fbpx
Question? Call Us 858-777-0040
Logo 01

What in the World is Business Email Compromise?

Business email compromise headaches
Download the accountant's guide to the safeguards ruleGet your CPA firm aquainted with new FTC rules.

Read our latest eBook "The Accountant's Guide to the FTC Safeguards Rule"

Larry had been working in the accounting department of a medium-sized business for about a year and now had to hold down the fort while his boss Jack was traveling to another branch in the Midwest.

Jack was keeping in touch through email, saying that his business meetings went well and that he urgently needed Larry to wire money to the accounts that he needed. And then Jack signed his email the way he always did.

Larry had routinely performed these transfers and had no idea that it wasn’t Jack who had requested it.

The next day Jack called and asked how the office was doing. Larry asked him about the transfer and only then learned about the compromise.

While ransomware is proliferating, the biggest and most expensive cyber attacks (“71% of organizations experienced BEC attacks over the past year”) are still from Business Email Compromise (also known as “CEO Fraud” or “Man-in-the-Email scam”).

This attack is over 62 times more profitable than ransomware.

The FBI reported on May 4, 2022, that BEC was responsible for over $43 billion in losses from June 2016 to December 2021, representing a 65% increase over that time (FBI statistics).

These attacks are also more complex than ransomware, sometimes relying on weeks or months of preparation and three or four means of compromise, such as “phishing,” “spearphishing,” “whaling,” and “vishing”(see our phishing blog).

The FBI has defined BEC as:

“A sophisticated scam targeting businesses working with foreign suppliers and companies that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds”.

(The FBI has a few other names: “Masquerading,” “Business Executive Scam,” and “Financial Industry Wire Frauds.”)

The Attack

1. Hacker gains access to the email account of an important employee at a business through a phishing email, specifically targeted “spearphishing” email (sent to a company’s accounting executive or accounting employee), or a specifically targeted “whaling” email (sent to a C-level executive)–any of which the target employee has clicked.

Alternatively, a victim may open an email attachment, which then downloads malware to give access to the victim’s computer.

The hacker may then take control of an employee’s computer and perform financial crimes with it or steal (“exfiltrates”) sensitive data, which can then be sold, ransomed or posted to the Internet (“doxing”).

2. Hacker monitors the employee’s email inbox for weeks, perhaps months, gathering all the intelligence they need to carry out the attack.

The FBI has also made note that the hackers may use auto-forwarding rules in their victim’s email account to further conceal their identities. Hacker may be imitating (“spoofing”) a company’s website domain name or using a lookalike email domain name.

3. When the executive in question is out for the day or on vacation (something about which the attackers have learned through his/her email), the attackers, posing as the executive, contact a lower level accounting professional (or someone else with access to business accounts) with a request for a banking transfer to the criminal’s account.

The hacker may use genuine company financial documents. Voice calls (“voice phishing” or “vishing”) may take place to confirm certain transactions.

Alternatively, the hacker may impersonate suppliers or attorneys (attorney impersonation) to request transfers (a.k.a Supplier Swindle or Invoice Modification Scheme).

4. The employee has worked with the executive for some time now, is accustomed to such banking transfers, doesn’t question the request, and approves the transfer.

Who’s Been Hit?

Some of the big names hit by BEC:

  1. Facebook and Google (losses $121m)
  2. Ubiquiti Networks
  3. Government of Puerto Rico
  4. St. Ambrose Catholic Parish
  5. Toyota
  6. San Francisco Homeless Charity, Treasure Island
  7. City of Saskatoon, Canada
  8. Save the Children
  9. French cinema company Pathé
  10. Snapchat payroll information breach – this resulted in PII data exfiltration, i.e. pulling sensitive data from a computer or network.
  11. U.S. money transfer company Xoom Corporation

Some Recommendations for Preventing BEC

Accounting departments or professionals should institute privilege access management and use two-factor or multi-factor authentication (MFA) to approve account changes or wire transfers.

These departments or employees should have a review process for banking or other transfers.

Organizations can also implement geolocation blocking for email account logins from restricted locations or unauthorized IP ranges, e.g. users in Asia or South America if the business has no remote users outside of the USA. They can login, but admins can setup alerts for this.

Another use case is if an attacker gets a leaked password and manages to hack MFA, geolocation is effective for mitigation.

Additionally, the FBI recommends:

– As with any phishing email, verify that the email’s sender is who it claims to be and watch for links and content that are misspellings or different from the domain name in question.

Beware emails or websites that look indistinguishable from real ones.

– Implement anti-phishing protections and up-to-date malware protection.

– Implement separation of duties to allow for independent verification of a task from a second employee.

– Implement labeling of external emails.

– Do not send any login credentials or Personally Identifiable Information (PII) by email, even if the request seems legitimate.

– Implement continuous and ongoing employee cyber training, about malware and phishing specifically. As with most cyber training for your staff, make sure they learn the signs of BEC, fake payment requests, required signatures on documents, etc.

Conclusion: Beware An Increase Of BEC

The transition to remote work during pandemic restrictions is also believed to be partly responsible for the increase in BEC in the past two years. SMBs and organizations should report any breaches immediately to bec.ic3.gov.

***

Tech Kahunas is a San Diego Managed IT Services provider which provides IT support and services like 24/7 monitoring, data backup and restore, and malware protection.

Tech Kahunas will help you Defend Your Island. Set up a free 30-minute Strategy Session with us now.

The four elements of the KahunaVision Technology Assessment are:

– Outsourcing –
Upgrade with our Kahunas. We’ll take your concerns (and problems) so you can do what you do best.

– Modernization –
Throw away that old tech! Take advantage of artificial intelligence, cloud apps, and fortified backups.

– Cybersecurity –
Don’t understand cybersecurity? Strengthen your IT systems with your personal Tech Kahuna.

– Compliance –
Compliance is boring–but many businesses still need to do it! We’ll help you with that, too.

Kahuna Shield will tie it all together.

Get your CPA firm aquainted with new FTC rules.

Read our latest eBook "The Accountant's Guide to the FTC Safeguards Rule"

Leave a comment

Your email address will not be published. Required fields are marked *

Peter Bondaryk
Peter Bondaryk
Facebook
Twitter
LinkedIn
Pinterest

– Outsourcing –
Upgrade with our Kahunas. We’ll take your concerns (and problems) so you can do what you do best.

– Modernization –
Throw away that old tech! Take advantage of artificial intelligence, cloud apps, and fortified backups.

– Cybersecurity –
Don’t understand cybersecurity? Strengthen your IT systems with your personal Tech Kahuna.

– Compliance –
Compliance is boring–but many businesses still need to do it! We’ll help you with that, too.

Wield the Kahuna Shield

Schedule a strategy session

Get Our FREE C-Suite and Business Owner's Guide
to Cybersecurity
csuite-ebook-homesplash
Latest posts
Follow us

Get Our FREE Accountant's Guide to the FTC Safeguards Rule Ebook!

The New FTC Requirements
That Will Change the Way You
Do Business

Get Your FREE Copy!​

Sign up to learn how you can protect against cybercrime

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

If today your business was hacked and you were at risk of losing it all...
Do you have a plan?
We will not spam, rent, or sell your information.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Join our newsletter and get a 20% discount
Promotion nulla vitae elit libero a pharetra augue