Business Email Compromise…How Do You Prevent It…?

ImageSource:https://trustifi.com/business

The fact that criminals are actively using e-mail schemes to defraud public institutions, small and large businesses, and their clients can be considered yesterday’s news. Most corporate financial transactions are nowadays digital and this is leading to an increase in financial crime from cyber fraud. The BEC term covers a wide variety of malevolent behavior, but all forms of Business Email Compromise have one thing in common: they need to get access to a business email account or to fake it.

What Is BEC?

Business Email Compromise (BEC) is a type of targeted scam in which an attacker impersonates a company executive or high-level employee with the intent of defrauding or extracting sensitive data from the company or its partners. The end goal of a BEC fraud is to persuade the target to make a money transfer or send sensitive data to the attacker while believing they are executing a legitimate and regular business operation.

Attackers achieve this by using different manipulating techniques to trick users into providing money or data.

ImageSource:https://www.fbi.gov/image

How a BEC Scam Works

Well, like all social engineering attacks, BEC fraud relies on the human factor to be successful. This means that the innate human tendency to be a social creature is what will be exploited here. Because people have a natural desire to be helpful and prove their usefulness, therefore likely to become victims of BEC attacks. The impulse to say ‘yes’ fast to a request from your management overrides the need to double-check if everything is in order with that request in the first place.  In most BEC attacks, there are three major stages:

Target Research

Also known as the “man-in-the-email” attack, BEC scams start with a large amount of research, with the attacker going through publicly available information about the company, like websites, press releases, or social media published content.

Planning

After diligently researching his targets for some time, the attacker will develop a few scam scenarios that might work.

The attacker will try to either obtain access to the email addresses of the influential people in the company or just impersonate them. By creating an email address with a spoofed domain and just adding 1 digit or one letter in the domain name you could become a victim.

Attack Execution

Depending on the adversary’s thoroughness, the BEC assault can occur in a single email or throughout an entire thread. To earn the victim’s trust, this communication frequently employs persuasion, urgency, and authority. The attacker then gives the victim instructions to either make a money transfer or send sensitive data.

Most Common Types of BEC Attacks

The Bogus Invoice Scheme

In this specific scam companies working with foreign suppliers are often targeted. The attackers pretend to be suppliers requesting fund transfers for payments to an account owned by fraudsters.

CEO Fraud

After collecting the necessary data, attackers will behave as the company CEO or any high-level executive and send an email to employees in finance, requesting money transfers to the account they control.

Email Account Compromise (EAC)

An executive or employee’s email account is hacked and used to request invoice payments to vendors listed in their email contacts. Payments are then sent to fraudulent bank accounts.

Attorney Impersonation

There are cases when attackers are pretending to be a lawyer or someone from a law firm that is supposedly in charge of crucial and confidential data. These types of requests are done usually through email or phone and take place at the end of the business day when the victim is tired and less focused.

Data Theft

This type of scam usually targets employees from the HR and bookkeeping departments. The employees are targeted to obtain personally identifiable information (PII) or tax statements of employees and executives, important data that can be used in future attacks.

Business Email Compromise Statistics and Examples

In July 2019, the city of Atlanta lost over $800,000 just because of two simple emails from scammers. Using rudimentary phishing techniques, the fraudulent party simply got the city administration employees to wire two huge transfers into their accounts. In our experience, BEC fraudsters have begun to target institutions more and more, precisely because their awareness of Business Email Compromise is lower, and their defense systems tend to be underdeveloped compared to those of businesses.

In 2017, over 77% of all companies experienced fraud via a BEC attack. Since Q4 2017 and Q4 2018, there’s been a spike of 476% in all business email compromise attempts, according to Proofpoint. That’s a pretty explosive growth rate and it’s a growth fed only by how well these tactics work.

In the autumn of 2018, the Australian authorities also reported noticing a significant spike in all business email compromise incidents. In one case, a business owner lost $40,000 by paying a fake invoice to a supplier whose account had been compromised.

Some malicious hackers behind these attacks, like the London Blue group, are continuously specializing in perfecting their technique. Recent March reports indicate that BEC attacks may be moving to mobile lately, under the guise of SMS texts. In any case, the market for BEC opportunities remains ripe and will probably continue growing in the future, since other types of cyberattacks are costlier and require more technical knowledge than the basic BECs.

How to prevent Business Email Compromise

1. Train your employees

An extremely important step an organization must take in safeguarding against BEC is to provide employees with adequate cybersecurity training. Employees should be aware of the risks and implications that these attacks hold, as well as how to spot scams and properly respond to an incident of this sort.

BEC attacks have a high success rate not because they are so technologically sophisticated, but because they are exploiting human vulnerabilities, like a response to authority, schedule, or even tiredness. You can mitigate these risks using clear communication of roles and expectations whilst providing appropriate guidance in the use of IT and accounting controls.

Cybersecurity risks come in a wide variety of shapes and sizes, making it critical to recognize, disclose, and properly respond to a cyber threat. Although it may seem obvious, human error is responsible for 95% of effective cyber-attacks. Managers should bear in mind that hackers don’t just break into the IT department by sheer force; they look for weaknesses. As a result, every job in the organization is responsible for cybersecurity knowledge and abilities.

Making cyber security everyone’s responsibility is extremely important, therefore you should include management and IT in your education program, as well as have regular cyber security sessions, and of course create specific rules for email, internet browsing, social networks, and mobile devices. There’s indeed no foolproof method that you can use to protect your business, but educating your employees about security threats and best practices for online behavior and privacy can greatly reduce the possibility of a BEC scam.

2. Encourage employees to challenge suspicious requests

Sometimes employees tend to rush an action or a response, therefore training them to double-check before executing a task could reduce the risk of being compromised by a cyber attack. Let’s take as an example an email coming from a senior executive in the company in which a large amount of money is requested urgently.

Employees should understand that it’s better to delay the payment than to be scammed and take the proper steps in making sure the request that came their way is legit. Another aspect that needs to be better applied and understood, especially when discussing larger companies, is to make employees feel comfortable to contact their managers, not only via email but also using alternative communication tools like internal chat systems, SMS, and even phone calls.

Any organization requires effective communication. Organizations must have complete policies and methods for communicating with their constituents, workers, and stakeholders, as well as the general public, to be successful.

3. Payments approval process

Organizations should start mapping the existing workflow used for wire transfers and analyze in-depth their processes to identify potential weaknesses and enhancement opportunities, for example limiting the amount of money each executive can approve, or using authorization for wire transfers, that also includes a protocol for approvals in the specific cases where senior executives are the initiators of these transactions.

4. Deploy cybersecurity solutions

Raising employee awareness about scams and BEC fraud is always a good idea, but businesses shouldn’t rely solely on this.

Having at least basic email security in place and two-factor authentication is a must. You Should also make sure to update your security software regularly and keep a backup of your data.

Conclusion

In the end what is most important is to stay informed and tread on the World wide Web cautiously. Before you click,double-check.

Total
0
Shares
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
Prev
Facebook Black Monday!!! Blames Outage On Faulty Router Configuration…

Facebook Black Monday!!! Blames Outage On Faulty Router Configuration…

One easily disproved conspiracy theory linked the ~six-hour outage to a supposed

Next
3 Tips To Help You Secure Your Devices And Accounts Online

3 Tips To Help You Secure Your Devices And Accounts Online

Securing your Device Online If you haven’t heard this from me already, October

You May Also Like
0
Would love your thoughts, please comment.x
()
x