Thought Leadership

The Growing Threat of Business Email Compromise

(March 11, 2024) How to protect your organization from Business Email Compromise – fraudulent wire transfers and other payment scams.

Business Email Compromise

Ransomware attacks tend to garner headlines, but there’s another threat that’s costing organizations billions of dollars. These are social engineering scams involving fraudulent wire transfers or data theft.

Known as business email compromise (BEC) fraud, these schemes often target employees who regularly perform wire transfer payments, preying on their basic kindness and trust. BEC scammers typically assume the identity of the CEO, a company attorney, or a trusted vendor to request funds. By requesting electronic wire transfers instead of direct cash or credit card payment, the attack gains an air of legitimacy.

“BEC scams take other forms as well,” said Mark McClelland, co-founder and vice president of Mainstream Technologies. “The attackers may spoof or gain access to a vendor’s email account and send fake invoices or payment requests to the vendor’s customers. In gift card scams, the attackers impersonate a company manager or executive and ask an employee to purchase gift cards and share the codes. Some BEC attacks are designed to steal intellectual property, financial records, customer data or other sensitive information.”

Billions of Dollars in Losses

According to threat analysis by Abnormal Security, BEC attacks increased more than 81 percent in 2022. Microsoft Threat Intelligence detected and investigated 35 million BEC attempts between April 2022 and April 2023, with an average of 156,000 attempts daily.

“Victims of BEC scams range from small businesses to large corporations. Smaller businesses are often targeted because of the perception that they have fewer security controls in place,” McClelland said.

Of course, entities that frequently make wire transfers are prime targets. According to the FBI, the real estate industry is the most targeted sector, suffering losses of $2.7 billion to BEC scams. The Financial Crimes Enforcement Network found that 40 percent of these attacks impersonated title and closing companies.

Fraud involving electronic fund transfers across major settlement channels such as the Automated Clearing House (ACH) is rising because these transfers tax banks’ ability to check for fraud. Where banks once had two to five days to analyze these transactions, they now have only a few hours.

How BEC Attacks Work

Although techniques vary, attackers generally start by researching the organization to learn the names of individuals in leadership and those in finance, accounting, or other employees who regularly manage money. This information can generally be found on social media. The attackers then use malware or phishing to steal the credentials of an executive’s email account, enabling them to send emails that appear to come from inside the organization. Then it’s a matter of creating a message that seems legitimate.

“BEC emails can be difficult to detect, but there are some red flags that can point to an attack,” said McClelland. “Typically, the messages state that the wire transfer is urgent and requires confidentiality. They may include unexplained changes in wire instructions or account information, or unusual requests for advance payment. The attacker may use flattery or threats to coerce the victim into taking action.”

Defending Against BEC Attacks

The best defense for combating social engineering attacks is to educate employees and implement procedural controls. The following recommendations can help improve your internal security measures:

  • Establish verification policies and procedures with all employees who manage money and conduct wire transfers. They should always be suspicious of email requests and never fulfill them without verifying with the requestor through a different channel — either by phone, fax or in person.
  • Educate executives as well. Company officials must understand that email requests for funds are strongly discouraged, will be met with suspicion, and will require verification. Financial transaction security cannot be the sole responsibility of front-line employees.
  • Focus on prevention. Establish policies for regularly updating passwords, with requirements that make them hard to crack. Make sure the help desk and IT staff require verification before giving out forgotten passwords. Encourage everyone to secure or shred business-related documents.
  • Establish a crime-response process. Contact your financial institution immediately if you believe you are the victim of wire transfer fraud. Ask your institution to immediately contact the corresponding institution where the transfer was sent. Report the incident to the local FBI office, which may be able to freeze the funds. File an official complaint with the FBI’s Internet Crime Complaint Center.

BEC attacks serve as a reminder that it’s just as important to establish a “human firewall” through strong internal security policies and training. Organizations should implement regular security awareness training and ensure that the material covers BEC attacks.

ABOUT MAINSTREAM TECHNOLOGIES  

Mainstream Technologies delivers a full range of technology services in Arkansas and the surrounding region including managed technology services and consulting, custom software development, and cybersecurity services. We also offer industry-leading data center services in our Little Rock facilities. Established in 1996, Mainstream has earned a reputation for delivering quality, reliable, and professional technology services for public and private-sector customers across the United States. 

Jeff Pracht
IT Business Development Manager
(479) 715-8629 Office
(501) 529-0008 Mobile

Contact Us

  • Industry

  • Category

  • Regulation

  • Solution