CEO Fraud Checklist  - CEO 20Fraud 20Checklist - Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year

Trend Micro reported that Email (BEC) is projected to skyrocket as attackers use more and more sophisticated social engineering tactics to trick their targets.

The Internet Crime Complaint Center (IC3) puts BEC in five categories:

  1. Bogus Invoice Schemes,
  2. CEO Fraud,
  3. Account Compromise,
  4. Attorney Impersonation, and
  5. Data Theft.

In this case, researchers split them in two: Credential-grabbing and Email-only. Attackers must be proficient in at least one of these methods for the scheme to work.

BEC attacks are projected to exceed $ in 2018. Putting that number in perspective, just a ago the FBI reported that BEC attacks had become a $5.3 billion industry. Attacks have become more sophisticated as hackers improve their game.

BEC has grown among threat actors due to “its relative simplicity,” according to a new Trend Micro “Tracking Trends in Business Email Compromise (BEC) Schemes.”

Trend Researchers analyzed BEC as a cybercriminal operation from January through September 2017, dissecting tools and strategies commonly used in these attacks to predict activity for this year.

“This particular type of attack is not going away — it’s only increasing,” says Ed Cabrera, chief cybersecurity officer at Trend Micro.

Method 1: Snatching credentials

This tactic leverages keyloggers and kits to steal credentials and access an organizations email. Researchers noticed an uptick in HTML pages sent as spam attachments which, while not new, is still effective against unsuspecting users.

Spear phishing is one of the primary methods used to steal email login data for BEC attacks. Once an attacker compromises a Gmail account, for example, they can impersonate its owner or use personal information or credentials they find in the account.

The other credential-grabbing technique uses malware, which continues to be a problem for targets using antivirus tools because some attackers use crypter services to evade AV detection. Researchers note BEC actors are more frequently using phishing attacks over keyloggers because they’re simpler and cheaper; actors don’t need to shell out for builders and crypters.

Keyloggers and remote access tools (RATs) are the most common types of malware used for BEC because they’re effective and inexpensive. Unlike attacks that rely on phishing to steal a single set of credentials, malware can collect all stored credentials on an infected machine.

Method 2: Targeting inboxes

Email-only BEC attacks, which rely on social engineering, are getting more sophisticated as attackers get smarter. This tactic involves sending an email to someone in the target company’s finance department, requesting an exec to transfer money as payment or as a personal favor. Usually, a spoofed email from the CEO is sent to the head of finance.

“The CFO has the authority and ability to request last-minute money transfers within the organizations,” says Cabrera. “[Attackers] are trying to capitalize on the relationship between the CEO and CFO.”

Cybercriminals BEC attacks carefully research their victims. “It’s usually the advanced groups, but it’s also almost akin to cyberespionage,” he continues. “They have a healthy knowledge of who they’re targeting, and who in the organization they’re going to target.”

This research is what makes them successful. 

This research is what makes them successful. Attackers want to know about the organization and its executives: who’s on vacation, typical work hours, business travel. They want to know news surrounding the business and operations such as M&A activity and corporate events. Oftentimes actors target ADP credentials and payment/benefits information so they can better understand the employees they’re targeting. All of this data, both public and private, leads to success.

“We’re seeing a shift: ‘How do we compromise email infrastructure and dig even deeper?'” Cabrera notes.

Social engineering scams can be tough to spot. Sometimes the subject line will give an attacker away; based on analysis of BEC email samples, more than two-thirds had subjects containing terms “request,” “payment,” or “urgent.” Many said “wire transfer request” and “wire request.”

In the “Reply To” line, many attackers add their email addresses so they can view replies from target recipients. Most email clients don’t show the reply-to addresses, so they get away with it. If they don’t do this, they create a legitimate-looking email address to impersonate a corporate executive. These usually involve free webmail services like “” and “”

“From a user side, awareness and training is critical”

“From a user side, awareness and training is critical,” says Cabrera. “From the boardroom down to the server room, make sure [employees] know this is actually happening.” He also advises taking a close look at gateway tools, what they’re deploying, and how they can protect email.

“You need to understand the gateway is a critical line of defense and we need to be able to defend it,” he adds.

CEO-Fraud-Pages.jpg  - CEO Fraud Pages - Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year

CEO Fraud Prevention Manual Download

CEO fraud has ruined the careers of many executives and loyal employees. Don’t be next victim. This brand-new manual provides a thorough overview of how executives are compromised, how to prevent such an attack and what to do if you become a victim.

Click Here To Download The Manual  - 218bd950 fffa 4b22 9873 26f4f82d0df7 - Business Email Compromise Phishing Attacks Will Exceed $9 Billion This Year

PS: Don’t like to click on redirected buttons? Copy and paste this link in your browser:

Source (and more at): DARKReading

Source link
Based Blockchain Network


Please enter your comment!
Please enter your name here