Skip to main content
Phishing

Business Email Compromise Fraud: Social Engineering News

By November 16, 2022No Comments

Business Email Compromise (BEC), a type of phishing fraud, consistently tops the FBIs list of most financially damaging online crimes. Businesses were pummeled by BEC fraud in 2021 with over 70% reporting a BEC attack. The 2021 FBI’s Internet Crime Complaint Center (IC3) report documented 19,954 Business Email Compromise/ Email Account Compromise (EAC) complaints with adjusted losses of nearly $2.4 billion. In other words, BEC fraud accounted for nearly a third of the total $6.9 billion cyber losses in 2021.

Business Email Compromise

Photo by Elisa Ventur on Unsplash

Common BEC Examples and a New Virtual BEC Scheme

In Business Email Compromise fraud, attackers send email messages that appear to come from a known source making legitimate requests. To do this they may use either compromised or spoofed email accounts. Two common examples are:

    • A company CEO emails their assistant to purchase gift cards to send out as employee rewards.
    • A vendor your company does business with emails an invoice with updated banking information.

Restrictions on in-person meetings because of the COVID-19 pandemic led to the emergence of newer BEC/EAC schemes. The IC3 observed schemes that exploited the reliance on virtual meetings. How did these newer BEC/EAC schemes work? According to an IC3 public service announcement, the attacker would compromise an employer’s or financial director’s email, such as a CEO or CFO. The attacker would then use the compromised email account to request employees to participate in virtual meetings. The attacker would insert a still picture of the CEO with no audio, or a “deep fake” audio. The fraudsters, acting as business executives, would then claim their audio/video was not working properly. During the virtual meeting, the attacker would directly instruct employees to initiate wire transfers or use the executive’s compromised email to provide wiring instructions.

Business Email Compromise…In the News

BEC Group “Crimson Kingsnake”

“Crimson Kingsnake,” a BEC group is linked to 92 malicious domains of 19 law firms and debt collection agencies across the US, UK and Australia. According to a write-up by cloud email security platform, Abnormal Security, the BEC group sent emails impersonating real attorneys, real law firms and debt-recovery services. Their goal? To deceive accounting professionals into paying fake invoices supposedly provided to the recipient firm.

Screenshot from Abnormal Security

Once the target victim responds, the BEC attackers reply with payment account details in a PDF invoice. The invoice includes a bill number, bank account details and the company’s VAT ID. If the target victim resists, the BEC attackers will then impersonate an executive at the targeted company, putting further pressure on the target victim. They’ve been observed to use a new email with a spoofed display name. By means of this phony executive persona, the attackers authorize the employee to proceed with the payment.

 Screenshot from Abnormal Security – Example of a Crimson Kingsnake Email Impersonating a Company Executive 

City of Laredo

KGNS reports that the City of Laredo was the victim of BEC fraud that led to the loss of over $1,000,000 in taxpayer dollars. How did it happen? During the investigation, KGNS discovered that an employee with the city’s finance department paid out the money to an email scammer posing as a city vendor.

City of Lexington

A BEC scheme led City of Lexington employees to send $4,000,000 to scammers as reported by LEX18 News. The city says the criminal operation “involved multiple emails and a complicated scheme” and that “criminal actors put themselves into communication between the City and Community Action Council.” What happened? Employees received an email from a sender claiming to be the Community Action Council that gave new bank information. The City of Lexington then, “not realizing the bank information was bogus, sent three wire transfers totaling about $4,000,000 to the fake bank address.”

Test, Educate, and Protect with the Social-Engineer Managed Phishing Service

BEC fraud targets enterprises of all sizes in all industries. The phishing lures used in BEC fraud are often sophisticated, making it difficult for employees to detect. It’s a social engineering scheme that targeted over 70% of businesses in 2021. What can you do to protect your company’s assets and mitigate the risk of BEC fraud? Educating employees about BEC fraud must be a priority for security awareness training campaigns and programs. The social engineering experts at Social-Engineer, LLC can help. We offer a Managed Phishing Service that is ready built to enhance your current security awareness staff. Our fully managed phishing service measures and tracks how your employees respond to email phishing attacks and it identifies at-risk user groups. We use customized software to build and execute your phishing program, while providing expert analysis.

Please contact us today to schedule a consultation.

www.Social-Engineer.com

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.