1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.

Ransomware Grabs Headlines but BEC May Be a Bigger Threat

Discussion in 'General Malware And Security' started by starbuck, Oct 12, 2017.

  1. starbuck

    starbuck Administrator - Malware Removal Specialist Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,203
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.

    Recently, ransomware like WannaCry or Petya has generated dramatic headlines around the globe.
    The pernicious online threats have become a shooting star among malware vectors, gaining notoriety and troubling millions of businesses and individuals alike.
    However, another cyberthreat lurking beneath the surface and causing even greater damage is business email compromise (BEC).

    Unlike most other cybercrime activity, BEC entirely depends upon social engineering.
    It involves a faked email from a co-worker or corporate executive that short-cuts internal processes and asks the finance department to make a payment.
    A ploy that appears to be fairly simple-minded turns out to be both surprisingly effective and lucrative.

    Perpetrators typically begin their campaign with reconnaissance.
    This includes scouting the company’s hierarchy, corporate executives, and employees.
    While life for the bad guys was much more difficult — perhaps next to impossible — in the good old days, the advent of social media has turned things upside down.
    With introductions to the leadership team on the target’s website, along with their profiles published on Facebook, Google+, LinkedIn, and so on, perpetrators can hardly believe their luck.
    Gathering information has never been easier.
    BEC has literally become the land of milk and honey for cybercriminals.

    Emails Bypass Most Security Tools
    What then usually follows is a faked email, supposedly sent from the CEO or another corporate official, urgently requesting that the recipient pay a business partner or supplier.
    The beneficiary's back account is often abroad and held by cybercriminals or their intermediaries.
    Laundering techniques and "money mules" worldwide drain the funds into other accounts that are difficult to trace.

    These BEC campaigns primarily target large organizations, and many of them have fallen victim including Facebook and Google, as reported by Fortune Magazine.
    Despite all the corporate policies and safeguarding the firms have put in place, the success rate of the fake messages is astonishing — a 1,300% increase since Jan 2015, representing damages surpassing those of ransomware, according to the FBI in a press release.
    Since these emails don’t contain malware or suspicious links, they can often bypass security tools and permeate an organization.

    Damages on the Rise
    The Internet Crime Complaint Center (IC3) — an alliance between the FBI, the U.S. Department of Justice, and the National White Collar Crime Center — reports that $5.3 billion was stolen due to BEC-related fraud between October 2013 and December 2016, as highlighted in Cisco’s 2017 Midyear Cybersecurity Report (registration required). This corresponds to an average of $1.7 billion per year, the report notes. By way of comparison, ransomware exploits pocketed about $1 billion in 2016, according to the report.

    "The ability of these criminal groups to compromise legitimate business email accounts is staggering — they are experts at deception," Special Agent Martin Licciardo, a veteran organized-crime investigator at the FBI’s Washington field office, noted in the press release.
    "The FBI takes the BEC threat very seriously, and we are working with our international partners to identify these perpetrators and dismantle their organizations."

    Combating BEC fraud has little to do with technology.
    It all boils down to process improvements and policy enforcement, awareness, and education.
    For example, payments shouldn’t be made outside the official approval process and without applying the "four-eye principle," a requirement that two individuals approve some action before it can be taken.
    Never rely on e-mail alone.
    An out-of-the-ordinary request for an out-of-country transfer should immediately sound alarm bells.

    To effectively combat BEC, the FBI issued a one-pager that recommends organizations use corporate email accounts only, and avoid free web-based accounts; that companies carefully consider what’s posted to their social media and corporate websites; that employees be suspicious of requests for secrecy or pressure to take action quickly; the separation of computer devices from Internet of Things (IoT) devices; and disabling of the Universal Plug and Play protocol (UPnP) on corporate routers.


    Source:
    https://www.darkreading.com/perimet...30088?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
     

Share This Page