Cyber Security
8 min read

Everything You Need To Know About BEC Phishing Attacks

Published on
September 12, 2024

Author

Joshua Crumbaugh
Social Engineer
Primary Topic:

Business Email Compromise (BEC)

Learning Objectives
  • Understand the key elements of a BEC attack
  • Learn how to prevent BEC attacks
  • Hear from a real victim of a BEC attack

Business Email Compromise (BEC) Attack: An In-Depth Overview of Targeted Phishing

Business Email Compromise (BEC) is a sophisticated type of phishing attack where the attacker targets businesses and individuals who use email as a primary method of communication. The goal is to deceive employees, executives, or partners into transferring money or sensitive data to the attacker’s account or enabling some form of unauthorized action. These attacks rely more on social engineering than on malware or system vulnerabilities, making them difficult to detect.

 

Key Elements of a BEC Attack

  1. Social Engineering:The attacker typically impersonates a trusted figure, such as a CEO, CFO, or a known vendor. They exploit the victim’s trust to manipulate them into taking actions that benefit the attacker, like wiring money or sharing confidential information.
  2. Email Account Compromise:Attackers often gain access to a legitimate email account within the company by using phishing techniques or through brute-force attacks. Once they control the account, they monitor ongoing communications, learning the company’s processes and identifying potential targets.
  3. Spoofing:Some BEC attackers don’t necessarily gain access to an internal account but instead spoof an email address. This involves making the email appear as though it’s coming from a legitimate person or entity. For example, the attack might slightly alter the email domain or use a look-alike domain that goes unnoticed by the target.
  4. Urgency and Pressure:Attackers often instill a sense of urgency to compel the victim to act quickly, leaving no time to verify the legitimacy of the request. Messages may claim the need for a last-minute payment, an emergency request, or even a confidential transfer, pushing the victim to act without due diligence.
The Composition of BEC AttacksSocial EngineeringEmail Account CompromiseBEC AttacksEmail SpoofingUrgency and Pressure

Types of BEC Attacks

  1. CEO Fraud:The attacker impersonates a CEO or another high-ranking executive and requests an urgent money transfer or sensitive data. These attacks often occur while the executive is traveling or out of the office, making it harder for the employee to verify the legitimacy of the request.
  2. Invoice Scams:Attackers compromise or spoof the email of a known supplier or vendor, then send fraudulent invoices to the company’s finance department. The goal is to convince the company to transfer payments to the attacker’s bank account instead of the legitimate supplier.
  3. Account Compromise:In this type of attack, the attacker gains access to an employee’s email account and uses it to send phishing emails internally or to external vendors, requesting wire transfers or sensitive information.
  4. Attorney Impersonation:The attacker pretends to be a lawyer or legal representative and contacts employees, typically in the finance department, asking for a confidential and urgent wire transfer.
  5. Data Theft:Sometimes, the goal of a BEC attack is not financial but rather to steal sensitive information. Attackers often target HR departments or finance teams to collect personally identifiable information (PII) or tax information, which can later be sold or used in identity theft.

Attack Lifecycle

  1. Reconnaissance:Attackers usually spend time observing the target's communication channels, business processes, and employees before launching the actual attack. They may gather information from social media, company websites, and breached databases to create a highly convincing impersonation.
  2. Phishing or Malware:Attackers may initially compromise a legitimate email account via phishing, where they trick the victim into providing login credentials, or through malware that logs keystrokes and sends the information back to the attacker.
  3. Execution:Once the attacker has enough information, they craft emails designed to look authentic and credible. These emails usually contain a call to action, such as wiring funds or providing sensitive data.
  4. Theft:After the victim takes the desired action—typically a money transfer—the funds are usually routed through various bank accounts, making it difficult to track them.
The Stages of a BEC AttackPhishing or MalwareReconnaissanceExecutionTheft

Consequences of BEC Attacks

  1. Financial Loss:BEC attacks can result in significant financial losses. The FBI estimates that BEC attacks have caused over $50 billion in losses globally. The amount lost in each attack can vary from a few thousand dollars to millions.
  2. Reputation Damage:BEC attacks can damage a company’s reputation, especially if sensitive customer or partner information is compromised. A breach of trust can lead to the loss of clients and partnerships, as well as decreased customer confidence.
  3. Operational Disruption:Addressing a BEC attack can disrupt normal business operations. Companies often need to shut down compromised systems, investigate the breach, and take corrective measures, which can take time and resources.
  4. Legal and Compliance Issues:In some industries, companies are required to report data breaches. If an attacker gains access to personal data, it may trigger regulatory scrutiny and fines under laws like GDPR or the CCPA.

Prevention Strategies

  1. Employee Training:Regularly train employees to recognize phishing emails and to follow security protocols, particularly for financial transactions. Encourage employees to question unusual requests for money or sensitive information, especially if they seem urgent.
  2. Multi-factor Authentication (MFA):Implement MFA for all email accounts, especially for executives and financial staff. This makes it harder for attackers to gain access to accounts, even if they manage to steal passwords.
  3. Verification Processes:Establish strict procedures for verifying the authenticity of any wire transfer or payment request. For example, require a phone call or in-person confirmation for transactions above a certain threshold.
  4. Email Filtering and Monitoring:Deploy advanced email filtering tools that can detect and block suspicious emails. Set up monitoring systems to flag unusual activities, such as sending large numbers of emails from a single account or unexpected file transfers.
  5. Incident Response Plans:Create an incident response plan to deal with BEC attacks quickly. This plan should include steps for identifying the breach, notifying affected parties, and contacting law enforcement.
Preventing BEC AttacksEmployee TrainingMulti-Factor Authentication (MFA)Verification ProcessesEmail Filtering and MonitoringIncident Response Plans

Real-World Example

In this case, a logistics company fell victim to a Business Email Compromise (BEC) attack through an invoice scam, resulting in the unauthorized transfer of over $100,000 to the attacker’s account. This attack showcases how cybercriminals exploit trust, urgency, and communication loopholes to deceive companies into paying fraudulent invoices.

The Attack: How It Happened

The logistics company received an email from what appeared to be one of their regular vendors, requesting a change in the method of payment from the usual process to ACH (Automated Clearing House). Over a series of emails, the attacker, impersonating the vendor, created a sense of urgency by repeatedly asking, “When is the money going to get here?

An employee at the logistics company, pressured by the urgency, assured the impersonator that they would try to get the payment processed that day. Shortly after, the attacker followed up with even more insistence, amplifying the pressure to transfer the money quickly.

The first red flag appeared when the impersonator requested that the payment be switched to a wire transfer instead of ACH, citing issues with the original method. The employee recognized that this wasn’t a normal request, but by that time, the process was already in motion, and the sense of urgency made it difficult to pause and verify the transaction.

The Discovery: Too Late to Stop It

In an interview with a company employee involved in the transaction, they shared the moment they realized something was wrong:

 

"We get the email stating that he wants to be ACH, and then it was a constant. 'When is the money gonna get here? When is the money gonna get here?' And I would say, 'I'm trying to get it today.' About an hour later, he calls back and says, 'But that's not my cell phone number on the signature line.' I'm like, I don't care. I have no ethic for this guy anymore. I think he's completely a crook."

At this point, the employee began to question the legitimacy of the request, recognizing the unusual urgency and inconsistency in the contact information. When the vendor clarified that the phone number on the signature line was incorrect, the employee's suspicions were confirmed. The realization that they had been communicating with a fraudster set in, but by then, the payment had already been wired to the attacker.

Meet The Social Engineer

Joshua Crumbaugh

Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon