Subscribe Now

* You will receive the latest news and updates on the Canadian IT marketplace.

Trending News

Blog Post

Business email attacks on the rise

Business email attacks on the rise 

But attackers have been known to switch tactics often and are likely to come back to tried and true methods when they perceive the coast to be clear.

The latest research from cybersecurity company Proofpoint Inc. indicates that business email compromise (BEC) is on the rise. The company also see and “acceleration in the sophistication and velocity” of the recent attacks.

Overall BEC attacks increased by 45 per cent in the last three months of 2016 compared to prior months based on Proofpoint’s extensive research into attack attempts across more than 5,000 enterprise customers.

“Seventy-five percent of our customers were hit with at least one attempted BEC attack in the last three months of 2016—and it only takes one to cause significant damage,” said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint. “Our research shows static policies cannot keep up as attackers are constantly changing their socially-engineered messages.”

Organizations need detection, authentication, visibility, and data loss prevention to ensure they don’t fall victim, he said.

Proofpoint’s Email Fraud Defense solution protects organizations from attacks spoofing trusted domains by using the power of email authentication. It features a DMARC (Domain-based Message Authentication Reporting & Conformance) reporting interface combined with the guidance of a world-class team of authentication experts, Email Fraud Defense helps organizations identify, authorize, configure and authenticate all legitimate email traffic so that security teams can implement policies to block abuse of their domains.

Email Fraud Defense is also part of Proofpoint’s comprehensive multi-layer BEC protection solution, which includes policy and dynamic classification through Proofpoint Email Protection, data loss prevention with Proofpoint Email DLP, and proactive lookalike domain detection via Proofpoint Digital Risk Defense.

BEC attacks, which have cost organizations billions of dollars, put every email-based relationship at risk. During an attack, cybercriminals pretend to be a company executive and send highly-targeted emails to employees to trick recipients into wiring money or sending sensitive information.

Proofpoint’s research into BEC attack attempts across more than 5,000 enterprise customers between July-December 2016 (including U.S., Canadian, UK, German, French, and Australian organizations) confirms cybercriminals are using social engineering to target and exploit victims. Below are key Proofpoint findings:

  • BEC attacks increased by 45 per cent in the last three months of 2016 vs. the prior three months
  • 2/3 of all BEC attacks spoofed their email address domain so that their fraudulent emails displayed the same domain as that of the company targeted in the attack
  • Companies of all sizes are prone to BEC attacks. Proofpoint data indicates no correlation between the size of the company and BEC attack volume
  • Larger companies make for attractive targets because they have more funds to draw on and greater organizational complexity to hide behind, even if they tend to have stricter financial controls. And while smaller companies may not yield the same returns, the relative absence of financial controls makes them more vulnerable.

Manufacturing, retail, and technology organizations are generally more targeted with BEC attacks. Hit repeatedly every month, cybercriminals look to take advantage of more complex supply chains and SaaS infrastructures which often accompany these industries.

While CEO impersonation continues in BEC attacks, cybercriminals are increasingly targeting victims deeper within organizations.

For example, to accounts payable for wire transfer fraud attempts, to human resources for confidential tax information and identities—and engineering for intellectual property theft. 

These should give you a hint if you’re getting fraudulent emails:

  • More than 70 per cent of the most common BEC subject line families feature the words “Urgent” “Payment” and “Request.”
  • The top seven subject line families include: payment (30 per cent), request (21 per cent), urgent (21 per cent), greeting (12 per cent), blank (nine per cent), FYI (five per cent), and, where are you? (two per cent).


Related posts