Business email compromise (BEC) schemes
Estimated reading time: 7 minutes
Over the years, scammers have stolen millions of dollars from businesses by compromising their official email accounts and using them to request fraudulent wire transfers . Technically these schemes, which are in effect scams, are called Business Email Compromise .
There has been an increase in cyber intrusions related to Business Email Compromise schemes, involving scammers posing as executives . Contact is made by sending phishing e-mails from seemingly legitimate sources and then wire transfers to fraudulent accounts are requested. These methods ultimately lead to intrusion and unrestricted access to their victims’ credentials.
What is meant by Business Email Compromise?
The FBI defines Business Email Compromise (BEC) as a sophisticated scam that targets companies that work with foreign suppliers and companies that regularly make payments by wire transfer. Formerly known as Man-in-the-Email scams, these schemes compromise official corporate email accounts to conduct unauthorized funds transfers.
According to the FBI, victims lost more than $ 750 million and affected more than 7,000 people between October 2013 and August 2015. Globally, cybercriminals defrauded more than $ 50 million from victims in non-American countries.
How does it work?
BEC scams often start with an attacker compromising a business executive’s email account or any publicly listed business email. This is usually done using a keylogger or phishing methods , where attackers create a domain that is similar to the corporate one they are targeting. In other cases, a spoofed email tricking the target into providing account details is sufficient.
After monitoring the compromised email account, the scammer will try to determine who initiates the wire transfers and who requests them . Scammers often carry out a fair amount of research, looking for a company that has had a leadership change in the financial function management, where executives are on the road, or conducts conference calls for investors. Attackers use these as opportunities to execute the pattern.
At this point, the attack can be done in several ways.
Version 1: The bogus invoice
This release, which has also been called “ The Bogus Invoice Scheme “, “ The Supplier Swindle “, and “ Invoice Modification Scheme “usually involves a company that has a stable relationship with a supplier . The scammer asks to transfer the funds for the payment of the bill to an alternative and fraudulent account by e-mail, telephone or fax.
Version 2: CEO Fraud
In this version, scammers identify themselves as senior executives (CFO, CEO, CTO, etc.), lawyers or other types of legal representatives and claim to handle confidential matters or urgent and require you to make a wire transfer to an account they control. In some cases, the fraudulent wire transfer request is sent directly to the financial institution with instructions to urgently send the funds to another institution. This scam is also known as “ CEO Fraud “, “ Business Executive Scam “, “ Masquerading “, and “ Financial Industry Wire Frauds “.
Version 3: Account Compromise
Similar to the other two versions, an employee email account is hacked and then used to make requests for payment of bills to bank accounts controlled by scammers . Messages are sent to multiple vendors identified from the employee’s contact list. The company may not be aware of the scheme until their suppliers perform checks on the invoice payment status.
Version 4: The fake lawyer
In this version, the cybercriminal contacts employees and / or the CEO of the company and identifies himself as a lawyer or representative of a law firm, claiming to handle confidential and urgent matters. This contact, typically made by phone or email, prompts the contacted party to act quickly or covertly in handling the transfer of funds.
This type of Business Email Compromise pattern can be scheduled to occur at the end of the day or work week, when employees are preparing to quit and therefore are particularly sensitive to a situation. emergency.
Version 5: Data theft
This scheme involves emails from employees with specific roles in the company used to send requests . This time, however, the requests are not for transfers of funds but for personally identifiable information of other employees and executives . This variant can therefore serve as a starting point for more elaborate and malicious BEC attacks against the company.
The scam is primarily social engineering and generally does not need sophisticated system penetration . Unlike phishing scams, emails used in BEC scams are not sent in bulk to avoid being reported as spam . Victims are tricked into making transfers, usually instructed to act quickly and confidentially when transferring funds.
Some known cases
In March 2016, an increasing number of companies and businesses suffered damage from BEC schemes. Companies like Seagate and Snapchat have been among the victims of email scams using the same modus operandi . At the end of the same month, San Francisco-based Pivotal Software was hacked through a phishing scheme that leaked an unknown amount of employee tax information .
The breach was initiated by an email that appeared to come from company CEO Rob Mee, requesting information about the company’s personnel. This resulted in the delivery of the employee information W-2 . This information included addresses, previous year’s income details, social security numbers and individual taxpayer identification numbers. The recipient of the data, needless to say, was not authorized to request or receive data of this nature.
Not long after this incident, similar schemes were used to obtain personal information in the education sector. W-2 information of 3,000 employees at Tidewater Community College, Virginia was leaked. The event was sparked by a request message from the principal of Kentucky State University, received by one of the school staff members. The request prompted staff to forward a list of employees and students along with W-2 information.
Scams involving the theft of personal information via phishing emails have proven to be an inexhaustible source of data. The stolen data could be sold and also used to stage future attacks or identity theft. As seen in recent and previous tax scams, email scams have become one of the fastest ways to fool unwitting users.
How to defend yourself?
The advice is always the same: stay vigilant and educate employees on how to avoid being victims of BEC scams and other phishing attacks .
It’s important to know that cybercriminals don’t care about the size of your company. Indeed, usually, the more victims there are, the better. These types of scammers don’t need to be highly technical as they can find tools and services that meet all levels of technical proficiency in the deep web . As the world relies more and more on cloud services and in general linked to each other, a single compromised account is all it takes to obtain large amounts of money or data from a company .
- Review all emails carefully. Be wary of emails sent by company executives, as they are often used to trick employees into taking urgent action. Review emails requesting funds transfer to determine if requests are irregular.
- Educate and train employees . While employees are a company’s greatest asset, they are usually also the weakest link when it comes to security . Make a commitment to train employees according to the best practices of the company. Remind them that adhering to company policies is one thing, but developing good safety habits is another. For this we offer a ethical phishing service geared towards education against Business Email Compromise schemes and phishing in general.
- Stay up to date with customer habits , including details and reasons for payments.
- If you suspect that you have been the victim of a BEC email, < strong> immediately report the incident to the police. Also, alert your company so they can raise their guard and tighten controls.
SOD can help you train your employees. Find out how by contacting us, we will be happy to answer any questions.
- Hadoop Open Data Model: “open” data collection
- Pass the Ticket: how to mitigate it with a SOCaaS
- Use cases of a SOCaaS for companies part 2
- Use cases of a SOCaaS for companies part 1
- NIST Cybersecurity Framework
- “Left of boom” and “right of boom”: having a winning strategy
- Smishing: a fraud similar to phishing
- Network Traffic Analyzer: an extra gear for the Next Gen SIEM
- Backup as a Service (2)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (20)
- Conferenza Cloud (4)
- ICT Monitoring (4)
- Log Management (2)
- News (18)
- ownCloud (4)
- Privacy (7)
- Secure Online Desktop (14)
- Security (14)
- Web Hosting (15)
- How We Can Narrow the Talent Shortage in Cybersecurity October 25, 2021Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting traditional job descriptions.
- Ransomware Rise Pushes Organizations to Prepare for Attack October 23, 2021Ransomware attacks continue to grow in number and severity, data shows, but organizations are stepping up to prepare for the threat.
- aDolus Raises $2.5M to Secure Critical Infrastructure and Grow Sales and Marketing Team October 22, 2021Software supply chain security experts to drive aggressive go-to-market strategy
- 'TodayZoo' Phishing Kit Cobbled Together From Other Malware October 22, 2021Microsoft's analysis of a recent phishing attack shows how cybercriminals are mixing and matching to efficiently develop their attack frameworks.
- 7 Ways to Lock Down Enterprise Printers October 22, 2021Following the PrintNightmare case, printer security has become a hot issue for security teams. Here are seven ways to keep printers secure on enterprise networks.
- What Does Better Insider Risk Management Look Like? October 22, 2021Conventional data security tools do not address insider risk — a growing problem in today's remote-hybrid world. We need a better way to manage insider risk.
- What Squid Game Teaches Us About Cybersecurity October 22, 2021When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.
- Google Buckles Down on Android Enterprise Security October 21, 2021The launch of Android 12 brings several new default security features, along with new security efforts for Android Enterprise.
- Malware Abuses Core Features of Discord October 21, 2021Researchers warn that Discord's bot framework can be easily weaponized.
- Cybrary Launches New Partnership with Check Point Software to Make Cybersecurity Training Accessible to All October 21, 2021Online cybersecurity professional development platform bolsters the Check Point Education Initiative.
- [CSA-2021-003] Remote Code Execution in GridPro Request Management for Windows Azure Pack October 22, 2021Posted by Certitude - Advisories on Oct 22~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ Certitude Securtiy Advisory - CSA-2021-003 ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ PRODUCT […]
- Onapsis Security Advisory 2021-0020: SAP Enterprise Portal - Exposed sensitive data in html body October 22, 2021Posted by Onapsis Research via Fulldisclosure on Oct 22# Onapsis Security Advisory 2021-0020: SAP Enterprise Portal - Exposed sensitive data in html body ## Impact on Business One HTTP endpoint of the portal exposes sensitive information that could be used by an attacker with administrator privileges, in conjunction with other attacks (e.g. XSS). ## Advisory […]
- Onapsis Security Advisory 2021-0019: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP IGS service October 22, 2021Posted by Onapsis Research via Fulldisclosure on Oct 22# Onapsis Security Advisory 2021-0019: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP IGS service ## Impact on Business An unauthenticated attacker without specific knowledge of the system can send a specially crafted packet over a network which will trigger an internal error in the system […]
- Onapsis Security Advisory 2021-0018: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Gateway service October 22, 2021Posted by Onapsis Research via Fulldisclosure on Oct 22# Onapsis Security Advisory 2021-0018: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Gateway service ## Impact on Business An unauthenticated attacker without specific knowledge of the system can send a specially crafted packet over a network which will trigger an internal error in the system […]
- Onapsis Security Advisory 2021-0017: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Enqueue service October 22, 2021Posted by Onapsis Research via Fulldisclosure on Oct 22# Onapsis Security Advisory 2021-0017: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Enqueue service ## Impact on Business An unauthenticated attacker without specific knowledge of the system can send a specially crafted packet over a network which will trigger an internal error in the system […]
- Onapsis Security Advisory 2021-0016: XXE in SAP JAVA NetWeaver System Connections October 22, 2021Posted by Onapsis Research via Fulldisclosure on Oct 22# Onapsis Security Advisory 2021-0016: XXE in SAP JAVA NetWeaver System Connections ## Impact on Business A high-privileged SAP JAVA NetWeaver user is able to abuse an XXE vulnerability with the goal of reading files from the OS (compromising confidentiality) and/or making system processes crash (compromising availability). […]
- Onapsis Security Advisory 2021-0015: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Dispatcher service October 22, 2021Posted by Onapsis Research via Fulldisclosure on Oct 22# Onapsis Security Advisory 2021-0015: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Dispatcher service ## Impact on Business An unauthenticated attacker without specific knowledge of the system can send a specially crafted packet over a network which will trigger an internal error in the system […]
- Backdoor.Win32.LanaFTP.k / Heap Corruption October 19, 2021Posted by malvuln on Oct 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/e2660742a80433e027ee9bdedc40e190.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.LanaFTP.k Vulnerability: Heap Corruption Description: The malware listens on TCP port 1075. Third-party attackers who can reach the server can send a specially crafted sequential payload causing a heap corruption. Type: […]
- Backdoor.Win32.LanFiltrator.11.b / Unauthenticated Remote Command Execution October 19, 2021Posted by malvuln on Oct 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/9f87546e667e5af59a8580ddf7fd43c7.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.LanFiltrator.11.b Vulnerability: Unauthenticated Remote Command Execution Description: The malware listens on TCP ports 999, 888. Third-party attackers who can reach the system can execute commands made available by the malware....
- Virus.Win32.Ipamor.c / Unauthenticated Remote System Reboot October 19, 2021Posted by malvuln on Oct 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/bbf032a3aa288f02403295f0472d1f05.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Virus.Win32.Ipamor.c Vulnerability: Unauthenticated Remote System Reboot Description: The malware listens on UDP port 139. Third-party attackers can send a single uppercase char "D" datagram packet to the infected machine causing it […]
Tempo di lettura: 5 minUtilizzo del Machine Learning per proteggere i dati Introdotto nel gennaio 2017, Acronis Act… https://t.co/mhqalBxm8D
Gli attacchi informatici sono numerosi e non fanno distinzione tra aziende e singoli individui quando prendono di m… https://t.co/uOucUWZf7W
Estimated reading time: 5 minutes SNYPR è uno strumento di analisi della sicurezza in grado di trasformare i Big… https://t.co/oies7e0nYY
Estimated reading time: 5 minutes Con l’avvento delle piattaforme di big data, le aziende che si occupano di sicu… https://t.co/MSvA0dPgiE
Estimated reading time: 5 minutes With the advent of big data platforms, IT security companies can now make guid… https://t.co/aTv41eq2Ir