BEC attacks are becoming more costly
BEC attacks are proving costly
Last year, cyber criminals?stole $2.3 million from the town of Peterborough, New Hampshire?using email-based attacks. What’s worse, the losses are attributed to two separate attacks from the same criminal group, meaning Peterborough’s finance department could have minimized damage if they had realized the mistake sooner.
But there is a reason the department did not question the messages. Not only did the emails bypass filters, but they also appeared entirely legitimate. The messages lacked grammatical errors, unfamiliar senders, or suspicious links associated with malicious emails. Using a few strategically placed messages, the attackers successfully posed as a school district and later a construction company and diverted millions in city funds to their own accounts.
The Peterborough finance department had fallen victim to a highly targeted, difficult-to-detect scam called?Business Email Compromise (BEC).
BEC is a phishing tactic that does not rely on malicious links or malware. The attacks often consist of one or two emails in which the attacker pretends to be a known and trusted entity; supplier, employee, etc. to trick the recipient into sending funds to an account the attacker controls.
Because of its targeted nature, BEC is not the most common type of email attack, but it can be one of the most devastating. In a sample of?31 million email-based threats, Cloudflare found BEC had the lowest volume of attacks at 1.34% but accounted for an estimated $354 million in losses — with individual losses averaging about $1.5 million each.
While attackers are increasingly adept at exploiting trust, traditional email security is ineffective at preventing BEC. Rather, to protect themselves and their employees, organizations require modern, proactive strategies. For example, preemptively identifying and neutralizing attacker infrastructure can block BEC attacks before they strike. At the same time, contextual analysis can flag messages that bypass filters or come from internal, compromised accounts. Modernizing email security with strategies like these can protect organizations from these costly attacks.
How traditional email security falls short
Traditional email security strategies were not built to handle BEC attacks and ultimately leave organizations vulnerable. These tactics include:
Types of BEC and how they differ from spam
The specifics of BEC scams and the damage they cause vary according to type, but all of them exploit trust:
All of these attack types can share certain characteristics, including social engineering and creating urgency. Attackers manipulate the recipient to not only trust them but also to act quickly before they become suspicious. Often, they provide reasons why the recipient should not ask follow up questions before completing the requested task. For instance, an attack email supposedly from the CEO may say they are jumping on a flight and will be unavailable for a few hours.
领英推荐
To further complicate the matter, the highly targeted, low-volume style of these attacks often bypasses existing email filters, which rely on high attack volumes to aggregate data. For threat policies to work, email filters need this data to “learn” that things like domains, IPs, and malware should be considered suspicious. While this helps filter out traditional spam messages, it is insufficient against the precision of BEC attacks. Attackers can create brand new email addresses, spoof domains, or take over legitimate email accounts — all of which would not likely be caught by built-in email security functionality.
Designing a modern approach to email security
To effectively fight BEC attacks, companies should shape their strategies around the following tenets:
A modern email security strategy built on these tenets will offer comprehensive protection against BEC attacks and other forms of phishing at all stages of the attack cycle to better secure organizational resources and data.
Preemptively stop phishing attacks
Cloudflare offers?cloud-native email security?that proactively identifies attacker infrastructure while offering continuous protection against BEC and other forms of email attacks.
As part of the?Cloudflare Zero Trust platform?— which secures applications and employee browsing to stop malware, phishing, and data loss – integrating Email Security with Zero Trust services removes implicit trust from email to help customers stop BEC and phishing attacks.
This article is part of a series on the latest trends and topics impacting today’s technology decision-makers.
Dive deeper into this topic.
Learn more about creating a?proactive approach to email security?with Cloudflare.
CloudFlare Canada Web Security and Performance
1 年Lui De Dominicis, PMP?