2 CB Insights research briefs, most recently on Apr 2, 2020.

Expert Collections containing GreatHorn

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

GreatHorn is included in 2 Expert Collections, including Artificial Intelligence.

A

Artificial Intelligence

7,895 items

This collection includes startups selling AI SaaS, using AI algorithms to develop their core products, and those developing hardware to support AI workloads.

C

Cybersecurity

4,725 items

GreatHorn Patents

GreatHorn has filed 1 patent.

The 3 most popular patent topics include:

  • Computer security
  • Email
  • Social networking services
patents chart

Application Date

Grant Date

Title

Related Topics

Status

5/23/2016

6/11/2019

Email, Videotelephony, Voice over IP, Computer security, Social networking services

Grant

Application Date

5/23/2016

Grant Date

6/11/2019

Title

Related Topics

Email, Videotelephony, Voice over IP, Computer security, Social networking services

Status

Grant

GreatHorn Web Traffic

Rank
Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

GreatHorn Rank

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.