Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- by Brittany Day
Most people are familiar with phishing and ransomware because these attacks receive frequent coverage in the media. However, business email compromise (BEC), which involves a criminal gaining access to a corporate email account and spoofing the account owner’s identity in order to steal money, is another very dangerous and surprisingly prevalent email attack that gets far less attention.
BEC attacks are widespread due to their simplicity and effectiveness. These attacks can have devastating consequences for companies of all sizes across all industries. BEC is becoming increasingly common and costly and has generated losses of $26 billion worldwide. Between May 2018 and July 2019, there was an astounding 100 percent increase in identified global exposed losses due to BEC. As of June 30, 2019, the average loss reported in a BEC complaint was $7,904.
Businesses don’t want to talk about it; they’re embarrassed and don’t want to look vulnerable. But ask just about any organization and they’ll probably tell you they’ve received an email attempting some version of this fraud.
- Steve Baker, International Investigations Specialist, Better Business Bureau
BEC attacks can have serious implications for individuals as well as organizations. Companies often require employees who fall for these scams to eat the loss. In one case last year, a North Carolina employee who was tricked into sharing her corporate credit card information with attackers was told by her company that she was responsible to eat the resulting $10,000 loss.
Earlier this month, the FBI announced 281 BEC-related arrests worldwide, which can be attributed to Operation reWired, a coordinated multi-agency effort to disrupt and dismantle international BEC schemes. The initiative has resulted in the seizure of nearly $3.7 million and the disruption and recovery of approximately $118 million in fraudulent wire transfers.
Business Email Compromise Definition
BEC describes an exploit in which an attacker obtains access to a corporate email account and sends fraudulent emails under the identity of the account owner in order to steal money from the company or its employees, partners or customers. In such a scam, the threat actor usually uses the spoofed identity to trick victims into sending money to his or her account. Business email compromise may involve either social engineering, malware or a combination of the two.
Wikipedia defines: "Business email compromise attacks (BEC) are a form of cyber crime which use email fraud to attack commercial, government and non-profit organizations to achieve a specific outcome which negatively impacts the target organization. Examples of common BEC attacks include invoice scams and spear phishing spoof attacks which are designed to gather data for other criminal activities. Often consumer privacy breaches occur as a results of a BEC attack."
How Business Email Compromise works?
Here is a step-by-step example of how a BEC attack could be carried out. By understanding attackers’ methods and strategies, you will be better equipped to recognize and stop an attack on your company.
Step 1: Infiltrating the ranks within a company
When planning a BEC attack, threat actors conduct extensive research on their victims. Using advanced social engineering techniques, malware, remote administration tools that allow users to control another system as if they have physical access to it, keyloggers or brute-force attacks, criminals gain access to the CEO of the target company’s email.
Stap 2: Contacting junior employees
Once they have obtained access to the CEO’s email, attackers send a fraudulent email to a junior employee, pretending to be the CEO. These malicious emails can be very difficult to detect, as criminals include specific details which they have obtained using advanced social engineering tactics.
These emails often involve a confidential wire transfer, and convey a sense of urgency.
Step 3: Crafting fraudulent requests using social engineering
An attacker follows up with the victim regarding the fraudulent email he or she received, either via a phone call or another email. Sometimes, the threat actor may pose as someone other than the CEO. For example, if a criminal writes that an attorney will follow up with payment details, he or she will likely contact the victim, pretending to be the attorney calling with payment information.
Note: Phony emails used in BEC scam’s don’t always imitate the CEO or CFO of a company. Many impersonate a vendor or client invoice. When impersonating a CEO, the average transaction amount for these scams is $125,439, while vendors being impersonated average around $50,373.
Who Do BEC Attacks Target?
While any company is at risk of falling for a BEC scam, this threat is more prevalent in certain industries than in others. In the past, manufacturing and construction took the majority of the hits, accounting for one-quarter of all BEC scams in 2018.
However, attackers are broadening the scope of their preferred targets, and have recently been focusing on real estate and commercial services (shopping centers, entertainment facilities and lodging).
All organizations are vulnerable and the email threat landscape is constantly evolving. As one sector becomes more aware and increasingly difficult to deceive, criminals will find a new industry to hone in on.
Common Types of BEC Email Attacks
BEC encompasses various types of scams including CEO fraud, data theft, account compromise, attorney impersonation and bogus invoicing scams. Here is a brief explanation of common variations of BEC attacks:
- CEO fraud: In these scams, a threat actor pretends to be an executive and requests that a finance or HR employee make an urgent payment.
- Bogus invoicing scams: These attacks use a compromised employee account to request a change in payee information, transferring payments to the criminal’s account.
- Employee account compromise: An employee's email account is hacked and used to request invoice payments to vendors listed in their email contacts.
- Attorney impersonation: In this variation of BEC, An attorney’s email identity is used to request immediate payments, claiming to be handling time-sensitive, confidential matters.
- Data theft: Criminals use a compromised account to gain more PII, which can be used in defrauding the company or its customers.
BEC campaigns utilize a wide variety of techniques and preliminary attacks in order to deceive victims and steal money. Although campaigns are uniquely crafted and always evolving, the majority of BEC attacks use some combination of email spoofing, spear phishing and malware to trick their targets into sharing sensitive information.
- Spoofing email accounts and websites: Criminals use slight variations on legitimate email addresses to trick victims into thinking that fake accounts are authentic.
- Spear phishing: Fraudulent emails that appear to be from a trusted sender fool recipients into sharing sensitive information with attackers.
- Malware: Threat actors often utilize malware to infiltrate networks in order to gain access to internal data and systems. This data is then used to avoid raising suspicions when a falsified wire transfer is submitted.
How to Recognize a BEC Email Attack
Malicious emails involved in BEC scams can be very difficult to distinguish from authentic messages, making them especially dangerous and effective. That being said, there are some definite “red flags” that users should be aware of and look for in all emails, especially those asking for payment information. This fraudulent email, which was identified and quarantined by Guardian Digital EnGrade cloud email security, contains several key indicators of fraud:
- The “Reply to” address is different than the “From” address.
- The domain of the “Reply to” address is Gmail - this is a significant fraud indicator.
- The subject line reads “URGENT REQUEST”. The attacker wants the recipient to act before adequately thinking things through.
- The signature demonstrates that the threat actor has either taken the time to conduct extensive research using social engineering techniques or has previously received an email from the recipient. He or she may have sent an innocuous message to the recipient to gauge his or her response.
How to Prevent Business Email Compromise?
While the advanced social engineering techniques involved in planning and carrying out BEC scams can make attacks very difficult to identify, engaging in these email security best practices will significantly reduce the chances of your company suffering the consequences of a successful BEC attack:
- Invest in employee education on email threats and email security best practices.
- Carefully review the sender’s email address whenever you receive an email - criminals sometimes create an account with an email address that is very similar to one on your corporate network.
- Ensure that the URL in emails is associated with the business it claims to be from.
- Be on the lookout for hyperlinks that contain misspellings of the actual domain name.
- Use strong passwords and two-factor authentication (2FA), a security process which involves the use of two different authentication factors for verification purposes, to help secure email accounts.
- Ensure that the settings on employees’ computer are enabled to allow full email extensions to be viewed.
- Implement phone verification of payment changes.
- Use secondary sign-offs for payment changes.
- Monitor accounts on a regular basis for irregularities, such as missing deposits.
- Implement a comprehensive, fully-managed cloud email security. Investing in an email security solution that prevents malicious emails from reaching the inbox is the most effective way to mitigate the risk that BEC poses to your company.
How Guardian Digital Can Help Prevent Against BEC
Guardian Digital EnGarde Cloud Email Security effectively protects against BEC attacks and other advanced email threats. EnGarde provides:
- Fully-managed end-to-end business email protection, accurately identifying and rapidly quarantining malicious email and preventing them from reaching the inbox
- A multi-layered, open-source approach to email security, where individual layers work harmoniously to provide comprehensive, resilient protection
- Centrally managed cloud-based administration
- Automatically adjusting detection algorithms that anticipate attacks
- Seamless implementation and unrivaled 24x7x365 customer support
Business email compromise is a more serious and common threat to businesses of all sizes across all industries than ever before. Attackers utilize advanced social engineering tactics and techniques including email spoofing, spear phishing and ransomware to gain access to a corporate email account and sends fraudulent emails under the identity of the account owner in order to steal money from the target company.
This email attack is becoming increasingly popular because organizations have more money to lose than individuals do, and the scam preys on the willingness of employees to please the boss.
Engaging in basic email security best practices has the potential to mitigate companies’ risk of suffering the aftermath of BEC; however, investing in an advanced, comprehensive business cloud email security is the best way to prevent these dangerous and costly attacks.
Learn More about BEC
Do you have any questions about BEC that haven’t been addressed in this article? If so, please contact us and we would love to answer them!
Stay tuned for our next Email Threats Explained blog post: What is Malware?
- Effectively Securing Business Email Accounts: Are Employees the Weakest Link?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: Founder of Guardian Digital – Open Source Cloud Email Security
- New Ransomware Warnings: Is Your Business Safe from This Silent Threat?
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- How To Safely Navigate Office 365 While Working Remotely
- Tips and Advice for Staying Safe Online During COVID-19
- Why Your Business Needs Better Email Security
- Defending Against COVID Email Spoofing Attacks with DMARC
- You’ve Got Mail: How To Tell If It’s Fraud
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Email Threats By The Numbers: How Big Is My Risk?
- The Modern Email Threat Landscape: Where Traditional Defenses Fall Short
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Top Email Security Trends Putting Your Business at Risk of Attack
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2020
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How To Secure Your Remote Workforce: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Office 365 Email Is Vulnerable to Attack Without These Critical Supplementary Defenses in Place
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Ransomware Attack Explained - Best Practices For Ransomware Protection
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- Email Virus - Complete Guide to Email Viruses Plus Best Practices
- What Is A Zero-Day Attack & How To Prevent Zero Day Exploit?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Email Security: Complete Guide on Email Protection & Types of Email Threats
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail