Business Email Compromise is a new form of cybercrime. Working from home, which is currently widespread. The Check Point Research team, at Check Point Software Technologies Ltd. sees a current trend that cybercriminals are trying to deceive and exploit employees in the home office to carry out fraudulent transfers. Business Email Compromise (BEC) is the name of this criminal approach. The FBI Internet Crime Report 2019 showed that BEC stole $ 1.7 billion in the United States alone.
The term BEC stands for Business Email Compromise and describes a particular scam that is popular with hackers. The attackers cleverly gain access to the mail accounts of decision-makers in a company or their suppliers. As soon as they have this, they start to read the email traffic, understand the processes and spy on the employees.
The aim of the whole thing is trickery: the hackers want to gain so much knowledge about the company’s internal structure and communication methods that they can pretend to be decision-makers – CEO or CFO – and the employees with fraudulent but cleverly faked To deceive news. If they succeed, they initiate supposedly authorized transfers to their accounts and digital wallets or redirect instructed transfers to them. Check Point has already shown how much money a group can steal single-handedly with this scam, based on a case unmasked by the research team.
With many employees working from home, the current situation makes it much easier to carry out this scam. Work instructions, agreements and customer contact – almost all communication currently takes place exclusively digitally. If an attacker then stole the access data to the account of a high-ranking employee, such as a CEO or CFO, there are only a few hurdles in the way of a successful attack. It is all the more important not to enable BEC in the first place and to train employees accordingly.
Christine Scheming, Regional Director Security Engineering CER, Office of the CTO at Check Point Software Technologies, explains, “We are in the midst of a paradigm shift in hacking activity: the criminals are taking advantage of the fact that many of us are currently working from home. We see the BEC scams as part of this trend. Any company or organization known for transferring large sums of money should be aware that this type of fraud is a primary target. Suppose employees work at home and rely primarily on email traffic. In that case, a skilled attacker can monitor and manipulate every single email – this is particularly worthwhile for employees who can move money. We also expect an increase in attempted fraud in 2020, as teleworking and digital communication have increased significantly in terms of the content value of the news. “
ALSO READ: IT Security: These New Providers Are Entering The Market
Recognized for its plethora of high-tech accessories, the Chinese giant Xiaomi has just launched its…
One of the main elements of an identification system based on RFID technology is undoubtedly…
Criteo has set up a data lineage system around its Hadoop cluster. What techniques does…
Its origin, although rooted in traditions, finds new expressions today. The most famous examples demonstrate…
Cloud management has established itself in many companies that must continue to manage their on-site…
There is no question that app development is a booming business. “There’s an app for…