c Giacomo Lanzi

Business email compromise (BEC) schemes

Estimated reading time: 7 minutes

Over the years, scammers have stolen millions of dollars from businesses by compromising their official email accounts and using them to request fraudulent wire transfers . Technically these schemes, which are in effect scams, are called Business Email Compromise .

There has been an increase in cyber intrusions related to Business Email Compromise schemes, involving scammers posing as executives . Contact is made by sending phishing e-mails from seemingly legitimate sources and then wire transfers to fraudulent accounts are requested. These methods ultimately lead to intrusion and unrestricted access to their victims’ credentials.

What is meant by Business Email Compromise?

The FBI defines Business Email Compromise (BEC) as a sophisticated scam that targets companies that work with foreign suppliers and companies that regularly make payments by wire transfer. Formerly known as Man-in-the-Email scams, these schemes compromise official corporate email accounts to conduct unauthorized funds transfers.

According to the FBI, victims lost more than $ 750 million and affected more than 7,000 people between October 2013 and August 2015. Globally, cybercriminals defrauded more than $ 50 million from victims in non-American countries.

Business email compromise email received

How does it work?

BEC scams often start with an attacker compromising a business executive’s email account or any publicly listed business email. This is usually done using a keylogger or phishing methods , where attackers create a domain that is similar to the corporate one they are targeting. In other cases, a spoofed email tricking the target into providing account details is sufficient.

After monitoring the compromised email account, the scammer will try to determine who initiates the wire transfers and who requests them . Scammers often carry out a fair amount of research, looking for a company that has had a leadership change in the financial function management, where executives are on the road, or conducts conference calls for investors. Attackers use these as opportunities to execute the pattern.

At this point, the attack can be done in several ways.

Version 1: The bogus invoice

This release, which has also been called “ The Bogus Invoice Scheme “, “ The Supplier Swindle “, and “ Invoice Modification Scheme “usually involves a company that has a stable relationship with a supplier . The scammer asks to transfer the funds for the payment of the bill to an alternative and fraudulent account by e-mail, telephone or fax.

Version 2: CEO Fraud

In this version, scammers identify themselves as senior executives (CFO, CEO, CTO, etc.), lawyers or other types of legal representatives and claim to handle confidential matters or urgent and require you to make a wire transfer to an account they control. In some cases, the fraudulent wire transfer request is sent directly to the financial institution with instructions to urgently send the funds to another institution. This scam is also known as “ CEO Fraud “, “ Business Executive Scam “, “ Masquerading “, and “ Financial Industry Wire Frauds “.

Version 3: Account Compromise

Similar to the other two versions, an employee email account is hacked and then used to make requests for payment of bills to bank accounts controlled by scammers . Messages are sent to multiple vendors identified from the employee’s contact list. The company may not be aware of the scheme until their suppliers perform checks on the invoice payment status.

Version 4: The fake lawyer

In this version, the cybercriminal contacts employees and / or the CEO of the company and identifies himself as a lawyer or representative of a law firm, claiming to handle confidential and urgent matters. This contact, typically made by phone or email, prompts the contacted party to act quickly or covertly in handling the transfer of funds.

This type of Business Email Compromise pattern can be scheduled to occur at the end of the day or work week, when employees are preparing to quit and therefore are particularly sensitive to a situation. emergency.

Version 5: Data theft

This scheme involves emails from employees with specific roles in the company used to send requests . This time, however, the requests are not for transfers of funds but for personally identifiable information of other employees and executives . This variant can therefore serve as a starting point for more elaborate and malicious BEC attacks against the company.

The scam is primarily social engineering and generally does not need sophisticated system penetration . Unlike phishing scams, emails used in BEC scams are not sent in bulk to avoid being reported as spam . Victims are tricked into making transfers, usually instructed to act quickly and confidentially when transferring funds.

Business email compromise phishing

Some known cases

In March 2016, an increasing number of companies and businesses suffered damage from BEC schemes. Companies like Seagate and Snapchat have been among the victims of email scams using the same modus operandi . At the end of the same month, San Francisco-based Pivotal Software was hacked through a phishing scheme that leaked an unknown amount of employee tax information .

The breach was initiated by an email that appeared to come from company CEO Rob Mee, requesting information about the company’s personnel. This resulted in the delivery of the employee information W-2 . This information included addresses, previous year’s income details, social security numbers and individual taxpayer identification numbers. The recipient of the data, needless to say, was not authorized to request or receive data of this nature.

Not long after this incident, similar schemes were used to obtain personal information in the education sector. W-2 information of 3,000 employees at Tidewater Community College, Virginia was leaked. The event was sparked by a request message from the principal of Kentucky State University, received by one of the school staff members. The request prompted staff to forward a list of employees and students along with W-2 information.

Scams involving the theft of personal information via phishing emails have proven to be an inexhaustible source of data. The stolen data could be sold and also used to stage future attacks or identity theft. As seen in recent and previous tax scams, email scams have become one of the fastest ways to fool unwitting users.

Business email compromise

How to defend yourself?

The advice is always the same: stay vigilant and educate employees on how to avoid being victims of BEC scams and other phishing attacks .

It’s important to know that cybercriminals don’t care about the size of your company. Indeed, usually, the more victims there are, the better. These types of scammers don’t need to be highly technical as they can find tools and services that meet all levels of technical proficiency in the deep web . As the world relies more and more on cloud services and in general linked to each other, a single compromised account is all it takes to obtain large amounts of money or data from a company .

Some suggestions

  • Review all emails carefully. Be wary of emails sent by company executives, as they are often used to trick employees into taking urgent action. Review emails requesting funds transfer to determine if requests are irregular.
  • Educate and train employees . While employees are a company’s greatest asset, they are usually also the weakest link when it comes to security . Make a commitment to train employees according to the best practices of the company. Remind them that adhering to company policies is one thing, but developing good safety habits is another. For this we offer a ethical phishing service geared towards education against Business Email Compromise schemes and phishing in general.
  • Stay up to date with customer habits , including details and reasons for payments.
  • If you suspect that you have been the victim of a BEC email, < strong> immediately report the incident to the police. Also, alert your company so they can raise their guard and tighten controls.

SOD can help you train your employees. Find out how by contacting us, we will be happy to answer any questions.

Link utili:

Link utili:

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading

RSS Full Disclosure

  • APPLE-SA-2023-01-24-1 tvOS 16.3 January 27, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 26APPLE-SA-2023-01-24-1 tvOS 16.3 tvOS 16.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213601. AppleMobileFileIntegrity Available for: Apple TV 4K (all models) and Apple TV HD Impact: An app may be able to access user-sensitive data Description: This issue was addressed […]
  • [SYSS-2022-047] Razer Synapse - Local Privilege Escalation January 27, 2023
    Posted by Oliver Schwarz via Fulldisclosure on Jan 26Advisory ID: SYSS-2022-047 Product: Razer Synapse Manufacturer: Razer Inc. Affected Version(s): Versions before 3.7.0830.081906 Tested Version(s): 3.7.0731.072516 Vulnerability Type: Improper Certificate Validation (CWE-295) Risk Level: High Solution Status: Open Manufacturer Notification: 2022-08-02 Solution Date: 2022-09-06 Public Disclosure:...
  • [RT-SA-2022-002] Skyhigh Security Secure Web Gateway: Cross-Site Scripting in Single Sign-On Plugin January 26, 2023
    Posted by RedTeam Pentesting GmbH on Jan 26RedTeam Pentesting identified a vulnerability which allows attackers to craft URLs to any third-party website that result in arbitrary content to be injected into the response when accessed through the Secure Web Gateway. While it is possible to inject arbitrary content types, the primary risk arises from JavaScript […]
  • t2'23: Call For Papers 2023 (Helsinki, Finland) January 24, 2023
    Posted by Tomi Tuominen via Fulldisclosure on Jan 23Call For Papers 2023 Tired of your bosses suspecting conference trips to exotic locations being just a ploy to partake in Security Vacation Club? Prove them wrong by coming to Helsinki, Finland on May 4-5 2023! Guaranteed lack of sunburn, good potential for rain or slush. In […]
  • Re: HNS-2022-01 - HN Security Advisory - Multiple vulnerabilities in Solaris dtprintinfo and libXm/libXpm January 24, 2023
    Posted by Marco Ivaldi on Jan 23Hello again, Just a quick update. Mitre has assigned the following additional CVE IDs: * CVE-2023-24039 - Stack-based buffer overflow in libXm ParseColors * CVE-2023-24040 - Printer name injection and heap memory disclosure We have updated the advisory accordingly: https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt Regards, Marco
  • APPLE-SA-2023-01-23-8 Safari 16.3 January 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-8 Safari 16.3 Safari 16.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213600. WebKit Available for: macOS Big Sur and macOS Monterey Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: The issue was addressed with […]
  • APPLE-SA-2023-01-23-7 watchOS 9.3 January 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-7 watchOS 9.3 watchOS 9.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213599. AppleMobileFileIntegrity Available for: Apple Watch Series 4 and later Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened […]
  • APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3 January 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3 macOS Big Sur 11.7.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213603. AppleMobileFileIntegrity Available for: macOS Big Sur Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling […]
  • APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 January 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 macOS Monterey 12.6.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213604. AppleMobileFileIntegrity Available for: macOS Monterey Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened runtime. CVE-2023-23499: […]
  • APPLE-SA-2023-01-23-4 macOS Ventura 13.2 January 24, 2023
    Posted by Apple Product Security via Fulldisclosure on Jan 23APPLE-SA-2023-01-23-4 macOS Ventura 13.2 macOS Ventura 13.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213605. AppleMobileFileIntegrity Available for: macOS Ventura Impact: An app may be able to access user-sensitive data Description: This issue was addressed by enabling hardened runtime. CVE-2023-23499: […]

Customers

Newsletter