Business Email Compromise (BEC) is when an email account, often in a company’s finance department, is broken into and controlled by a hacker. This is often accomplished through a phishing attack that leads to credential theft as outlined in CyberHoot’s article titled the ‘Domino Attack’. Credentials are stolen when a victim clicks on a fraudulent phishing email link or opens a fake invoice. Doing this brings the victim to a malicious but believable website identical to the real vendor’s website, that prompts the user to enter their email and password. BEC attacks often come from someone your CFO already knows, meaning the sending email address is actually correct and expected. It usually turns out that the other finance person’s email has been compromised by hackers who are now targeting your financial officers. Thus the domino’s continue to fall company by company.
Once a hacker enters a CFO’s email account, they read through their financial emails looking for wire transactions. They strike at just the right moment, redirecting a normal wire transfer with fraudulent wiring instructions directly into your email-based wiring conversation. The success of these scams rests exclusively upon both parties never authenticating new wiring instructions outside of email such as over the phone. Not confirming all wiring instruction changes over the phone or in person results in billions of dollars being wired into hacker accounts all over the world every year. These fraudulently wired funds are rarely recovered. Some examples given by the FBI of real cases are:
The FBI and CyberHoot recommend you “Implement an awareness and training program” to help your business be both knowledgeable of and prepared for these attacks. Fortunately, with Business Email Compromise, preparations are relatively straightforward. The single best measure you can take is to review and document your Wire Transfer Process (WTP). For the WTP, CyberHoot recommends:
In addition to having a strong Wire Transfer Process in place, CyberHoot recommends taking the following actions as well:
Sources:
Additional Reading:
What Was 2020’s Most Expensive Cybercrime?
Related Terms:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.