Organizes the leads in a way that will allow the scammer sending the BEC emails to be more efficient.Supplements the leads with open-source intelligence to identify additional information, such as the name of the CEO to be impersonated. Validates the contact information to confirm that it is accurate.The second step in this attack chain is “Lead Validation and Processing,” during which a BEC group member takes the raw leads gathered by another member and takes the following steps: In fact, the London Blue operative made the foolish decision to send a BEC email to Agari's CFO (for a second time!), which provided us significant visibility into their operations and thus, an opportunity to observe the group’s entire attack chain-from preparation to execution. We at Agari released a 2020 report on global BEC cybercriminal groups, including London Blue, which dove into the organizational structure of West African criminal groups and described how they operate like modern corporations. And BEC attacks continue to show no signs of slowing down- research from Agari shows that BEC remains to be one of the primary attack vectors into an organization, and PhishLabs' Quarterly Threat Trends and Intelligence August report, BEC increased again in Q2, contributing to 16.3% of total attack volume. Agari and PhishLabs define BEC as any response-based spear phishing attack involving the impersonation of a trusted party to trick victims into making an unauthorized financial transaction or send sensitive materials. Have you ever received a blank email from someone you don’t know? If you have, it may have been from a cybercriminal making sure your email account is legitimate prior to a Business Email Compromise (BEC) attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |