Business Email Compromise: Driving the cyber-crime pandemic

Your business may be battling to compete because of this common misperception

Business Email Compromise (BEC) attacks are a sophisticated type of scam, targeting both businesses and individuals, which aim to transfer funds from victims’ bank accounts to criminals. The FBI’s 2019 Internet Crime Report states that the total annual losses generated by BEC in the US alone reached $1.7 billion. BEC scams also accounted for half of all cybercrime losses in the US in 2019, making BEC the #1 cyber threat in terms of economic damage. Insurance giant AIG confirmed this, reporting BEC as the leading reason behind businesses filling cybercrime insurance claims in 2018, followed by ransomware and data breaches.

In its early days, BEC typically began with hacking or spoofing email accounts of CEOs or CFOs of businesses, and then requesting funds transfers to accounts controlled by the criminals. Over the years, these attacks have grown in sophistication, mostly in the social engineering aspect of the attacks. Rather than targeting the companies directly, attacks now target customers, HR departments, suppliers, related accountants, and law firms, and even tax authorities. In addition to directly generating or diverting currency transactions, BEC attacks have also been used to fraudulently purchase gift cards, divert tax returns, and even transfer millions of dollars’ worth of hardware and equipment into the control of cybercriminals.

COVID-19 driving a pandemic of BEC attacks

To help with their social engineering attempts, criminals love to tap into interest or concerns over major current events or news stories.  Moreover, right now, they have the perfect vehicle for scams with the COVID-19 pandemic.  The new working conditions enforced by the global outbreak has triggered a spike in BEC scams, simply because more remote working means more opportunities to catch users off guard.  Check Point Research recently showed a 30% increase in COVID-19 related cyber-attacks over the first two weeks of May, many of which involved email scams, with 192,000 coronavirus-related cyber-attacks documented per week on average.

Multiple incidents have been reported of government agencies and medical services, who, while attempting to procure medical equipment, transferred funds to fraudulent brokers prior to receiving the items, only to learn that the equipment does not exist, and that the funds are unrecoverable.

What is behind a BEC attack?

Let us look at the component parts of a basic BEC attack. An attacker typically constructs an email that impersonates a high-level executive of a company – either by hacking into the organization’s email system, or by designing a legitimate-looking fake – and sends it to an employee, requesting a transfer of money to a bank account under the attackers’ control. This is often done with the excuse of urgency or communication problems preventing the manager from communicating in alternative ways.

The three main ways of impersonation are:

1. Spoofing the source email address – as the basic SMTP protocol does not provide a sender validation mechanism, attackers can use either dedicated or publicly exposed SMTP servers to send emails with a spoofed sender address.

2. The attacker sends emails from the authentic email account of the impersonated victim by gaining control of their email account through phishing, credentials theft, or other means.

3. The attacker sends an email using a look-alike domain, which they register. In this case, the domain differs from the authentic address by a minor detail, such as sending an email from “example.co” rather than “example.com”.

BEC scams hit all sectors of commerce, from real-estate to art, government, municipalities and even the military. In one such fraud that was exposed in 2019, a US defense contractor was tricked into sending equipment for a fake order worth over $10 million, including $3.2 million in highly sensitive communications interception equipment. The attacker sent a phony purchase order using a fake Yahoo email address ending in “navy-mil.us.” The equipment was shipped and received in an office space, which after further investigation revealed the identity of the person who contracted it, leading to their arrest. The success of such BEC frauds requires, in addition to the fake email account, detailed knowledge of the identity of the officials to contact, the tone and phrasing of the purchase order and communication jargon, and acquaintance with the right equipment to order.

Organized crime fuelling BEC

Often, these sophisticated attacks are not conducted by a single individual and instead require an infrastructure typical to organized crime. Operations demand bank accounts to be established, which often requires the use of stolen identities obtained in underground markets or stolen in separate operations. Stolen funds must be withdrawn by multiple individuals and transactions, which involves complex logistics of money mules, often in international operations.

In a sophisticated BEC attack recently exposed by Check Point Research, the attackers infiltrated the o365 email account of three financial firms and monitored all correspondence for several weeks. They then created lookalike domains for the attacked firms, as well as the corresponding partners, accountants and banks, and then diverted relevant communication to the fake domains, creating a “man-in-the-middle” scheme (Fig 1) which allowed them to divert and initiate fraudulent money transfers for more than $ 1.3M. Such attacks are more complicated to terminate even after their exposure since an unknown number of customers and service providers may still be unknowingly conducting correspondence directly with the attackers.

How does business email compromise work?

Look-alike domains used in a sophisticated Man-in-the-Middle email interception.

Intervention in such operations requires international law enforcement cooperation in networks spread over several continents. One such operation, revealed in September 2019, resulted in the arrest of 281 suspects located in 10 countries, as well as the recovery of $ 120 million in confiscated and recovered wire transfers.

From gift cards to military equipment    

Direct money transfers are not the only way to steal money through BEC attacks. In many cases, it is easier to persuade company officials to buy gift-cards rather than make a direct transfer of funds. In this way, attackers are not required to create fraudulent bank accounts and gift card details are sold online in online forums for about 70% of their actual value. Attacks with gift cards are especially widespread during holiday seasons and money back is nearly impossible. The most popular gift card suppliers used in BEC frauds are Google Play, eBay, Target, and Walmart and according to researchers, this technology is used in more than 60% of BEC accidents.

So how can you improve your organization’s resilience to BEC attacks?  Here are our tips:

▪ Protect your email traffic with at least one layer of an advanced email security solution from a known vendor. Niche players and open-source solutions might even cause more damage than good.

▪ Protect mobile and endpoint browsing with advanced cyber security solutions, which prevent browsing to phishing web sites, whether known or unknown

▪ Use two-factor authentication to verify any change to account information or wire instructions.

▪ Continuously educate your end users:  whenever irreversible actions such as money transfers are conducted, details of the transaction must be verified in additional means such as voice communication and must not exclusively rely on information from email correspondence.

▪ Check the full email address on any message and be alert to hyperlinks that may contain misspellings of the actual domain name.

▪ Do not supply login credentials or personal information in response to a text or email.

▪ Follow Security Best Practices

▪ Regularly monitor financial accounts.

▪ Keep all software and systems up to date.

Edited By: Darryl Linington
Contact: Darryl@techitout.co.za
Follow @TechITOutMedia on Twitter
Follow @DarrylLinington on Twitter

Editor of Tech IT Out. Former radio host of Cliffcentral.com. Former Editor of IT News Africa and ITF Gaming. All round techie, gamer and entrepreneur. For Editorial Enquiries Contact: Darryl@techitout.co.za or via +27788021400.