{"id":2663,"date":"2020-05-17T22:19:17","date_gmt":"2020-05-18T06:19:17","guid":{"rendered":"https:\/\/internetsafety.trendmicro.com\/?p=2663"},"modified":"2022-02-18T08:35:22","modified_gmt":"2022-02-18T16:35:22","slug":"business-email-compromise-a-cybersecurity-crime-challenge-for-small-and-medium-businesses","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/business-email-compromise-a-cybersecurity-crime-challenge-for-small-and-medium-businesses\/","title":{"rendered":"Business Email Compromise, A Cybersecurity Crime Challenge for Small and Medium Businesses"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]By Mitchel Chang<\/p>\n<p><strong>Business Email Compromise (BEC)<\/strong> has become a very series cybercrime in the past several years where billions of dollars were lost by various businesses.\u00a0 In additional to direct financial loss to the hackers, a company\u2019s overall loss may be much greater. For example, a company\u2019s reputation may suffer from a data breach and they may lose customers as result of a BEC event.\u00a0 Also, instead of focusing on their core business, the aftermath of a BEC attack would be expensive and a distraction between business executives, law enforcement, and other victims.<\/p>\n<p>A typical BEC attack would be launched by email.\u00a0 The emails are either spoofed or compromised by the attackers.\u00a0 For example, an attacker may pretend to be a vendor by requesting invoice or transaction payments such as real estate services.\u00a0 We also often see the fake executive requesting his\/her finance department to execute a wire transfer to a third party. With our recent COVID-19 challenges and more working-from-home employees, we will see more companies and organizations become less centralized and less in-person interaction between staff. This will provide some additional opportunities for the BEC attackers to trick more people.<\/p>\n<p>On April 6, 2020, <a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-anticipates-rise-in-business-email-compromise-schemes-related-to-the-covid-19-pandemic\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Bureau of Investigation (FBI) issued a warning<\/a> anticipating a rise in BEC schemes related to the COVID-19 Pandemic. \u201cFraudsters will take advantage of any opportunity to steal your money, personal information, or both. \u00a0Right now, they are using the uncertainty surrounding the COVID-19 pandemic to further their efforts.\u201d \u00a0\u00a0According to FBI, there has been an increase in BEC frauds targeting municipalities purchasing personal protective equipment in the fight against COVID-19. Also, most of the recent BEC attacks were targeted at the financial institutions or banks<strong>.<\/strong><\/p>\n<p>Cybersecurity vendors are helping to develop various tools to scan and filter malicious and phishing (spoofed) emails by using all the latest technologies such as big data and machine learning. For example, the threat response teams from Trend Micro are using cloud email reputation services and machine learning to capture the company executive\u2019s writing style to help prevent BEC as part of its overall business cybersecurity software suite.<\/p>\n<p>Although cybersecurity tools are getting better and lots of potential fake or spoofed emails can be filtered, we can\u2019t ignore the human and social engineering approaches which attackers will leverage. In BEC, we often see fake emails that will appear to be sent by a close friend or business associate. For example, a company CFO will get a fake email from his\/her CEO to request a wire money transfer. This is what we refer to as \u201cspear phishing\u201d.<\/p>\n<p>To carry out BEC attacks, hackers often utilize an organized team with various roles and responsibilities that include:<\/p>\n<ol>\n<li>Assessing to identify potential targets by using various searches in social media and on Internet sites<\/li>\n<li>Creating a target list and send out phishing or spear phishing emails<\/li>\n<li>Responding if the victim responds, engaging directly with some small exchanges to secure the fraud<\/li>\n<li>Requesting financial transition by sending the money to a third party (\u201cmules\u201d)<\/li>\n<li>Closing and repeating the same scam if possible<\/li>\n<\/ol>\n<p>Don\u2019t underestimate their capabilities as they are professionals.\u00a0 Before hacker teams launch their fake emails, the first step is for them to identify and study a potential prospect. They often use popular social media sites such as LinkedIn and Facebook and a people search site such as PIPL. As for identifying business owners or executives, attackers can easily find their personal information just through Google searches or on the company website.<\/p>\n<p><strong>Here are some preventive measures which we recommend:<\/strong><\/p>\n<ol>\n<li>Avoid posting any personal identifiable information (PII) on Internet. For example, your birthday, Social Security or driver\u2019s license number.<\/li>\n<li>Lessen the posting of any internal company or communities\u2019 social activities to the public by restricting it to company internal or special interest groups such as your friends on Facebook only<\/li>\n<li>If you are not technically savvy, always leverage your IT person to check email headers if in doubt.<\/li>\n<li>Have a strong company policy and process. For example, companies may insert certain processes to avoid making payment to a non-authorized third party. Please remember, <strong>the attackers will always leverage your weakest link<\/strong>. If they can hack into your network by stealing an email account password, they won\u2019t need to run a phishing launch. Instead, they will send out an email from the employee\u2019s original email address.<\/li>\n<li>Use cybersecurity tools. It is very important that your organization install good, reputable cybersecurity protection at all levels. For example, at end-point, email, cloud, and at the network.\u00a0 Your potential exposure and liability will far exceed the investment of the tools which your IT staff setup to prevent BEC and other compromises.<\/li>\n<\/ol>\n<p><strong>For more free cybersecurity tips for start ups and small businesses, visit our <a href=\"\/internet-safety\/business\">Internet Safety for Small Businesses<\/a> page.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mitchel Chang Business Email Compromise (BEC) has become a very series cybercrime in the past several years where billions of dollars were lost by various businesses.\u00a0 In additional to direct financial loss to the hackers, a company\u2019s overall loss may be much greater. For example, a company\u2019s reputation may suffer from a data breach [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":2664,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"By Mitchel Chang\r\n\r\n<strong>Business Email Compromise (BEC)<\/strong> has become a very series cybercrime in the past several years where billions of dollars were lost by various businesses.\u00a0 In additional to direct financial loss to the hackers, a company\u2019s overall loss may be much greater. For example, a company\u2019s reputation may suffer from a data breach and they may lose customers as result of a BEC event.\u00a0 Also, instead of focusing on their core business, the aftermath of a BEC attack would be expensive and a distraction between business executives, law enforcement, and other victims.\r\n\r\nA typical BEC attack would be launched by email.\u00a0 The emails are either spoofed or compromised by the attackers.\u00a0 For example, an attacker may pretend to be a vendor by requesting invoice or transaction payments such as real estate services.\u00a0 We also often see the fake executive requesting his\/her finance department to execute a wire transfer to a third party. With our recent COVID-19 challenges and more working-from-home employees, we will see more companies and organizations become less centralized and less in-person interaction between staff. This will provide some additional opportunities for the BEC attackers to trick more people.\r\n\r\nOn April 6, 2020, <a href=\"https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-anticipates-rise-in-business-email-compromise-schemes-related-to-the-covid-19-pandemic\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Bureau of Investigation (FBI) issued a warning<\/a> anticipating a rise in BEC schemes related to the COVID-19 Pandemic. \u201cFraudsters will take advantage of any opportunity to steal your money, personal information, or both. \u00a0Right now, they are using the uncertainty surrounding the COVID-19 pandemic to further their efforts.\u201d \u00a0\u00a0According to FBI, there has been an increase in BEC frauds targeting municipalities purchasing personal protective equipment in the fight against COVID-19. Also, most of the recent BEC attacks were targeted at the financial institutions or banks<strong>.<\/strong>\r\n\r\nCybersecurity vendors are helping to develop various tools to scan and filter malicious and phishing (spoofed) emails by using all the latest technologies such as big data and machine learning. For example, the threat response teams from Trend Micro are using cloud email reputation services and machine learning to capture the company executive\u2019s writing style to help prevent BEC as part of its overall business cybersecurity software suite.\r\n\r\nAlthough cybersecurity tools are getting better and lots of potential fake or spoofed emails can be filtered, we can\u2019t ignore the human and social engineering approaches which attackers will leverage. In BEC, we often see fake emails that will appear to be sent by a close friend or business associate. For example, a company CFO will get a fake email from his\/her CEO to request a wire money transfer. This is what we refer to as \u201cspear phishing\u201d.\r\n\r\nTo carry out BEC attacks, hackers often utilize an organized team with various roles and responsibilities that include:\r\n<ol>\r\n \t<li>Assessing to identify potential targets by using various searches in social media and on Internet sites<\/li>\r\n \t<li>Creating a target list and send out phishing or spear phishing emails<\/li>\r\n \t<li>Responding if the victim responds, engaging directly with some small exchanges to secure the fraud<\/li>\r\n \t<li>Requesting financial transition by sending the money to a third party (\u201cmules\u201d)<\/li>\r\n \t<li>Closing and repeating the same scam if possible<\/li>\r\n<\/ol>\r\nDon\u2019t underestimate their capabilities as they are professionals.\u00a0 Before hacker teams launch their fake emails, the first step is for them to identify and study a potential prospect. They often use popular social media sites such as LinkedIn and Facebook and a people search site such as PIPL. As for identifying business owners or executives, attackers can easily find their personal information just through Google searches or on the company website.\r\n\r\n<strong>Here are some preventive measures which we recommend:<\/strong>\r\n<ol>\r\n \t<li>Avoid posting any personal identifiable information (PII) on Internet. For example, your birthday, Social Security or driver\u2019s license number.<\/li>\r\n \t<li>Lessen the posting of any internal company or communities\u2019 social activities to the public by restricting it to company internal or special interest groups such as your friends on Facebook only<\/li>\r\n \t<li>If you are not technically savvy, always leverage your IT person to check email headers if in doubt.<\/li>\r\n \t<li>Have a strong company policy and process. For example, companies may insert certain processes to avoid making payment to a non-authorized third party. Please remember, <strong>the attackers will always leverage your weakest link<\/strong>. If they can hack into your network by stealing an email account password, they won\u2019t need to run a phishing launch. Instead, they will send out an email from the employee\u2019s original email address.<\/li>\r\n \t<li>Use cybersecurity tools. It is very important that your organization install good, reputable cybersecurity protection at all levels. For example, at end-point, email, cloud, and at the network.\u00a0 Your potential exposure and liability will far exceed the investment of the tools which your IT staff setup to prevent BEC and other compromises.<\/li>\r\n<\/ol>\r\n\r\n<p><strong>For more free cybersecurity tips for start ups and small businesses, visit our <a href=\"\/internet-safety\/business\">Internet Safety for Small Businesses<\/a> page.<\/strong><\/p>","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[196],"tags":[199,197,198,200,204,70,97,201,202,51,205,203],"class_list":["post-2663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-for-business","tag-attack","tag-bec","tag-business-email-compromise","tag-ceo","tag-covid19","tag-cybercriminals","tag-cybersecurity","tag-email","tag-email-spoofing","tag-phishing","tag-small-business","tag-social-engineering","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/2663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=2663"}],"version-history":[{"count":2,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/2663\/revisions"}],"predecessor-version":[{"id":22348,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/2663\/revisions\/22348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media\/2664"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=2663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=2663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=2663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}