{"id":13243,"date":"2018-08-31T09:00:04","date_gmt":"2018-08-31T17:00:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/31\/news-7010\/"},"modified":"2018-08-31T09:00:04","modified_gmt":"2018-08-31T17:00:04","slug":"news-7010","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/31\/news-7010\/","title":{"rendered":"BEC is Big Business for Hackers: What makes these attacks so hard to prevent?"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-300x225.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-300x225.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-768x576.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-640x480.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-900x675.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-440x330.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-380x285.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400\">For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data &#8211; attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Now, however, another highly profitable attack style is emerging, particularly within the enterprise sector. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Business Email Compromise, or BEC, is creating considerable opportunities for cybercriminals to make money off of their malicious activity, and the sophistication and urgency of these infiltrations make them particularly difficult to guard against.<\/span><\/p>\n<h3><strong>The rise of BEC<\/strong><\/h3>\n<p><span style=\"font-weight: 400\">Although organizations are now becoming increasingly aware of the BEC attack approach, this strategy has actually been generating income for hackers for years now. Trend Micro researchers reported that, in 2016, attackers generated an <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/2017-annual-roundup-the-paradox-of-cyberthreats\"><span style=\"font-weight: 400\">average of $140,000 in losses<\/span><\/a><span style=\"font-weight: 400\"> by launching BEC attacks on businesses across the globe.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In the past, BEC was known as a &#8220;man-in-the-email&#8221; scam, in which hackers leverage legitimate-looking emails to support bogus wire transfers from enterprise victims. As Trend Micro researchers pointed out, these attacks can come in an <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/business-email-compromise-(bec)\"><span style=\"font-weight: 400\">array of different styles<\/span><\/a><span style=\"font-weight: 400\">, including fraudulent invoices, attacks on the company CEO, account compromise or impersonation, and even traditional data theft.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Judging by the level of profit hackers have been able to generate, supported by the successful attacks they&#8217;ve been able to pull off, chances are good that BEC will only continue its rise in the near future.<\/span><\/p>\n<h3><strong>How big of a business is BEC?<\/strong><\/h3>\n<p><span style=\"font-weight: 400\">Whereas hackers caused an average of $140,000 in business losses two years ago, cybercriminals who leverage BEC schemes have been able to increase their potential for profit since then.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In July 2018, the FBI&#8217;s Internet Crime Complaint Center reported a <\/span><a href=\"https:\/\/www.ic3.gov\/media\/2018\/180712.aspx\"><span style=\"font-weight: 400\">136 percent rise in losses related to BEC attacks<\/span><\/a><span style=\"font-weight: 400\">, specifically between December 2016 and May 2018. Overall, this means\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">hackers have raked in a total of $12.5 billion in company BEC losses, spanning both international and domestic attacks. The sheer amount of loss &#8211; and profit on the side of hackers &#8211; is $3 billion higher than the prediction Trend Micro researchers made in our <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/research-and-analysis\/predictions\/2018\"><span style=\"font-weight: 400\">Paradigm Shifts: Security Predictions for 2018<\/span><\/a><span style=\"font-weight: 400\"> report.<\/span><\/p>\n<h3><strong>Fueling BEC: What makes these attacks difficult to guard against?<\/strong><\/h3>\n<p><span style=\"font-weight: 400\">An increase in successful attacks translates to a rise in profits on the part of hackers, and a larger number of affected business victims. Due to this environment landscape, it&#8217;s imperative that enterprise decision-makers and IT stakeholders not only understand that these attacks are taking place, but that they also boost their awareness of the challenges in protection. In this way, businesses can take proactive action to better protect their email systems, critical data, finances and other assets.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Let&#8217;s examine a few of the factors that contribute to the difficulties in protecting against BEC attacks:<\/span><\/p>\n<h3><b>Sophisticated use of social engineering<\/b><\/h3>\n<p><span style=\"font-weight: 400\">In the instances of BEC, hackers don&#8217;t just craft a catch-all email with common language and hope it dupes their target. Instead, they take their time to complete sophisticated social engineering. In this way, they are able to use an attack style that will boost their chances of the target opening and responding to the message.<\/span><\/p>\n<h3><b>Specially-crafted email<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Thanks to the robust social engineering involved, cybercriminals can create incredibly legitimate-looking emails that include targets&#8217; names, and can even appear to be from others within the organization. For example, an accountant may receive a fraudulent email request for a wire transfer from the company CEO, which includes a spoofed version of the CEO&#8217;s email address and even the CEO&#8217;s own email signature. Accordingly, he or she will be more likely to send the funds, because the email appears very real.<\/span><\/p>\n<h3><b>Lack of malicious links or attachments<\/b><\/h3>\n<p><span style=\"font-weight: 400\">While hackers&#8217; background and foundational effort is in-depth and sophisticated, the process of delivery is surprisingly simple. BEC attacks rely on a convincing email with a strong message, meaning that the normal red flags used to identify a potential attack are lacking.<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8220;Because these scams do not have any malicious links or attachments, they can evade traditional solutions,&#8221; Trend Micro pointed out.<\/span><\/p>\n<h3><b>Sense of urgency in the message<\/b><\/h3>\n<p><span style=\"font-weight: 400\">In addition to leveraging social engineering to include legitimate names, addresses and other details to fool victims, hackers also include a strong sense of urgency in BEC messages to encourage a successful attack. Many messages analyzed by Trend Micro researchers were found to include powerful language like &#8220;urgent,&#8221; &#8220;payment,&#8221; &#8220;transfer,&#8221; &#8220;request,&#8221; and other words that can support the overall message.<\/span><\/p>\n<p><span style=\"font-weight: 400\">&#8220;The <\/span><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/curbing-the-bec-problem-using-ai-and-machine-learning\"><span style=\"font-weight: 400\">sense of urgency, a request for action, or a financial implication<\/span><\/a><span style=\"font-weight: 400\"> used in BEC schemes tricks targets into falling for the trap,&#8221; Trend Micro explained. &#8220;For instance, a cybercriminal contacts either the employees and\/or executives of the company and pose as either third-party suppliers, representatives of law firms or even chief executive officers (CEOs), manipulating the targeted employee\/executive into secretly handling the transfer of funds.&#8221;<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-541906\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image.jpg\" alt=\"\" width=\"1000\" height=\"669\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image.jpg 1000w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-300x201.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-768x514.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-125x85.jpg 125w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-640x428.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-900x602.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-440x294.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-inline-image-380x254.jpg 380w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center\"><i><span style=\"font-weight: 400\">Business Email Compromise attacks involve social engineering and strong language.<\/span><\/i><\/p>\n<h3><b>Array of different styles to appeal to different victims<\/b><\/h3>\n<p><span style=\"font-weight: 400\">In addition, the fact that attackers have established a wide variety of different attack styles means they can utilize the one that will be most successful with their target, based on their social engineering research. For instance, a hacker who wants to attack a company CEO could pose as a third-party vendor requiring payment for an overdue invoice. An attacker looking to launch an attack on a company that may not commonly use outside vendors, and thus may not fall for that approach, could pose as an internal HR employee needing personally identifiable data.<\/span><\/p>\n<p><span style=\"font-weight: 400\">With so many different styles available, hackers have a veritable playbook to choose from and can craft the most legitimate message which will support the chances of successful fraud and attack.<\/span><\/p>\n<h3><b>Further leveraging a compromised account: Continuing the cycle<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Finally, and unfortunately, the BEC cycle doesn&#8217;t have to end after a fraudulent wire transfer has been made by the victim. Once an account has been compromised, it can be leveraged to support further BEC schemes, sending phishing or other BEC messages to others within the compromised account address book.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Hackers are also positioning victims as &#8220;money mules,&#8221; according to the FBI IC3&#8217;s report. These are victims, recruited through romance or blackmail scams, that hackers use to open new accounts to leverage for BEC. While these accounts may only remain open for a short time, they provide additional, malicious opportunities for attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security experts don&#8217;t believe BEC attacks will diminish anytime in the near future. In addition to user awareness, enterprises should leverage advanced security solutions to prevent BEC intrusions. Technology from Trend Micro, which utilizes advanced strategies like <\/span><a href=\"https:\/\/blog.trendmicro.com\/leveraging-the-power-of-ai-to-stop-email-scammers\/?_ga=2.38825952.2128985069.1534800081-412943378.1522103461\"><span style=\"font-weight: 400\">artificial intelligence to detect email impersonators<\/span><\/a><span style=\"font-weight: 400\"> and machine learning to strengthen overall security, can be beneficial assets.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To find out more about how to guard against BEC within your enterprise, connect with the experts at Trend Micro today.<\/span><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/bec-is-big-business-for-hackers-what-makes-these-attacks-so-hard-to-prevent\/\">BEC is Big Business for Hackers: What makes these attacks so hard to prevent?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/bec-is-big-business-for-hackers-what-makes-these-attacks-so-hard-to-prevent\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Fri, 31 Aug 2018 15:34:48 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-300x225.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-300x225.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-768x576.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-640x480.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-900x675.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-440x330.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi-380x285.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/tm-blog-post-fi.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>For years, one of the most lucrative ways for hackers to generate profits was through ransomware attacks. These instances involve the use of strong encryption to lock victims out of their files and data &#8211; attackers then sell the decryption key in exchange for an untraceable Bitcoin ransom payment. Now, however, another highly profitable attack&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/bec-is-big-business-for-hackers-what-makes-these-attacks-so-hard-to-prevent\/\">BEC is Big Business for Hackers: What makes these attacks so hard to prevent?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[14347,11140,10422,14011,714],"class_list":["post-13243","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-bec","tag-business-email-compromise","tag-current-news","tag-cybercriminals","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13243"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13243\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13243"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}