(01) 213 5702

Guarding Against BEC 3.0: Protecting Your Business in the Age of Cyber Threats and Remote Work

September 28, 2023
BEC 3.0 blog

In an era defined by digital connectivity and hybrid working, cyber threats have become an occupational hazard. No matter how large or small, every business is vulnerable to cyberattacks and data breaches. While breach threats to enterprise network security still exist, remote working and moving to cloud-based SaaS applications have led to more attacks that focus on compromising employees’ business accounts. A compromised account gives the hacker access to sensitive data and a foothold for further attacks against other employees and business partners.

The delivery methods vary but the most exploited vector is email as a vehicle for a credential harvesting phishing campaign. Phishing, in general, has grown in scale and sophistication in recent years, with the most damaging form of phishing from a financial perspective being “business email compromise” (BEC). According to recent research, credential harvesting makes up about 15% of all email-based attacks but is the most financially damaging category.

What is ‘business email compromise’?

BEC is a form of phishing where threat actors use an apparently legitimate email address to trick employees into doing something they shouldn’t. The email address will look like the real one with perhaps one letter off or come from a free Gmail account instead of the company domain.

One of the most common instances of a BEC is an invoice scam, involving hackers very convincingly posing as a vendor and submitting a fake invoice from a seemingly genuine email address. The recipient of that email – likely someone working in the accounts department – will see it as just another invoice and often pay it without too much scrutiny.

Another form of BEC is CEO fraud, in which an attacker poses as the CEO and requests an employee make a wire transfer on their behalf or share sensitive company data outside of the secured network. Cybercriminals make great efforts to make the scams as convincing as possible. They often leverage a similar email address and carry out research to “sound” more like the CEO in communications. By invoking an urgent request from the CEO, scammers hope to leverage urgency and fear to accomplish their goals.

Payroll fraud is another widespread use of BEC, where attackers will pose as an employee and ask somebody in HR to change their direct deposit information, effectively stealing employees’ salaries.

According to the FBI, there were more than 20,000 incidents of BEC in 2022 in the United States, totaling $2.7US billion in losses and that’s just what has been reported. The actual number is likely to be significantly higher.

The rise of BEC 3.0

BEC has become more sophisticated over the years, and we are currently in the “BEC 3.0” generation, with over 40,000 of these attacks taking place in the first two months of 2023 alone.

BEC 1.0 occurred during the pandemic as criminals sought to exploit new distributed working environments. Remote employees were more vulnerable to phishing attacks and created more opportunities for impersonation. In BEC 1.0, the sender email impersonates a colleague, a partner organisation or a known brand.

In one of the most common forms of attack, hackers impersonate a CEO, often with a generic Gmail address, instructing employees to buy gift cards for a vendor. Many of these emails are text-only, which requires eagle-eyed users and the sophisticated use of artificial intelligence (AI) and machine learning to disrupt. BEC 1.0 continued but with better-educated end-users and more email security layers tuned to detect and block these attacks, their effectiveness has declined.

In BEC 2.0, emails come from a compromised account. The account could be within the same company or a compromised partner, with hackers pretending to be business representatives to run invoice scams or gain access to employee information and other sensitive data. This iteration represented a step up in complexity because it comes from a legitimate partner account being compromised. Often, the attackers can use existing threads from the partner or wait for the right opportunity within a legitimate conversation to try and hijack the conversation and attempt to monetize on the compromised account.

This year, we’ve seen a third wave. In BEC 3.0, hackers send real notifications from legitimate SaaS services and websites such as QuickBooks, Zoom or SharePoint. On the surface, there is nothing illegitimate or suspicious about these communications because they are sent directly from the site in question.

Hackers can also achieve accurate impersonation with identical or similar names to the attacked organisation. To carry out the attack, they include a phone number in the invoice that directs to a fake support team, which leads to a convincing scam call. Recent Check Point Research detected nearly 40,000 of these attacks in the first two months of 2023.

Safeguarding against BEC

Safeguarding against BEC requires a multi-faceted approach that combines advanced technology, employee education, and strict data and payment policies.

Education

Organisations must invest in comprehensive employee education programmes enabling staff to recognise and respond to BEC threats effectively. Employees need to pause and think about the context of the email and whether it feels right. If it doesn’t, it likely isn’t. By understanding the tactics employed by cybercriminals, employees can minimise the risk of falling victim to business email compromise schemes.

Automated warning

Anti-phishing protections serve as a crucial line of defense, employing sophisticated artificial intelligence (AI) algorithms to understand the email language, context and relationship between sender and recipient and to compare its findings with baseline communications. The AI can detect red flags like mismatched sender addresses, compromised phone numbers and changes to the writing style – leveraging multiple AI models can identify signs of an attack.

Multi-factor Authentication

Finally, implementing strict data and payment policies that require multiple verification steps for money transfers or data sharing is essential. By implementing these measures, businesses can fortify their defenses, ensuring that invoices and sensitive information reach their intended recipients while mitigating the risk of business email compromise attacks.

Learn More!

If you would like to see what kind of protection your current Email solutions is giving your organisation against phishing, ransomware, shadow IT and data loss across your environments, you can simply try this free API based Email and collaboration tools Health assessment. If you have any questions, please feel free to contact one of our experts to assist you understanding what approach is right for your organisation. Contact us on – asktheexpert@enterprise-solutions.ie

Recent posts
Microsoft to update OneDrive Storage Policy: Archiving Unlicensed Accounts 
Read about Microsoft’s Strategic Vision for OneDrive storage policy and how they are going to archive Unlicensed Accounts.
The Evolution of MSIX and Its Impact on DaaS
Evolution of MSIX and Its Impact on DaaS