Do you suffer from arachnophobia? It's easy to see why those creepy-crawly little guys can strike fear into the hearts of many.
What if we told you there is a threat creeping into your inboxes that should scare business owners as much as spiders?
Officially it’s called CEO Fraud or Business Email Compromise (BEC). At 360 Smart Networks, we have decided to give it the more descriptive name "Deadly Flying Spiders" or DFS. It seems BEC doesn't inspire the required level of fear and attention, but it certainly should.
DFS can and will attack anyone.
If you move money from one point to another, whether buying, selling or giving, you are being stalked by DFS.
The annoying part is that unlike DFS, BEC is completely avoidable and should almost never be an issue.
Yet, according to the FBI, it costs the US economy over $3 billion dollars annually. To put it in perspective, victims of "traditional" burglaries lost roughly $3.6 billion in 2015.
The scam is a type of theft by deception. BEC criminals compromise business e-mail accounts to manipulate victims into transferring funds. The attacker gains access to an individual’s email and monitors their actions. They read the emails, study the calendar, and use the information they find in a social engineering attack. Anyone is a target, but those working with accounts receivable or payable are the most likely victims.
After getting an understanding of how money moves from one point to another, they try and insert themselves into the transaction. They will try submitting a fake invoice or asking for payment on real invoice. They will try to create a sense of urgency for a payment based off your schedule (at the end of your work week), or when they think you won't be able to respond (on vacation etc.). Money is paid via wire as requested and disappears into a web of international transfers.
Example 1
Example 2
At 360, we take a lot of time and energy to make sure our clients' email systems are secure, but in each case that we’ve seen the breach was in the weakest spot. Why go through the effort of getting into a protected professional email if you can get into the compromised Yahoo account? All you need is to be a silent participant in the chain. You don’t have to have access to the root sender.
There are a variety of tactics used in BEC. Criminals create fake domains and leverage the victim's digital footprint for personal information.
As usual, the many perpetrators are overseas in jurisdictions where they are difficult to find. They can be individuals or organized criminal gangs.
If these were actual flying spiders, the solution would be interesting. But the answer is simple.
Two words – accounting controls.
Most IT firms will suggest you harden your email system, which should be a default, but remember the attack doesn’t need to be inside your system. It only has to be somewhere in the chain.
So try and incorporate as many of the following points into your payment policy:
1. Verify payment details independently for any new, or change to existing vendor
2. Don’t call the number on the invoice or email – verify the contact details online and verbally verify the change with a trusted party.
3. Assess the email address on the emailed request – pay attention to the details of the name and look for small variations.
4. Pay attention to timing. Remember that access to emails usually means access to calendars. Handle any urgent requests with caution. We see spikes just before major public holidays.
5. Listen to your gut – if it doesn’t feel right, flag and follow up.
I'd love to talk with you about your company's security needs. You can read more about all of 360 Smart Network's services here, including our Securance solution.