Business Process Compromise
Business Process Compromise (BPC): Attacks classified as BPC or ‘business process compromise’ silently alter a part of specific business processes in order to generate significant monetary profit for the attackers. Read more
- December 12, 2017Security researchers shed light on the cybercriminal group MoneyTaker, reported to have stolen $10 million from financial organizations in the U.S. and Russia. What can enterprises do?
- November 06, 2017Nepal’s NIC Asia Bank fell victim to a BPC scheme that compromised the bank’s SWIFT systems.
- October 13, 2017In a recent incident, a BPC attack targeted banks across multiple post-Soviet states, with losses totaling roughly $40 million.
Business Process Compromise, Business Email Compromise, and Targeted Attacks: What’s the Difference?June 20, 2017How do we distinguish Business Process Compromise (BPC) from targeted attacks? Can Business Email Compromise (BEC) be considered BPC? All three share similarities, but knowing their distinctions can help enterprises fine-tune their defensive measures.
- February 01, 2017Past events show that attackers don't just target people, but processes as well. Enterprises should be aware of the of rising possibility of Business Process Compromises.