Domain typosquatting is commonly used to spread malware to users whom accidentally misspell a legitimate domain in their web browser. A new twist to domain typosquatting is applying the same human element issue to email and other network based services.
How many people would notice that they sent an email to the wrong place? What type of data could one passively gather from emails missent to the wrong domain? Would someone ever attempt to authenticate to the wrong machine?
In this presentation we will cover two email attack vectors that stem from Doppelganger Domains, show real world examples of what can type of data can be leaked and discuss how you can protect your company in the future.