Site icon iFeeltech

Business Email Compromise (BEC) – A Cybersecurity Threat You Should Know About

checking email online business technology on a virtual interface

businessman hand typing on laptop keyboard checking email online. business technology on a virtual interface

The most common attacks against business emails are phishing and ransomware. Essentially, a business email compromise (BEC) is when an attacker impersonates the actual owner of the account to steal money or sensitive information from the company.

A (BEC) attack can cause thousands of dollars in damage to a business and take a lot of time and resources to recover.

Cybercriminals are not only trying to get money but also confidential data.

Real-Life Examples of BEC

An example of a BEC attack is an email that appears to come from one of the company's long-time employees, typically the CEO or CFO, requesting a wire transfer to a specific account. The email is usually well written, sometimes including dates, additional contact information, and contact numbers. In addition, they typically use hacked employee email accounts or email addresses that look similar to official company email.

Although they are primarily looking to make money from the company, some try to gain access to confidential information, for example, by accessing a customer database or business development data.

These are the three most common techniques used by cybercriminals in a business email compromise-type attack:

In this case, the employee is receiving a misleading letter from a more senior colleague. Attackers may use this to trick the employee into sharing information with company leaders but provide a fake email address to steal confidential company data.

In this scenario, the accounting department will receive an employee requesting a change to their payroll credentials. If the accounting staff member modifies card details in the payroll system, the attacker will receive the employee's salary.

This email also tries to fool accounting by making it look like a legitimate invoice or a late payment notice. If the accounting employee falls for this trick, the money is once again going to the cybercriminals.

These attacks are possible because cybercriminals can easily find the names, job titles, work addresses, and employees' contact lists in public databases. After which, they usually use various social engineering techniques to gain the victim's trust and carry out their fraudulent operations.

How can you protect against BEC?

Companies can minimize BEC attacks by undertaking the following measures:

Unfortunately, there is no end in sight to business email fraud. Research shows that it is becoming an increasingly significant threat to organizations. Therefore, your business may be targeted at some point. Be vigilant and on the lookout for possible BEC attacks that could penetrate our organization's security.

Let us know if you have any questions or would like to schedule a free IT Security consultation.

Exit mobile version