{"id":13567,"date":"2018-10-11T13:00:12","date_gmt":"2018-10-11T21:00:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/11\/news-7334\/"},"modified":"2018-10-11T13:00:12","modified_gmt":"2018-10-11T21:00:12","slug":"news-7334","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/11\/news-7334\/","title":{"rendered":"The BEC List: Helping Thwart Business Email Compromise through Collaboration"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M<sup>3<\/sup>AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List.<\/p>\n<p>The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The <a href=\"https:\/\/www.m3aawg.org\/events\/jd-falk-award\">JD Falk Award<\/a> is given to individuals or groups whose meritorious work has helped protect online users and organizations.<\/p>\n<p>We commend the organizations, along with the threat and security researchers and analysts who were an instrumental part of the BEC List. Trend Micro is proud to be part of it as one of the first members at its inception in 2015. Our <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/delving-into-the-world-of-business-email-compromise-bec\">extensive research<\/a> on BEC \u2014 from keyloggers such as <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/cybercrime-to-cyberspying-limitless-keylogger-and-predator-pain\">Predator Pain<\/a>, <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/not-limitless-trend-micro-ftr-assists-arrest-limitless-author\/\">Limitless<\/a>, and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/hawkeye-nigerian-cybercriminals-used-simple-keylogger-to-prey-on-smbs\">Hawkeye<\/a> to the <a href=\"https:\/\/documents.trendmicro.com\/assets\/TrackingTrendsinBusinessEmailCompromise.pdf\">various email and social engineering tricks<\/a> used in BEC \u2014 is a reflection of our commitment to making the world safe for the exchange of digital information.<\/p>\n<h2><strong>Why tackle BEC?<\/strong><\/h2>\n<p>Online scams are a recurring pain point for users and enterprises. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/business-email-compromise-(bec)\">BEC fraud<\/a> in particular has accounted for over <a href=\"https:\/\/www.ic3.gov\/media\/2018\/180525.aspx\">$12.5 billion<\/a> in global losses since 2013, according to the FBI. Its operators use malware \u2014 many of which are bought in <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/west-african-underground\">underground marketplaces<\/a> \u2014 social engineering, or a combination of both to access and hijack systems or trick victims into wiring money into an account the cybercriminal controls. Our <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">further research<\/a> into BEC also revealed a steady increase in BEC-related attempts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-542137\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/2017-vs-2018-bec.png\" alt=\"\" width=\"314\" height=\"385\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/2017-vs-2018-bec.png 314w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/2017-vs-2018-bec-245x300.png 245w\" sizes=\"auto, (max-width: 314px) 100vw, 314px\" \/><\/p>\n<p><em>Figure 1: Half-year comparison of recorded BEC attempts<\/em><\/p>\n<p><em>Note: Data refers to the number of BEC attempts seen, which does not indicate whether the attacks were successful. BEC samples consist mainly of CEO fraud (attackers posing as CEO\/executive).<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-542140\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples.png\" alt=\"\" width=\"520\" height=\"300\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples.png 520w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples-300x173.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples-440x254.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/bec-samples-380x219.png 380w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<p><em>Figure 2: Malware samples used in BEC attacks from January 2017 to September 2017 based on VirusTotal samples<\/em><\/p>\n<p>The number of perpetrators and the scope of their crime require a combined effort between individuals and organizations across the cybersecurity community to help thwart threats like BEC.<\/p>\n<p>Previous recipients of the JD Falk Award were involved in various takedowns that required significant coordination and knowledge sharing such as the <a href=\"https:\/\/youtu.be\/4QZofCIA9eQ\">Avalanche takedown<\/a> \u00a0in <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/avalanche-thwarting-cybercriminal-hazards-with-law-enforcement-collaboration\/\">December 2016<\/a> and <a href=\"https:\/\/youtu.be\/OQk_hA1v2D8?list=PLbmNODesqn-j8OcmwaTh05gHKaF8JvUSz\">DNS Changer Working Group<\/a> in <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/esthost-taken-down-biggest-cybercriminal-takedown-in-history\/\">November 2011<\/a>.<\/p>\n<p>We are honored to be recognized by the M<sup>3<\/sup>AAWG with this award. Our efforts to stop cybercriminals from successful BEC attacks \u2013 and all cybercrime \u2013 will continue.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/\">The BEC List: Helping Thwart Business Email Compromise through Collaboration<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Thu, 11 Oct 2018 19:30:01 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-900x600.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/iStock-889312658-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Today, the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) gave the JD Falk Award to the Business Email Compromise (BEC) List. The BEC List comprises cybersecurity firms, researchers and internet infrastructure companies that help deal with cybercriminal activities and schemes. The JD Falk Award is given to individuals or groups whose meritorious work has&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-bec-list-helping-thwart-business-email-compromise-through-collaboration\/\">The BEC List: Helping Thwart Business Email Compromise through Collaboration<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[14347,1001,10422,4503,13379],"class_list":["post-13567","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-bec","tag-business","tag-current-news","tag-cybercrime","tag-spotlight"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13567"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13567\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}