Article
How to Spot and Avoid Man-in-the-Email Hacking
Article
June 1, 2016
Reprinted with permission from Texas Lawyer. Any opinions in this article are not those of Winston & Strawn or its clients. The opinions in this article are the author’s opinions only.
Everyone who uses email should be aware of the man-in-the-email scam. In this scheme, a hacker compromises a user's email and gains access to the email traffic. The attacker can view some or all of the email traffic depending on the method of compromise. The hacker then waits for the right opportunity to strike—often by altering a legitimate email chain or impersonating a legitimate email user.