September 28, 2018

The Art of the Steal: Business Email Compromise

Just when you thought it was safe to go back in the [email] water… Phishing gets serious. Of course, you should never let your guard down on phishing and spoofing, but there’s a bigger shark in the water now; one that impersonates important people within an organization. This new type of scam is referred to as Business Email Compromise, or “BEC.” These emails use similar tactics to phishing but are much more targeted, and directed at a specific individual or a small group or individuals. They prey on the fact most people will not question a company executive or a vendor making changes to their systems.

Let’s put ourselves in the shoes of a scammer. Where do you want to spend your time when you’re working? You’ll likely say, “On things that will produce the best value for the effort. Phishing a consumer might net a few hundred to a couple thousand dollars at a time. Why not look at a different target with much deeper pockets? In July 2018, the FBI released a report estimating “between December 2016 and May 2018 there was a 136% increase in identified global exposed losses due to the [BEC] scam, to $12.53 billion. (“Exposed losses” includes both actual and attempted dollar losses.)”

There are several variations of BEC fraud to consider, but they all operate with similar tactics and targets:

  1. Someone poses as a company’s executive and instructs staff to make a wire transfer into the fraudulent account.
  2. Fraudster poses as an IT services department at a financial institution saying they want to make a test transfer, resulting in an actual transfer.
  3. Fraudsters claim to be a corporate supplier and ask for outstanding invoices to be paid into a different bank account than usual.
  4. Employees click on links within phishing emails containing malware, providing credentials to make transfers on their own.

How do BEC scams work?

Typically, an individual within a finance role will be the targeted victim. Why? They likely have access to conduct money transfers for an organization. The scam usually starts with a generic email trying to get a response from the intended target. It could be something as simple as, “Are you in the office today?” While responding, the individual is providing all kinds of useful details about themselves and their organizational role. How? An email signature, which is commonly included in corporate emails and contains information such as phone number, proper title, and full name.

The second contact often comes with a request about an upcoming purchase or a potential bill needing to be paid quickly, in secret, or with little information from the requestor. The next contact could outline a secret deal to buy a company, or the purchase of goods and services from a new vendor. These will also usually arrive from an email address similar in nature to the actual individual being impersonated, but not from their actual email address (i.e., from a Yahoo or Gmail account instead). This is used to circumvent authentication solutions such as SPF, DKIM, and DMARC used on a business domain.

To make these scams more believable, multiple touchpoints will now be used: The fake account calling with questions and asking about specific details of the email (to make it more believable), additional emails from the requestor asking if they have talked to the accountants, and possibly supporting documents seemingly verifying this type of activity. Those documents could also include malware to gain direct access to the victim’s computer.

Remember: All these tactics will focus on urgency and secrecy. The number of touch points and contact is only added in to build on the fact this is urgent, and to confuse or fluster the target into completing the transfers.

What can I do to prevent being tricked by a BEC?

Start by recognizing the tactics used in a BEC. If you can see through the scam, you are already ahead of the game. Consider adding internal roadblocks to deal with BEC type situations.

  1. Follow up with the requester by calling or texting them; do not wait for them to contact you again, or reply to the same message. Try a different method of communication to contact the “requestor,” so if you get a hold of them and they’re as confused as you are, you know the request isn’t legit.
  2. Confirm the source of the communication. Is it the proper corporate email, proper phone number, the usual accountant or firm?
  3. Insert stringent steps and paperwork into the process. For instance, The need for two signatures on approvals, add multiple layers of approvals based on the dollar value of the request, or add a requirement that all paperwork for transfers be delivered before the transaction. And yes, even requests from the CEO should be subject to this process. Get their buy-in and support. It might just save them in the end.
  4. Consider what your senior executives post about travel on their social media profiles. Mentioning travel publicly provides an opportunity for fraudsters to impersonate them while they are potentially hard to reach.

Setting policies and enforcing them at all levels limiting the ability for one person to make or authorize a transfer of a large sum of money can help prevent scams and reduce your risk. Educating finance staff and having a plan in place for all transfers from your organization, starting at the top down, can help identify and stop these attacks.

Ultimately, build in safeguards to protect against Human 1.0, a software not easily patched and hard-wired to be helpful and empathetic towards others. Your business may depend on it.

Author: Matthew Vernhout

Matthew Vernhout is a digital messaging industry veteran and Certified International Privacy Professional (CIPP) with more than a decade of experience in email marketing. Matt is 250ok’s Director of Privacy, and he is currently the Vice Chair of the eec, after serving for several years as the Chair of their Advocacy Subcommittee.

You may also like...

The Year in Email 2019

It’s hard to believe we are nearing the end of yet another exciting year in email, and 2019 proved to be one of the most momentous and active years to date. Over the past year, the number of new technologies, mergers and acquisitions, mailbox provider (MBP) announcements, news, and highlights is evidence of the versatility […]

[Infographic] Global Privacy Relationship Status: It’s Complicated

I recently gave a presentation on global privacy regulations to a post-graduate marketing class and one of the things I noticed while preparing was that even within a single country, privacy is complicated. On a global scale, it is really complicated. For example, Canada has one federal private sector privacy law, three similar provincial laws, […]

The Year in Email 2018

*Update: This article was featured on email influencer Jordie van Rijn’s emailmonday blog! To see it in action, plus a great round-up of other articles and thought leadership looking forward to the future of email, click here.* The Black Friday emails are deleted, marketers’ email lists are checked twice, we pretty much know which senders […]

Ready to get started?