This advice has been collated by EMSOU and is intended for wider distribution within the East Midlands Region to raise awareness among businesses and the public.
Advice and information is changing daily as we navigate our way through the COVID- 19 pandemic, so please ensure you only take information from reputable sources. If you require any further information, assistance or guidance please contact the EMSOU Protect Team or your local Force protect team. In today’s blog, we’re looking at Business Email Compromise (BEC), a form of phishing attack crafted to appeal to specific individuals, which can be even harder to detect than typical phishing emails.
The attackers attempt to defraud the company, its customers, partners, and/or employees into sending money or sensitive data to the attacker’s account. Read on for advice on how to identify these types of communications, how to train your staff to deal with them and how to best prevent sensitive information being leaked to the scammers:
Examples of BEC
• The Bogus Invoice Scheme: An attacker pretends to be the supplier and requests a funds transfer to an account the attacker controls. Companies with foreign suppliers are often targeted with this tactic.
• CEO Fraud: Attackers pose as an executive and send an email to employees in finance, requesting that they transfer money to a bogus account. Often requested as a matter of urgency and when the CEO may be otherwise engaged.
• Account Compromise: An executive or employee’s email account is hacked and used to request invoice payments to vendors listed in their email contacts.
• Impersonation: When a legal representative’s e-mail address is used to contact clients, asking that they pay money to an account controlled by the attacker.
• Data Theft: Employees are targeted to obtain Personally Identifiable Information (PII) of employees and executives. Such data can then be used for future attacks.
Why BEC scams work:
• An attacker will conduct research when targeting a company executive or employee (social media, LinkedIn, Companies House, accounts and website). This research makes the email more convincing to the recipient.
• The email contains no hyperlinks or malware attachments, which is usually identified and removed by traditional IT security systems.
• An attacker may monitor corporate communications to identify the best tactics and timing to employ for a successful attack.
• Training: Train staff to identify fake emails. Always be sceptical of urgent and hurried requests to transfer money. Verify those requests either by phone or in person.
• 2-Step Factor Authentication (2FA): 2FA will protect user accounts from being hijacked by an attacker. Usernames and passwords require us to 'know something' and we can prove who we are by 'having something', such as a pin sent to our phone.
• DMARC: This enables an organisation to verify that an email they receive aligns with what they know about the sender. The technology is extremely effective in eliminating spoofed emails. See here for more information
• Secure Email Gateway: This is your email ‘firewall’. It will stop spam, malware and viruses, but it can also be configured to hunt for key words such as ‘payment’, ‘urgent’, ‘sensitive’ and ‘secret’.
• Add Warning Banners: Most email systems can be configured to place warning banners on emails from new or unusual contacts, helping to mitigate the risk of lookalike domain spoofing.
Further information and infographics from the NCSC available here.
Courier fraud alert
There have been increasing reports of fraudsters contacting victims in the East Midlands area. The fraudsters claim to be a police officer using the names ‘DC Andrews from Hammersmith Police Station’, ‘Paddington Fraud Prevention Team’ and ‘DC Hunt of Paddington Police Station’. Victims have been asked to purchase expensive goods (watches, jewellery etc) or withdraw cash or move funds to an account controlled by the fraudsters.
Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).