Business Email Compromise Trends and Mitigation – The Monitor, Issue 1

The article below was extracted from The Monitor newsletter, a monthly digest of Kroll’s global cyber risk case intake. The Monitor also includes an analysis of the month’s most popular threat types investigated by our cyber experts. Subscription is available below:

Sign up for The Monitor

Kroll identified 25 business email compromise (BEC) incidents via its cyber intake process during the month of January 2019. Among the BEC incidents that Kroll reviewed, representative attacks led to unauthorized changes to direct deposit information, unauthorized mail forwarding and fraudulent wire transfers of up to $5 million.

BEC incidents most commonly involved an actor compromising an Office 365 Outlook account. For example, Kroll reviewed an incident where a human resources employee complained to her payroll department that her banking information had been changed. Payroll investigated and found an email record from the employee requesting the change. Upon further investigation, the company discovered unauthorized logins to the employee’s Office 365 account from an external IP address. A malicious actor had likely obtained her Office 365 credentials and was able to use her email account to request a change in banking information.

Corporate executives are under particular assault by BEC attackers. Managing Director Jonathan Fairtlough explains, “Criminals are focusing their efforts on executives not only because of their access to high-value data, but also their reach throughout the entire enterprise. Companies should back up executive training with technology that provides early detection of problems to reduce the opportunity for lateral movement once a hacker breaches their systems.” 

Jonathan continues: “While senior executive accounts are commonly targeted, it is important to note that any employee routinely accessing customer account data or treasury functions is at risk.”

BEC attacks also continue to be highly lucrative for cybercriminals in the form of wire transfer fraud. According to the FBI, in 2018 nearly 21,000 victims lost close to $1.3 billion. “Wire fraud highlights a persistent security weakness — our human nature. In the cases we’ve seen, when employees receive requests from senior executives, the motivation to assist the person higher in rank outweighs the need to stop and validate that the request is legitimate” says Peter McFarlane, Managing Director and Toronto Office Head.

 According to Peter, tone from the top is critical for combating this crime: “A company’s most senior managers need to make it absolutely clear to everyone involved in approving wire transfers that no one, no matter their rank, can override policies or proper procedures.”

Technically Speaking

The growing adoption of Microsoft Office 365 requires specialist skills in securing and/or investigating the environment in the event of BEC and insider threats. Check out these Kroll resources for insights to help you better meet the challenges ahead: 

A Planned Methodology for Forensically Sound IR in Office 365. First presented at SANS DFIR Summit 2018, this talk by Managing Director Devon Ackerman discusses numerous forensic, incident response and evidentiary aspects of Office 365. Based on two years of forensics and incident response data collection in Microsoft’s Office 365 and Azure environment, it also encompasses more than a hundred Office 365 investigations, primarily BEC and rel="noopener noreferrer" insider threat cases. View now.

Penetration Testing for Active Directory Forests: Exploring Trust Relationships. Active Directory (AD) is a critical software for most organizations in that it serves as the single centralized point for handling authentication and authorization control access to all critical resources within an organization. As Kroll’s security penetration testing lead Carlos Garcia discusses in this article, compromise of just one domain admin account in the AD forest could give an attacker unrestricted access to all resources managed by all domains, users, servers, workstations and data. Read more and download slides here

Case Studies

As these recent Kroll cases demonstrate, BEC incidents are not going away and warrant ongoing vigilance. 

  • Hackers sent a legitimate-looking phishing email from an account belonging to one large company’s Director of Corporate Services to approximately 900 external recipients and 400 internal recipients at that company. In this case, any of those emails could have been used to initiate unauthorized BEC transactions.
  • A supervisor at a financial services company received an email request from a business associate at another financial institution. Despite recognizing the request was somewhat out of character, the supervisor – who routinely works with financial information – opened the attachment expecting an invoice. The document was in fact a maliciously crafted document which triggered a chain of events on the endpoint that were invisible to the user.

 
BEC Red Flags for Wire Fraud
 :
  • Unusual or Vague Transaction Details
    The transaction is described in vague terms (e.g., “strategic marketing advice”) or referenced as a confidential matter known to senior management (e.g., “confidential joint venture investment”). Instructions regarding recording of the transaction are also vague (e.g., “corporate marketing”). 
  • Unknown Beneficiary and Round-Sum Amounts
    The beneficiary is typically a person/entity unknown to the organization and may reference a jurisdiction in which the organization typically does not conduct business. Round-sum amounts, such as “$200,000,” should raise suspicions, although many fraudsters are aware of this and often avoid them. 
  • Absence of Required Supporting Documents
    Normal wire transfer requests should be supported by appropriate documentation available to both those preparing and approving the transfer. Fraudulent requests often state supporting documents will be provided later or were provided to the CEO or other senior executives. 
  • Non-standard Email Format
    Any irregularity in email headers, footers and content such as [email protected] rather than the standard format [email protected] or use of an atypical font or email footer suggest that it could be a fraudulent communication (in addition to a false email domain). 
  • Requirement to Circumvent Normal Protocols
    A pretext is often presented to justify the need and urgency to circumvent normal protocols. These include reasons such as the funds must be received before end of business the next day to close a confidential transaction, avoid penalties or avoid seizure of product.

 
Kroll Experts Corner – Mitigating Business Email Compromise

Following are some insights from Kroll experts on how to prevent or mitigate the harms from business email compromise. 

  • Implement Multifactor Authentication
    Requiring that all users- especially senior and treasury staff use a multi factor authentication system to access email is the most effective mitigation step to take. A phishing attempt or credential theft can be effective, but without the additional token or access method, the attacker cannot access the mailbox. 
  • Review Email system Configuration
    Email systems need to be properly configured and regularly reviewed. There are many modern security processes to securely configure an email system like Office 365 to enforce trusted relationships with common clients and partners, and to track and block misuse.  A security professional needs to review email configurations, regularly log and review the use of forwarding rules, domain trust settings, and external exchange access.
  • Phishing Training
    Implement regular phishing awareness training and consider implementing testing to review how many users within the organization are clicking on phishing links. Phishing emails can be used to compromise network credentials and carry out BEC attacks against your organization. 
  • Beware of Social Media Links
    Recent open source reporting highlights an increase in phishing emails designed to look like LinkedIn updates with titles like “profile views” and “InMail message”. These emails can be used to harvest credentials for use in BEC scams. Train employees to use caution when opening these types of messages in their corporate mail accounts. 
  • Raise Awareness of Spoofed Domains
    Hackers will often buy a domain that is similar to a vendor or client’s name but will change one letter or spell the name differently. Employees in payroll and other finance departments should receive training on how to recognize spoofed domains or emails; additionally, create protocols for double-checking domain names and email accounts to ensure the accounts match up to the legitimate company name and domain. 
  • Implement Dual Verification Procedures for Financial Transactions, Including Wire Transfer Requests
    Many BEC attempts rely on creating a sense of urgency or presenting a business case that pressures the targeted individual to quickly transfer funds or edit banking information, so the attacker can swiftly carry out fraudulent activities. Ensure mechanisms are in place to validate requests before action is taken, such as predefined escalation protocols. Also, build a corporate culture that stresses defined channels and protocols cannot be circumvented by anyone, no matter how senior.
<span>Business Email Compromise Trends and Mitigation &ndash; The Monitor, Issue 1</span> 2019-02-01T05:00:00.0000000 /en/insights/publications/cyber/monitor/business-email-compromise-trends /-/media/kroll/images/publications/featured-images/2019/business-email-compromise.jpg publication {E39587AD-8F0B-4FE2-865F-969BC5501096} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {E538E14D-C192-4A8E-8861-504D0EEBF99A} {809E3BA6-ABC7-4C3B-AB97-D7E5B9A66B24}

Other Areas We Can Help

Cyber Risk

Cyber Risk

Global, End-to-End Cyber Risk Solutions

Cyber Risk
Incident Response and Litigation Support

24x7 Incident Reponse

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Reponse

Insights

Cyber Risk

10 Fundamental Work From Home Cyber Security Tips

Cyber Risk
Cyber

Rethink Your Risk Assessment During COVID –19

Cyber
Cyber Risk

Now Available – Same-Day Endpoint Protection Deployment for Remote Workers

Cyber Risk
Cyber Risk

Managing CFIUS Compliance – Four Pillars for Success

Cyber Risk