{"id":1632,"date":"2022-05-12T19:43:00","date_gmt":"2022-05-12T18:43:00","guid":{"rendered":"https:\/\/www.argentxcyber.com\/blog\/?p=1632"},"modified":"2022-08-16T12:23:21","modified_gmt":"2022-08-16T11:23:21","slug":"cybersecurity-business-email-compromise-scams","status":"publish","type":"post","link":"https:\/\/www.argentxcyber.com\/blog\/index.php\/2022\/05\/12\/cybersecurity-business-email-compromise-scams\/","title":{"rendered":"Cybersecurity &#8211; 7 Crucial Tips to Avoid Business Email Compromise (BEC)"},"content":{"rendered":"<p><span data-contrast=\"none\">Cybersecurity in the corporate space has become a social media talking point, bringing much-needed awareness to business security strategy. So what was the subject in question? Business email compromise scams.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It can cost you billions!\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><!--more--><\/p>\n<p><span data-contrast=\"none\">Business email compromise (BEC) is a scam where an attacker aims to defraud businesses. They typically target companies that have suppliers abroad through spoofing, phishing, and wire transfer fraud. It&#8217;s a fraud on a colossal scale where the attacker&#8217;s goal is to score a huge payday and cash out quickly using money-laundering schemes.\u00a0 \u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Social engineering is the foundation of this fraud: Exploiting the client&#8217;s routine, trust, and confidence. BEC scams come in different forms, ensuring that the fraudsters strike big from so many unfortunate companies. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">How did it come to the limelight?\u00a0 \u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A social media influencer called Hushpuppi was living a lavish lifestyle, and it was not lost on his millions of followers how expensive his taste was. Although questions started to emerge about his source of wealth, his followers wanted what he had. They wanted the key to success so they could live large too! More of the big news break\u00a0<\/span><span style=\"color: #0000ff\"><a href=\"https:\/\/www.bbc.com\/news\/world-africa-58002932\" style=\"color: #0000ff\" target=\"_blank\" rel=\"noopener\">here<\/a><\/span><span data-contrast=\"none\">.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, there were musings on how he was involved in cybercrime. Subsequent investigations discovered a deep international web of business email compromise scams and money laundering, of which he was an integral part.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Types of BEC scams\u00a0\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">You might have gotten laid off, just graduated university, or looking to re-enter the job market as an employee or worker. Things may look understandably bleak and daunting, which is what a cyber fraudster is banking on for the scam to work.\u00a0 \u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Here are some signs that should get your alarm bells ringing when it comes to job prospects:\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"5\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>False Invoice Scheme<\/strong>: Attackers commonly target foreign suppliers through this tactic. The scammer acts as if they are the supplier and requests fund transfers to fraudulent accounts.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"5\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Attorney Impersonation<\/strong>: Attackers act like they are attorneys and act in that capacity in an attempt to authorize the transfer of funds and defraud the company. This is an illegal act that carries severe penalties.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"5\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Data Theft<\/strong>: These attacks target HR employees to obtain sensitive information about high-level employees like executives in a company. It results in future attacks like CEO fraud.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"5\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>CEO Fraud<\/strong>: Attackers will use sensitive information from data thefts to act as the company&#8217;s CEO and email their finance department to request funds transferred to an account they created for the scam.\u00a0 <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"5\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Account Compromise<\/strong>: Attackers can hack into an employee&#8217;s email address and request payment from suppliers or vendors. The amounts are then diverted to accounts attackers create just for the scam.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\"> <\/span>\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\" style=\"font-size: 16px\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">It looks pretty straightforward, and you could ask yourself, &#8216;Why does it work?&#8217; Attackers exploit companies to the tune of billions lost to this form of fraud every year with their ever-evolving and sneakier methods. However, spending some minutes vetting correspondence could make all the difference in these cases.\u00a0 <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Here are crucial tips to spot the signs, so you don&#8217;t fall victim to these sly attackers: <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Pay close attention to email addresses<\/strong>, so you don&#8217;t send any data or payments to the wrong email addresses. An attacker may use tweaks like <\/span><span data-contrast=\"none\"><em>finance@cyberx.africa<\/em><\/span><span data-contrast=\"none\">, for example, instead of the official email address, which may be\u00a0<\/span><em>finance@cyberxafrica.com<\/em><span data-contrast=\"none\">. Red flag!\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Be very careful when inspecting invoices<\/strong> sent to you for fulfilment with new bank details. They may also use language with a sense of urgency and don&#8217;t refer to the recipient by name, opting for general salutations like &#8216;Dear Sir\/ Madam.&#8217; That might very well be a business email compromise scam!\u00a0 <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Sometimes, you may <strong>notice the invoice branding<\/strong> differs from what your supplier typically sends. Always treat this as suspicious. It doesn&#8217;t hurt to call the contact person from the company to confirm that the invoice is indeed from them. It opens the door for them to verify if they sent the invoice in the first place (You might have probably missed tip 1!). <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Do not share sensitive data<\/strong> or information on employees with anyone outside the organization or relevant department. It opens you up to CEO fraud.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Implement MFA<\/strong> on all your company accounts, especially with a remote workforce. It will reduce the chances of being a target of these scams.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Trust your intuition or gut feeling<\/strong>. If it feels off, it&#8217;s because something is wrong! Alert your supervisor and report the email as a phishing scam.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Bahnschrift\" data-listid=\"6\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\"><strong>Train, train, and train employees<\/strong>! The more they know, the more empowered they will be, and the harder it will be to fall victim to a business email compromise scam. BEC scams are social engineering scams and bet on a human&#8217;s ability to trust that who they are speaking to are actual vendors.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">We have tips on including the whole team in\u00a0<\/span><a href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2021\/12\/21\/cybersecurity\/\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">cybersecurity transformation in the workplace<\/span><\/span><\/a><span data-contrast=\"none\">\u00a0and being a\u00a0<\/span><a href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2022\/02\/02\/human-firewall\/\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">human firewall<\/span><\/span><\/a><span data-contrast=\"none\">\u00a0when encountering a business email compromise scam. One small mistake can create a domino effect resulting in billions of losses.\u00a0 \u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Feel free to reach out to us as well\u00a0<\/span><a href=\"https:\/\/argentxcyber.com\/contact\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">here<\/span><\/span><\/a><span data-contrast=\"none\">. We are happy to help companies safeguard themselves against evolving threats!<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity in the corporate space has become a social media talking point, bringing much-needed awareness to business security strategy. So what was the subject in question? Business email compromise scams.\u00a0\u00a0\u00a0 \u00a0\u00a0 It can cost you billions!\u00a0\u00a0\u00a0<\/p>\n","protected":false},"author":4,"featured_media":1633,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-1632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business"],"_links":{"self":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1632"}],"version-history":[{"count":6,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1632\/revisions"}],"predecessor-version":[{"id":1730,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1632\/revisions\/1730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/1633"}],"wp:attachment":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}