Four Hikvision Tips to Boost Cybersecurity and Reduce Risk
The world of cybersecurity has some pretty creative and interesting terms to describe a wide range of attacks such as phishing, juice-jacking, rainbow tables, credential stuffing, and botnet. Today we’ll cover risks associated with Business Email Compromise (BEC), a phishing attack that is simple to execute and can be very costly to the victim.
BEC is a type of phishing attack with the goal of tricking the victim into sending money to the attacker. According to a 2018 FBI report, BEC attacks have earned scammers over $12 billion.
Five Types of BEC
The website Phishprotection.com reports that there are five types of BEC, outlined below:
- Bogus Invoice Scheme: When a business that has a long standing relationship with a supplier is requested to wire funds for invoice payment to an alternate, fraudulent account.
- CEO Fraud: When the compromised email account of a high level executive is used to request a wire transfer to a fraudulent account.
- Account Compromise: When an employee of a company has their email account compromised and it’s then used to request repayment of an invoice by a customer to a fraudulent account.
- Attorney Impersonation: When victims are contacted by fraudsters identifying themselves as lawyers and are pressured into transferring funds to a fraudulent account.
- Data Theft: When fraudulent emails are used to request either wage or tax statement (W-2) forms, or a company list of personally identifiable information (PII).
With each of these attack methods, the victim is sent an email in an attempt to trick them into trusting the sender and either revealing sensitive information or transferring funds. Typically, the attacker does enough research to know the name and email address of their target, and the person in the company who would normally ask for large sums of money to be wired somewhere. We’ll call this person the requester. Often the target is the CFO and the requester is the CEO.
In practice, the BEC attack is fairly simple. The attacker sends an email that appears to be from the requestor, to the target. This email requests that a wire transfer be made to a specific account. If the attacker sends a well-crafted email and asks for an amount of money that doesn’t raise suspicion, they will likely reap the rewards of this scam. Below is a BEC email example.