Beruflich Dokumente
Kultur Dokumente
“The Boss?”
The Explosion of Business Email
Compromise (BEC) Scams
4
but have the name of a real bogus spam email, they may not recognize and block BEC
person appear in the “from” attempts coming from different domains with smaller email
line. volumes.
2. They can set up a domain
name similar to that of a 3. Fraudsters can log into someone else’s email account.
real company and create BEC emails may actually come from the email account
an email address that looks of the CEO. Fraudsters can simply log in to someone
like it is from the person else’s email account if they already have their username
impersonated. and password. Usernames and password combinations
3. They can get access to a real are frequently obtained through phishing attacks and are
person’s email account. Those readily available for sale on the internet, often on the dark
who are in someone’s email web. Armed with this combination, fraudsters may try to
account also can have access log in at dozens of different websites, a process known as
to all the other email traffic to
“credential stuffing,” and get into email systems.
that person, so for fraudsters
If fraudsters do not already have login information for
it is more difficult but may be
an email account, there are other ways to try and get it.
more effective in committing fraud.
For most people, logging into email accounts is a pretty
simple process with a username and password. Often
1. The email isn’t coming from the person listed in the
the username is simply your email address, which usually
“from” line.
consists of some variation on first and last name and the
Standard internet settings allow those sending emails to domain name used by the organization. For example, an
have any name they wish appear in the “from” line. Thus, email to Eddie Alias at example.com would likely be ealias,
fraudsters may simply send an email that says it is from e.alias, or eddiealias @example.com. If someone already has
Eddie Alias in the inbox, but if one looks closely, or hits an email address from someone else at that organization,
reply, they can see that it is really from IMAfraud@yahoo. they can probably guess the correct email address and thus
com. One study of BEC gangs found that 82% of the time the username.
BEC gangs simply use display name deception. These The second step is to have the password. One way to
tactics may be more effective when people are reading get access is to use a computer program that just keeps
emails on their phones or on other devices, where the entering password combinations until one works, a process
screen is small and the actual email is hard to read. known as a “brute force attack.” Some email systems will
So when an email comes “from” a superior or a trusted detect failed login attempts and lock the system, but many
partner, there is a risk that people will not look closely, don’t. Also, many people use the same easy-to-remember
especially if it is marked urgent and the employee is passwords, like “password1234,” that are easily guessed.
anxious to please the supposed sender. One study found that the five most common passwords
are: “123456”, “123456789”, “qwerty”, “password” and “111111.”
2. Fraudsters can set up an email domain that is similar to Actually getting access to someone else’s email seems
the real one. to occur in only a small percentage of BEC cases, but the
All email addresses go to, or “@,” a domain name, like advantages are very large. It allows fraudsters to read all
“example.com,” and BEC fraudsters often impersonate of the email and learn about ongoing transactions, such as
those domains. These efforts do not provide real access real estate closings.
to anyone else’s email, but they are likely very effective in Fraudsters can reset email system “tools” so that they get
fooling the recipient of the email into believing it is real. copies of all incoming and outgoing email and make sure
Then fraudsters might register the domain name “exarnple. that the real owner of the email account does not recognize
com.” Note, that unless you look closely, the eye reads the that there is someone else in their account. And if they are
“r” and the “n” as an “m.” These emails may come from in the email account, they probably also have access to the
CEO@exarnple.com, and those getting the email may not person’s calendar and may know when top executives are
recognize it is not from the CEO of “example.com.” due to be out on travel and can’t be reached by phone to
It is cheap and easy to set up such domains, and confirm a transaction.
Proofpoint notes that millions of domains have been
registered that are similar to those of real company How do fraudsters obtain the money?
domains. A large part of these are used to sell counterfeit
Romance fraud victims are key players in BEC fraud.
goods, but they are also a staple of BEC fraud.
Much of the time, money stolen in BEC fraud first goes into
Many of the fraudulent BEC domains are attached to
bank accounts opened by romance fraud victims, who then
servers that can send email but have low volumes of mail
send the money out of the country. These victims are used
coming from them. Because many of the programs that
as “money mules” to launder money or transport drugs for
try to detect spam email (such as phishing attempts)
a variety of different frauds. Romance fraud victims believe
try to identify the computers sending large volumes of
they are helping out a “loved one” and most don’t realize
5
that they are assisting with fraud. FinCEN reported recently From: Robert Smith [president.desk@wp.pl]
that 73% of the time the money from BEC fraud first goes Sent: Thursday, May 16, 2019 11:00 AM
into domestic “money mule” accounts, and 27% of the time To: Chris XXXX
it goes to foreign banks in countries such as China, Malaysia Subject: quick task
or other locations in Asia. Hi Chris
Fraud gangs use romance fraud victims because they
are likely to be reliable and unlikely to steal the money. Are you available to run an errand ? I need you to make provision for
In addition, romance fraud victims do not know the real gift cards for me at any local store around.
names of the fraudsters, and so they cannot reveal that
to law enforcers trying to follow the money. Another BBB Robert Smith
study deals specifically with romance fraud victims used --------------------------------------------------------------------------
as money mules. Many prosecutions of BEC have led to
romance fraud and included criminal charges for that fraud FinCEN reports that CEO email scams have declined
as well. somewhat. They say this accounted for 33% of BEC
Keeping track of these mules, getting them to do the incidents in 2017 but that this figure dropped to 12% in 2018.
work and ensuring that the money is collected is a key to
making BEC frauds successful. 2. Vendors
Another way fraudsters use bogus emails to get money
Different kinds of is to impersonate a vendor or contractor. FinCEN reports
BEC frauds a large recent increase in vendor fraud from 30% in 2017
to 39% in 2018. They believe this is now the most common
type of BEC fraud.
1. CEO – CFO There are two main ways vendor fraud can occur.
The classic BEC fraud involves an 1. A business may get an email they believe is from a
email that looks like it is from the customer placing an order and providing an address
CEO to the chief financial officer where the goods can be delivered. But the goods are
(CFO) or another person who can actually sent to the fraudsters, or someone working
send wire transfers, asking them to on their behalf, who can receive the goods and then
send money right away. send them on outside the country. This has often
These spear phishing emails occurred with emails that seem to come from colleges
also typically try to discourage the and universities placing an order for goods. Public
recipient from checking back with the CEO. They often institutions tend to send purchase orders, and these
claim that the matter is urgent and claim to be in a meeting, can be found online, altered and used to buy goods. For
or out of the office. Anxious to please the boss, employees example, a computer company might receive an order
may proceed and send the money. There are employees for a batch of laptop computers from a state university,
who are new or reluctant to bother a busy boss. They may which asks that they be delivered to a satellite location
respond to the request without checking it out first. or the address of a drop shipper. The computer
company would ship the laptops to a fraudster’s
A CEO’s story
Steve, the CEO of a credit union in Omaha, was on a business trip when he received a text message from one of his vice presidents that
said she received an email supposedly from him. The email read: “Dear Carol, I need you to perform a task for me. Let me know if you
are available. Best regards, Steve.” Steve told Carol that while the email had his name in the “from” line, he did not send it. A closer look
showed that it was actually from m1staff@aol.com.
A month earlier, another senior employee, Tera, received an email that appeared to come from Joe, the credit union’s board chairperson.
“Hi Tera -- Let me know when you are available. There is something I need you to do. I am going into a meeting now, so just reply my (sic)
email.”
Tera read this on her phone and didn’t detect that it was false, so she replied. A little later she received a response from “Joe”: “Can you
get this done ASAP? I need a couple of gift cards. There are some listed clients we are presenting the gift cards. How quickly can you
arrange these gift cards because I need to send them out in less than an hour. I would provide you with the type of gift cards and amount
of each.”
Tera forwarded the email to Steve, saying, “I received this weird email from Joe which doesn’t seem right? I responded initially to see
how I could help and received this subsequent request. How do you want to proceed?”
Steve told her not to proceed. A closer look showed that the email was actually from alexio007@gmail.com.
Pleased that his employees did not send money or buy gift cards and reported the events right away, Steve says he suspects fraudsters
found the information they needed to create the bogus emails on the credit union website. He still wonders how they knew he was out of
town when one of the emails arrived.
6
location and then send the bill to the university, which 2018 to roughly 150, and so far in 2019 the W-2 scam has
might even pay it if they are not watching carefully. virtually disappeared.
2. Fraudsters may send emails pretending to be from There are several measures the IRS has taken that may
building contractors or vendors that provide services. account for the success in fighting this type of fraud. First,
They claim to have changed bank accounts and ask that they publicized and warned of BEC fraud in a series of
the money to pay their bills be sent to the new account alerts. Second, they worked to shut down email addresses
that is controlled by the BEC gangs. and domain names
Two vendor fraud scenarios have resulted in major tied to this fraud by
problems not only for businesses, but also for colleges, contacting service
universities and state and local governments. Information providers and worked
about state and local governments and the contracting with IC3 on another
process is all available online. Thus, if a city or college were warning. Third, they
building a parking garage, the information about who got set up a process and
that contract, who approved it and names of city managers repository (dataloss@
or others involved in paying bills might all be readily irs.gov) to receive
available over the internet. information from
Armed with that information, fraudsters could send an victim organizations
email impersonating the building contractor providing a bill, and immediately
stating that the bank account information where payments share it with criminal
are to be made has changed and start receiving payments. investigators. These efforts reduced the impact of the
If this succeeds once, the fraudsters may continue to stolen data on affected taxpayers. The IRS has also
receive payments for some time. For example, MacEwen partnered with other agencies and takes part in the BEC
University in Edmonton, Alberta, lost $11.7 million when a working group.
BEC email claimed that a vendor had changed its bank Aggressive efforts to prosecute those involved in
account. This is not limited to building contractors, but to stolen identity refund fraud has resulted in dozens of
anyone else providing goods or services. prosecutions, not all of them involving BEC.
In July 2019, there were reports that a North Carolina Anyone who receives a bogus email asking for
county government lost $1.7 million to a BEC fraud. In the W-2 information should immediately report it to law
same month, the Inspector General for the Department of enforcement.
Homeland Security found that several federal agencies had
been impersonated in orders for computer equipment and 4. Real Estate BEC
other goods with hundreds of thousands in losses. Another BEC fraud target involves the proceeds of home
The nonprofit Center for Internet Security provides sales. When home sales close, buyers typically use bank-
advice on BEC and other cybersecurity threats for state, to-bank wire transfer to send money to the seller. Or the
local, territorial and tribal governments. seller may use the money they get for the house to pay
off the mortgage, again by wire transfer. When a home
3. Tax information sale occurs, realtors, title companies, lawyers, buyers and
Unlike other types of BEC fraud, this version seeks sellers often communicate by email. With the introduction
information needed to commit a different fraud and does of Google Docs and DocuSign, important papers may
not require that a victim send money. come as email attachments. Logging into bogus phishing
BEC emails may be sent “from” senior executives to emails and opening those documents can allow fraudsters
human resources directors, claiming that they need to steal email login credentials or release malicious malware
employee W-2s -- in the U.S., a form that reports employee programs.
wages to the Internal Revenue Service and contain an Crooks insert themselves into this system to redirect
employee’s name, social security number, tax withholding the wire transfer to a bank account that they control. Thus
information and overall pay -- and instructing HR to send victims may be devastated, losing hundreds of thousands
these by email. of dollars, and may even be left with nowhere to
Armed with the W-2 forms, live.
criminals can file bogus tax An IC3 alert from July 2018 states that this
returns for those individuals, problem is increasing rapidly. The alert says that
claim refunds and have those “reports of these attempts have risen 1,100%
refunds deposited on stored between 2015 and 2017, and in 2017 alone there
value cards or deposited into was an estimated loss of nearly $1 billion in real
bank accounts they control. estate transaction costs.” FinCEN recently reported:
The IRS says it had a little “While real estate firms represented 9 percent of
over 100 reports of this in 2016, all targeted firms in 2017, they accounted for over
but in 2017 that rose to nearly 20 percent of fraudulent transaction amounts. Real
900. The volume dropped in estate firms have the highest average fraudulent
7
transaction amount of $179,001.” Like the other
types of BEC fraud, this is a worldwide problem, A realtor’s story
as illustrated in a New Zealand case. Shawn, a real estate agent in Edwardsville, Illinois, sent closing
Real estate fraud is complicated because real instructions in July 2018 to a buyer for a home she helped sell. On the
estate agents often work from home, change scheduled closing day a few days later, the buyer received an email
companies from time to time, and thus may have appearing to come from Shawn. While Shawn did not send the email
a variety of personal and work email accounts nor was it from her true email address, the amount requested was the
that they use regularly. actual closing price. Here is the email exchange, typos included:
For fraud to work in this area, the fraudsters Bogus realtor: “Hello, Please be informed that Escrow requires that
need to know who the parties are, the amount you wire funds (($303,855.50) today prior to closing to avoid delay
of money involved, and the timing of the closing. in closing. Kindly confirm if you are sending the wire today so I can
This information may not be publicly available. provide you with our wire instructions.”
The fraud seems more likely to occur when its Buyer: “I thought the email said I could bring a certified check.”
perpetrators have actually gotten the information Bogus realtor: “At the moment that’s unacceptable because as I
needed to log into the email account of one of explained due to the account reconciliation. This matching process
the parties. If fraud gangs can read the email of is important, because it proves that the general ledge figure for
an appraiser, realtor, lawyer, or title company, receivables is justified. However, you are required to send the wire
they can discern who the parties are and get today.”
other crucial details. In at least some cases, the Bogus realtor, later that day: “Please find the wire instructions and
fraudsters have waited until the wire transfer endeavor to send me the confirmation of payment once processed.”
instructions were sent (as an email attachment) A PDF attached to the email showed the letterhead of the real
and followed up a few moments later with a new company handling the transaction, but the account to which the
email claiming there was an error in the previous money was to be wired was fake.
instructions and providing a new bank account to Rather than wire the money as instructed in the email exchange,
send the money to. the buyer arrived at the closing with a cashier’s check. Shawn and
The real estate industry is understandably her client were shocked about the incident and the seller was deeply
concerned about this situation and has been concerned about the near-loss of so much money.
attempting to train realtors to avoid this type of Shawn wondered how the fraudsters found the actual sales figures,
fraud. The National Association of Realtors has her name, her signature block and the name of the client. Since
issued several educational pieces, which include the bogus email did not come from her real address, she believes
fraud notices and three videos on recognizing scammers may have obtained the information by hacking the buyer’s
scams, an alert for buyers, and information on email account.
how to avoid wire fraud. The CFPB has published Shawn reported the incident to her manager and the title company.
a blog post on BEC real estate fraud. Her company now warns clients to call the title company or real estate
In addition, a consortium of title companies agent if they receive instructions to wire real estate closing money.
and partners has recently set up a website,
stopwirefraud.org, to educate and warn about real
estate BEC. employee to the Human Resources office saying that the
The real estate industry says that wiring instructions employee has changed banks, attaching a “voided check”
should always be confirmed by phone with someone you for the new account and asking that future paychecks be
know. deposited to the “new” account.
In addition to BEC fraud, the FBI is also concerned about
5. Direct deposit a separate method of stealing paychecks. Fraud gangs
sometimes use login information to get access to the
BEC fraudsters are also after paychecks that are directly
employee’s online payroll account with the organization
deposited into bank accounts or onto stored value
and then change the direct deposit information
cards. IC3 reports that this
so that it goes to an account they control. IC3
problem is increasing rapidly.
says that the institutions most affected by this
In 2018, the IC3 received
scam have been education, healthcare and
approximately 100 complaints
commercial airway transportation.
with a combined reported
Always confirm bank account or contact
loss of $1 million. This fraud
information changes by reaching out to the
is mainly being done on
old phone or email address to confirm that the
behalf of senior employees,
employee or client really wants the change as
presumably because they
the Postal Service does when someone files a
are paid more and so more
change of address form.
money can be stolen.
Direct deposit fraud occurs
6. Gift cards
with an email “from” an
BEC fraud scenarios requesting gift card
8
purchases are exploding but involve smaller sums than The FTC reports an increase in gift cards being used
frauds involving bank-to-bank wire transfers. for many different kinds of fraud, occurring in 27% of
For example, two senior executives at the New York complaints where the form of loss was reported – a 270%
BBB received an email that appeared to be from Steve increase since 2015.
Bernas, president and CEO of BBB Chicago. The email read In the U.S., the most
verbatim, in part: common gift cards used by
“I need you to handle few things for me right away. I’m in fraudsters are iTunes and
the middle of something right now, got a hectic day ahead Google Play cards, Walmart,
but I’m looking forward to surprising some of our staffs Target and Home Depot.
with iTunes Gift Card today. Victims are usually asked to
I want you to keep it between us pending when they buy gift cards from Steam,
get it. So, therefore, I need iTunes Gift Card of $100 face iTunes and Google Play,
value each, you can get them in Stores around(Best Buy, according to Canadian law
WalMart, etc....) (I need 50 pieces of the $100 amounting enforcement.
to $5000). I need you to get the physical card, then you Fraudsters don’t need to
scratch the back out and simply take clear pictures, attach have the physical cards to get the funds. Instead they ask
the pictures showing the victims to scratch off the back of the card to reveal the
A business’ story pins clearly and email them code, take a photo of those numbers, and email or text the
In spring 2019, Jane noticed to me here. numbers back to the fraudster.
her bank account was missing a I will be balancing up There are online marketplaces where people can redeem
payroll direct deposit entry. The the funding account gift cards. Agari reports that one Nigerian BEC fraud gang
senior executive for a Chicago- or Reimburse you enters the codes into the website of
based corporation called her immediately I’m done Paxful, which converts them to bitcoin.
human resources department with things here.” The bitcoin can then be converted
and learned her employer The executives into currency and deposited into the
deposited her pay into a new recognized the BEC bank accounts of the fraud gangs.
account. They had received an scam and did not Agari reports that a gift card can be
email, supposedly from her, comply with the redeemed, converted, and placed in a
requesting that her pay be request. bank account in Lagos, Nigeria, in less
deposited into the new account. The FTC has warned than four hours.
An email also contained an that many of these Agari also suggests that much of
attachment containing an image bogus emails claim the increase in BEC gift card fraud
of a blank check with the new to be coming from emanates from Africa, noting: “Paxful
account information. priests, rabbis or other recently told the online media outlet
After hearing from Jane, clergy members. CoinDesk that it averaged $21 million a week in transactions
the company immediately An alert issued by IC3 on in 2018—up from $8.5 million in 2017. It attributed the
contacted the bank where the October 24, 2018, noted a growth in part to its user base nearly tripling in Ghana
money had been deposited. recent explosion in reports and more than doubling in Nigeria to more than 300,000
Fortunately, the bank flagged to them where people were accounts. In fact, African users make up nearly 35% of all
the account as possibly asked to buy gift cards. Paxful accounts.”
fraudulent. The company was Average losses were $900. Companies that sell gift cards are learning how their
able to get most of the money IC3 also reports that gift products are being used for fraud. Gift cards are often used
back, and Jane received her full card BEC losses continue to by other fraudsters who call consumers and claim to be
pay. grow rapidly and increased from a government agency such as the IRS, DEA or Social
Jane was immediately 61% in the first five months Security. They threaten arrest if victims don’t immediately
concerned that she may have of 2019 over the same time pay money, usually via gift cards. The FTC has posted the
been a victim of identity theft. period in 2018. phone numbers of companies that offer gift cards so that
She had recently visited Russia victims can report fraud to them.
on business, and she was January 1, 2018 to May 31, Apple recently instructed its employees to tell customers
worried other fraudulent activity 2018, IC3 BEC gift card that its gift cards cannot be used to pay taxes or purchase
using her name might occur. complaints: non-Apple electronics and hardware. App Store & iTunes
Free credit reports showed no Victims: 7,391 Gift Cards can be used only to purchase goods and
problems, but she still placed a Loss: $465,586,962 services from the iTunes Store, App Store, Apple Books, for
freeze on her credit. Fortunately, an Apple Music subscription or for iCloud storage. Apple
no other fraudulent activity January 1, 2018 to May 31, Store Gift Cards can be redeemed only on the Apple Online
happened. Her employer now 2019, IC3 BEC complaints: Store and at Apple retail stores.
requires employees to appear in Victims: 10,603 (+44%)
person to request direct deposit Loss: $750,273,494 (+61%)
account changes.
9
Who is responsible for BEC fraud? fake checks, a topic of an earlier BBB study. With eight
victims per month, he was making $24,000 a month.
At least 90 people have been arrested or charged for Alpha then branched out to do romance fraud, and in
BEC fraud in the U.S. over the last three years, and the 2015 he began targeting organizations with BEC fraud.
majority of the defendants in those cases are of Nigerian The romance fraud victims provided key help by setting
origin. There is broad consensus among law enforcement up bank accounts, and another person joined the group to
and internet security companies that 90% of BEC groups manage this process, with the title “mule herder.”
operate out of Nigeria. Other Nigerian fraud groups operate As the group grew, they also engaged in a large phishing
from the U.S., Canada and many other countries around effort, using a Google Docs phishing page to get email
the world. Ghana is also a significant source of activity. login credentials. They gathered more than 3,000 account
IC3 reports that the gangs may also work with Eastern credentials from these efforts, almost all in the U.S. and
Europeans or other organized crime groups. Canada. In addition, the group signed up for several seven-
Nigeria has a long tradition of consumer fraud. It also day trials at Lead411.com to gather information on potential
has a great deal of political corruption, which may help victims. They also began registering domain names for their
shield fraud operators. Over the last 20 years or more, efforts, so that BEC emails would look real. The group now
many educated Nigerians have left the country and now numbers at least 35 people.
live in the U.S., Canada, Malaysia, China, India and other In addition to the group’s BEC activities, Scattered
countries. Some of these individuals are actively involved in Canary continued to engage in romance fraud, fake check
a worldwide network of fraudsters. frauds, filing bogus tax returns to get refunds applying for
Most people have encountered the Nigerian “dead benefits from social security. Scattered Canary also sought
dictator” letters and emails, written in poor grammar and FEMA disaster funds, “sold” nonexistent vehicles advertised
wildly unbelievable. These continue to draw victims into for sale on the internet and ran mystery shopping frauds.
elaborate fraud schemes. Unfortunately, there may be a They expanded BEC efforts to include direct deposit and
tendency to conclude from these that the fraudsters are gift card fraud. They laundered the gift cards through
unsophisticated, and their frauds are easily avoided by Paxful.
exercising just a smidgen of common sense. Both of these Scattered Canary also outsources some of its efforts
are untrue. to develop leads and template emails. This is a highly
Many Nigerian fraudsters have college degrees. The organized enterprise, and it is just one of hundreds of such
frauds they operate are well organized. Today these groups.
groups use computer programs to correct grammar, Agari also suggests that instead of a focus just on a
hire professional writers, and operate organized crime particular type of fraud, a more effective approach for law
businesses. enforcement might be to recognize that these fraud groups
In addition, at least some of these activities are controlled are engaged in a wide variety of frauds at the same time,
by violent organized and to consider concentrating efforts on the gangs behind
crime groups like Black it instead of just concentrating on one type of fraud.
Axe, which was formed
on college campuses in
Nigeria but now operates What is being done?
around the world, including
in the U.S. and Canada. Criminal Prosecutions of BEC
There are reports that Black The U.S. Justice Department has been very active in
Axe is deeply involved addressing BEC fraud. They have brought at least 22 cases
in BEC fraud as well as in the last three years, with 453 individuals arrested or
working with the mafia and charged. One prosecution involved a Lithuanian, but almost
controlling prostitution in all the rest involved people from Ghana or of Nigerian
Italy. One internet security origins. Six of those cases also charged defendants with
company has issued a romance fraud. Losses in those cases were at least $200
report looking closely at million. Many of these cases were announced as part of
this phenomenon. a collective enforcement effort dubbed “Operation Wire
Wire.”
A close look at A September 2019 Operation Wire Wire follow-up
one BEC group effort, dubbed “Operation reWired,” resulted in 281 arrests
world-wide. The FBI, U.S. Secret Service, U.S. Postal
Internet security company Agari has issued several Inspection Service, ICE’s Homeland Security Investigations,
fascinating reports looking closely at who is involved in IRS Criminal Investigation and U.S. Department of
BEC gangs, how they evolved and how they operate. One, State’s Diplomatic Security Service participated in the
which they dub Scattered Canary, apparently began with investigation. State District Attorneys in Texas and Arkansas
one young man and a mentor in 2008. The main player, have ongoing investigations related to this four-month
“Alpha,” began in 2008 operating Craigslist frauds involving
10
operation that included cooperation with officials in out for them. They have successfully stopped many BEC
multiple countries. frauds with these efforts. Many banks have similar practices.
Since BEC frauds operate around the world, there have
also been investigations or prosecutions in other countries,
including Canada, the United Kingdom, Japan, Australia,
Recommendations
and Nigeria, as well as two cases in France.
What can you do to protect your organization
Efforts to recover funds stolen in BEC fraud from BEC fraud?
The FBI and FinCEN have worked together to freeze All organizations face a serious risk of BEC fraud, and
bank accounts and get money back to victims of BEC the fraud gangs are very smart and innovative. They need
fraud. FinCEN reports that since 2014, it has recovered over only succeed in a small number of their attempts to make
$500 million by working with banks, law enforcement and this fraud profitable. And organizations that have not
partners in 164 countries around the world. suffered a loss may believe the steps they have been taking
In addition, IC3 set up an asset recovery team in February are effective, even though the frauds are evolving and
2018 to help recover BEC funds that went into U.S. increasing.
bank accounts. They report that in 2018 they recovered Some businesses may be concerned that money spent
$192,699,195, for a 75% recovery rate. on IT precautions is simply additional overhead. But BEC
fraud prevention is just as important as door locks, fences
Public/private partnerships and other efforts to protect physical assets.
Several years ago, Agari’s Ronnie Tokazowski set up a However, we can’t rely solely on technology to prevent
BEC working group to share and analyze BEC information, phishing emails. We need to learn how to recognize and
seek patterns of activity, and assist enforcement efforts. avoid responding to them. Fortunately, there are several key
The group currently includes over 600 people from steps that are free or cost very little and that will go a long
at least 35 organizations such as the FBI, the IRS, the way in preventing BEC fraud.
Secret Service, Google and a number of internet security
companies. Since 2015, this group has “helped stop IT and technical precautions
millions of dollars in wire transfers, taken down thousands
Require multifactor authentication. First, and perhaps
of romance accounts and contributed to well over 100
most important, organizations can keep fraudsters from
arrests.” It received an award for these efforts in October logging into email systems by requiring “multifactor
2018. authentication.” Examples include sending a text message
New York University and Agari have created a with a code that must be entered to log in, answering a
visualization tool, called Beagle, to track connections in phone call to a number designated by the user or using
data and to help identify BEC groups. It is available for free thumbprints to unlock smartphones. One very strong
to law enforcement. system requires a token that continuously generates new
number codes that must be entered to log in.
Better Business Bureau Change settings so that all emails coming from
BBB also has been active trying to help address this outside an organization are flagged with a warning.
problem. It has issued past alerts on BEC. In addition, the Email systems offer features that can help stop BEC
BBB Scam Tracker system has a category for BEC fraud emails from reaching inboxes, often available for no cost.
which collects reports of this type of activity. Moreover, For example, one setting identifies emails from outside
BBB has organized conferences for local business that the organization, and when delivered, a line is added in
provides education on BEC fraud and how to avoid it. BBB red type stating: “This email comes from an external email
urges employees at retail locations selling gift cards to warn address.”
potential victims that these are commonly used as payment Monitor email rules used when someone else is in
methods for frauds. an account. In situations where someone has hacked
into email accounts,fraudsters often set rules that
Internet security companies automatically forward all emails to them and prevent the
A lot of work in this area has been done by the Internet real email account owner from noticing. Administrator
security industry. In addition to protecting their clients from
BEC and other cyber threats, they have also done a great
deal of research on this industry and how it operates. Many
of those studies are cited in this study.
Banks
A large St. Louis bank calls all of its customers requesting
wire transfers to confirm that the request is real and is not
for fraud. With these simple phone calls – not emails or
texts – they let their clients know that they are watching
11
of risks, and some IT measures require comprehensive
staff training in order to be effective.
Insurance/malpractice
One potential precaution for organizations is to buy cyber
insurance. Unfortunately, most policies exclude coverage for
“social engineering” losses, presumably because they are
concerned that employees may be participants in the fraud.
Riders that cover social engineering are available at an
extra cost. But organizations rarely purchase this coverage.