Business Email Compromise

Caleb Boma | August 23rd, 2021

 

In a 2021 survey of over 1,400 CISOs conducted by Proofpoint, 70% of UAE CISOs believe human error is their organization’s biggest cybersecurity vulnerability. This makes sense because globally, CISOs believe Business Email Compromise (BEC) will be the biggest cybersecurity threat in the next year.

Formerly dubbed as man-in-the-middle email scams, BEC attackers rely heavily on social engineering tactics to trick unsuspecting employees and executives. Quite often, the attackers impersonate CEO’s or any executive authorized to do wire transfers. Business email compromises cost businesses money, time, and reputation. According to the FBI, business email compromises are a “$26 billion scam,” that affects thousands of businesses a year.  Some sample email messages have subject lines containing such words as “request payment, transfer, and urgent.”

There are 5 types of BEC scams:

  1. The bogus invoice schemes
  2. CEO fraud
  3. Account compromise
  4. Attorney impersonation
  5. Data theft

BECs can evade traditional security solutions because the scams do not have any malicious links or attachments.

  • The Bogus Invoice Scheme – Companies with foreign suppliers are often targeted with this tactic. Attackers pretend to be suppliers requesting fund transfers for payments to an account owned by the attackers.  Typically, the attackers utilize several bank accounts, transferring the stolen funds from account to account so law enforcement cannot track it.
  • CEO Fraud – Attackers act as company CEO’s or any executive, and send an email to employees in finance, requesting them to send money to an illicit bank account. Most often, the employee in finance sends the email without verifying with the executive that they authorized the transaction.
  • Account Compromise – An executive or employee’s email account is hacked and used to request invoice payments to vendors listed in their email contacts. Payments are then sent to fraudulent bank accounts.  Typically, this is a direct result of no multifactor authentication being implemented. The attacker gains access to the email, and changes email authorization rules.  The attacker even will often forward emails without the employee knowing this is happening.
  • Attorney Impersonation – Attackers pretend to be a lawyer or someone from a law firm in charge of vital and confidential matters. Typically, these attacks occur are done by email or phone at the end of a business day.
  • Data Theft – Employees under human resources and bookkeeping are targeted to obtain PII, PHI, HIPPA data, or W-2’s of employees or customers. Such data can be sold on the Dark Web or used as extortion.

 Protection Tips to Prevent Business Email Compromise

  1. Recognize impersonation tactics, encourage employees to challenge suspicious payment requests
  2. Be wary of last-minute email account address changes
  3. Don’t overshare on social media
  4. Check email addresses for slight changes
  5. Use Multi-Factor Authentication
  6. Use strong passwords
  7. Don’t trust unknown sources
  8. Verify all wire transfers in person
  9. Provide regular end-user training
  10. Run antivirus software often, enable security features that block malicious emails
  11. Block IPs from parts of the world you don’t conduct business
  12. Monitor the email exchange server for changes and unauthorized rules
  13. Add a banner to emails coming from outside your organization
  14. Log and retain changes to mailbox login and settings for at least 90 days
  15. Report fraud to law enforcement

Business email compromise isn’t going away.  Business email compromises are akin to the Nigerian letter-writing schemes of the 1990s.  Be aware that some insurance companies may not cover BEC’s as a part of your cyber coverage.  The insurance companies look at BECs as common theft or user error.  Educating and training your employees is the best way to combat falling victim to a BEC attack.

In addition to training your employees on the ways, threat actors will look to take advantage of them, engaging with security firms who have battle-tested experience and highly technical abilities will add another layer of protection against business email compromises. Email monitoring is a crucial defense mechanism of SpearTip’s security services as we instantly add value to your organization upon implementation. It’s nearly impossible for your employees to be perfect, but that’s okay. But as a leader in your organization, ensure you’ve made the right moves to protect your most valuable assets from those inevitable mistakes.

Categories

Connect With Us

Featured Articles

Real Costs of Cybercrimes
Unveiling the Real Costs of Cybercrimes
03 May 2024
Comprehensive Overview of Ransomware
Overview of Ransomware from 2023
01 May 2024
CSA Warning
CSA Warning About Security Risks with Evolving Cloud and AI Tech
29 April 2024
Cyberattack on UnitedHealth's Change Healthcare
Cyberattack on UnitedHealth's Change Healthcare Results in Multi-Million Dollar Loss
26 April 2024

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.