SlideShare a Scribd company logo
1 of 2
Download to read offline
How Can Organisations Tackle Business Email Compromise?
Business Email Compromise (BEC) attacks are sophisticated cybercrimes, targeting businesses that perform
wire-transfer payments. These schemes compromise official business email accounts to carry out
fraudulent money transfers. The 2019 Internet Crime Report, published by the FBI’s Internet Crime
Complaint Center (IC3), shows that email compromise fraud impacted a total of 20,373 victims and cost
victims USD 1.298 billion over a twelve-month period – the largest financial loss due to internet crime.
Such account takeovers show no signs of decelerating in 2020, with businesses suffering compromised
credentials, fraudulent money transfers, reputational damage and data loss. Because Microsoft Office 365
(O365) is one of the most popular email platforms, it is also one of the most phished. A multisystem
platform, O365 combines email, file storage, collaboration, and productivity applications, including
OneDrive and SharePoint. Together, they represent a honeypot of confidential and sensitive data that
attackers are looking to exploit.
Making money
BEC has been hugely profitable for cybercriminals, hence they may put time and effort into this method of
attack to seek rewards. In most instances, this may be achieved through a high volume of attacks against
poorly protected businesses and/or staff who may not recognise the tell-tale signs of a BEC attack.
Therefore, those at greatest risk are businesses who feel they may not be targeted and thus discount the
possibility of attack.
With unauthorised access, cybercriminals may seek out information on the types of instructions used by a
company for money transfers, electronic payments, or vendor invoicing. They may carry out other
reconnaissance, such as monitoring mailboxes, watching the dealings between targeted individuals, and
spotting details within their communications to understand the nuances required to effectively replicate a
genuine message.
Using an employee’s email account within the organisation, a cybercriminal can circumvent security such
as the monitoring of external emails for malicious threats. The compromised mailbox can have a plentiful
supply of emails that contain confidential and sensitive data, which means greater potential for profit or
blackmail for the cybercriminal echelon.
The inner workings of a BEC attack
In the first phase, the cybercriminal sends a phishing email, often requesting the employee use the link
provided to review a document. The link takes the employee to a website similar to or associated with
Microsoft Office 365 that requests his or her credentials. Once an employee provides credentials, the
cybercriminal can start to leverage access to the account to make money.
A multi-phase attack involves taking advantage of credentials to ultimately extract money or proprietary
information from a person and/or a business. For example, the attacker might first send an O365 phishing
email to harvest email credentials. Then, using the targeted O365 account, they will send an email to
another targeted person within the company who has the power to execute fraudulent payments.
The email recipient has no reason to suspect that it is not the genuine person/account who sent the email
requesting a fraudulent payment. There are many variants on the multi-phase attack. Equipped with a
legitimate account, the attacker can control multiple accounts laterally within the organisation, and spear
phish external stakeholders, business partners and vendors.
Both spear phishing and phishing attacks leverage impersonation to commit fraud. The difference between
the two is that spear phishing emails imitate people, while phishing emails imitate brands. Unlike phishing,
spear phishing targets a single individual, includes no links or attachments in the email, and typically
features a request for a fraudulent payment, or direct deposit change, rather than account credentials.
How to protect against BEC
One of the best ways to avoid BEC fraud is a multi-layered approach that includes an array of checks and
controls. Two of the most significant areas to focus on are training employees and email authentication
technology. An organisation’s employees are on the front line when it comes to defending against BEC
fraud, as preventing the initial point of compromise is critical. Therefore, they should be trained to
recognise the signs of email fraud through a regular and constantly updated training programme.
Employees need to be able to identify some common ways fraudsters use emails to gain access to business
email accounts. For example, the ‘spoofing’ of an email address, which can be the display name section,
before the ‘@’ symbol, and/or the domain name, after the “@’ symbol. In addition, they need to know the
make-up of traditional phishing techniques that are used to gain initial access to an email account.
While the above can help reduce the risk of a mailbox account being compromised, there’s no preventative
system that is fully secure. Therefore, it’s important for organisations to implement security features such
as multi-factor authentication or multi-layered security solutions to ensure they are protected in case of a
BEC fraud attempt.
Paul Wright
Senior Advisor Forensic Technology
Accuracy

More Related Content

What's hot

Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
The ultimate deal on open id uses
The ultimate deal on open id usesThe ultimate deal on open id uses
The ultimate deal on open id usesPing Identity
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security BreachGaurav Dubey
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonatingSOCRadar Inc
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Splunk
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013Shoplet_
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General CourseAaron Keating
 
Hackers Use Coronavirus Fears in Attempt to Steel Data
Hackers Use Coronavirus Fears in Attempt to Steel DataHackers Use Coronavirus Fears in Attempt to Steel Data
Hackers Use Coronavirus Fears in Attempt to Steel DataErin Kearney
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaker
 

What's hot (18)

PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2ACC 210 WEEK 1 DQ2
ACC 210 WEEK 1 DQ2
 
The ultimate deal on open id uses
The ultimate deal on open id usesThe ultimate deal on open id uses
The ultimate deal on open id uses
 
Phishing
PhishingPhishing
Phishing
 
Adobe Security Breach
Adobe Security BreachAdobe Security Breach
Adobe Security Breach
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonating
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
KnowBe4 Award Write Up
KnowBe4 Award Write UpKnowBe4 Award Write Up
KnowBe4 Award Write Up
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
Hackers Use Coronavirus Fears in Attempt to Steel Data
Hackers Use Coronavirus Fears in Attempt to Steel DataHackers Use Coronavirus Fears in Attempt to Steel Data
Hackers Use Coronavirus Fears in Attempt to Steel Data
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
 

Similar to Article how can organisations tackle business email compromise - paul wright

Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigationNimishaRawat
 
Phishing
PhishingPhishing
PhishingSyahida
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmGabor Szathmari
 
social_engineering.pptx
social_engineering.pptxsocial_engineering.pptx
social_engineering.pptxalexadejumo
 
Simple Ways To Prevent Multimillion-Dollar Losses From BEC
Simple Ways To Prevent Multimillion-Dollar Losses From BECSimple Ways To Prevent Multimillion-Dollar Losses From BEC
Simple Ways To Prevent Multimillion-Dollar Losses From BECHalockLabs
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGHeather Strinden
 
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdfDay3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdfssuserb29f84
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
CEO Fraud is on the Rise
CEO Fraud is on the RiseCEO Fraud is on the Rise
CEO Fraud is on the RiseNeil Kemp
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfNiloufer Tamboly
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...madhumadhu542020
 

Similar to Article how can organisations tackle business email compromise - paul wright (20)

Email threat detection and mitigation
Email threat detection and mitigationEmail threat detection and mitigation
Email threat detection and mitigation
 
Phishing
PhishingPhishing
Phishing
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cyber security
Cyber securityCyber security
Cyber security
 
Black Hat.pdf
Black Hat.pdfBlack Hat.pdf
Black Hat.pdf
 
Phishing
PhishingPhishing
Phishing
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
social_engineering.pptx
social_engineering.pptxsocial_engineering.pptx
social_engineering.pptx
 
Simple Ways To Prevent Multimillion-Dollar Losses From BEC
Simple Ways To Prevent Multimillion-Dollar Losses From BECSimple Ways To Prevent Multimillion-Dollar Losses From BEC
Simple Ways To Prevent Multimillion-Dollar Losses From BEC
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
 
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdfDay3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
Day3-0930-Green-Intent-based-approach-to-detect-email-account-compromise.pdf
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
CEO Fraud is on the Rise
CEO Fraud is on the RiseCEO Fraud is on the Rise
CEO Fraud is on the Rise
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...
 

Recently uploaded

Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMoumonDas2
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 

Recently uploaded (20)

Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Mathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptxMathematics of Finance Presentation.pptx
Mathematics of Finance Presentation.pptx
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 

Article how can organisations tackle business email compromise - paul wright

  • 1. How Can Organisations Tackle Business Email Compromise? Business Email Compromise (BEC) attacks are sophisticated cybercrimes, targeting businesses that perform wire-transfer payments. These schemes compromise official business email accounts to carry out fraudulent money transfers. The 2019 Internet Crime Report, published by the FBI’s Internet Crime Complaint Center (IC3), shows that email compromise fraud impacted a total of 20,373 victims and cost victims USD 1.298 billion over a twelve-month period – the largest financial loss due to internet crime. Such account takeovers show no signs of decelerating in 2020, with businesses suffering compromised credentials, fraudulent money transfers, reputational damage and data loss. Because Microsoft Office 365 (O365) is one of the most popular email platforms, it is also one of the most phished. A multisystem platform, O365 combines email, file storage, collaboration, and productivity applications, including OneDrive and SharePoint. Together, they represent a honeypot of confidential and sensitive data that attackers are looking to exploit. Making money BEC has been hugely profitable for cybercriminals, hence they may put time and effort into this method of attack to seek rewards. In most instances, this may be achieved through a high volume of attacks against poorly protected businesses and/or staff who may not recognise the tell-tale signs of a BEC attack. Therefore, those at greatest risk are businesses who feel they may not be targeted and thus discount the possibility of attack. With unauthorised access, cybercriminals may seek out information on the types of instructions used by a company for money transfers, electronic payments, or vendor invoicing. They may carry out other reconnaissance, such as monitoring mailboxes, watching the dealings between targeted individuals, and spotting details within their communications to understand the nuances required to effectively replicate a genuine message. Using an employee’s email account within the organisation, a cybercriminal can circumvent security such as the monitoring of external emails for malicious threats. The compromised mailbox can have a plentiful supply of emails that contain confidential and sensitive data, which means greater potential for profit or blackmail for the cybercriminal echelon. The inner workings of a BEC attack In the first phase, the cybercriminal sends a phishing email, often requesting the employee use the link provided to review a document. The link takes the employee to a website similar to or associated with Microsoft Office 365 that requests his or her credentials. Once an employee provides credentials, the cybercriminal can start to leverage access to the account to make money. A multi-phase attack involves taking advantage of credentials to ultimately extract money or proprietary information from a person and/or a business. For example, the attacker might first send an O365 phishing
  • 2. email to harvest email credentials. Then, using the targeted O365 account, they will send an email to another targeted person within the company who has the power to execute fraudulent payments. The email recipient has no reason to suspect that it is not the genuine person/account who sent the email requesting a fraudulent payment. There are many variants on the multi-phase attack. Equipped with a legitimate account, the attacker can control multiple accounts laterally within the organisation, and spear phish external stakeholders, business partners and vendors. Both spear phishing and phishing attacks leverage impersonation to commit fraud. The difference between the two is that spear phishing emails imitate people, while phishing emails imitate brands. Unlike phishing, spear phishing targets a single individual, includes no links or attachments in the email, and typically features a request for a fraudulent payment, or direct deposit change, rather than account credentials. How to protect against BEC One of the best ways to avoid BEC fraud is a multi-layered approach that includes an array of checks and controls. Two of the most significant areas to focus on are training employees and email authentication technology. An organisation’s employees are on the front line when it comes to defending against BEC fraud, as preventing the initial point of compromise is critical. Therefore, they should be trained to recognise the signs of email fraud through a regular and constantly updated training programme. Employees need to be able to identify some common ways fraudsters use emails to gain access to business email accounts. For example, the ‘spoofing’ of an email address, which can be the display name section, before the ‘@’ symbol, and/or the domain name, after the “@’ symbol. In addition, they need to know the make-up of traditional phishing techniques that are used to gain initial access to an email account. While the above can help reduce the risk of a mailbox account being compromised, there’s no preventative system that is fully secure. Therefore, it’s important for organisations to implement security features such as multi-factor authentication or multi-layered security solutions to ensure they are protected in case of a BEC fraud attempt. Paul Wright Senior Advisor Forensic Technology Accuracy