According to an online statement from the Internet Crime Complaint Center (IC3) and the FBI, nearly 2,000 individuals were victims of a wire payment scam that was extended to 45 countries and led to an estimated loss of $215 million.
In response to the wire payment scam law enforcement to issue a widespread warning about a large scale operation that is tricking employees at both small and large businesses, and for this reason called the Business Email Compromise.
“The Business Email Compromise (BEC) is a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. Formerly known as the Man-in-the-E-mail Scam, the BEC was renamed to focus on the “business angle” of this scam and to avoid confusion with another unrelated scam.” reports the statement.
According to the statement, the illegal activities run at least in a two-month period (From 10/01/2013 to 12/01/2014) during which cyber criminals posing as suppliers or business partners of a targeted firm and requested funds transferred to a fraudulent account in order to process an invoice or other form of payment.
The Asian countries, China and Hong Kong above all, are the places where are located banks used as ending destination for these fraudulent transfers. The criminal crews behind the “Business Email Compromise” were asking fund transfers via an email or telephone call.
The official statistics regarding Business Email Compromise published by IC3 are reported below:
The fraud scheme is very simple, busy employees received a request to transfer funds by representatives of high management of their company.
It is clear that businesses and personnel using open source e-mail are most targeted by Business Email Compromise, in many cases the criminals spoofed e-mails of individuals within enterprises who are entitled to submit such payment requests.
Individuals responsible for handling wire transfers within a specific companies are privileged targets of criminals which compose well-worded e-mail requests for a wire transfer.
The attacker behind Business Email Compromise scams shows a deep knowledge of their victims, their requests are proportional to the economic capabilities of the target and of the specific individual used as the sender of the request. The criminals sent e-mails concurrently with business travel dates for executives whose e-mails were spoofed.
The statement reported three different versions of the Business Email Compromise based on complaints received since 2009:
A business, which often has a long standing relationship with a supplier, is asked to wire funds for invoice payment to an alternate, fraudulent account. This particular version has also been referred to as “The Bogus Invoice Scheme,” “The Supplier Swindle,” and “Invoice Modification Scheme.”
The e-mail accounts of high-level business executives (CFO, CTO, etc) are compromised. The account may be spoofed or hacked. A request for a wire transfer from the compromised account is made to a second employee within the company who is normally responsible for processing these requests. This particular version has also been referred to as “CEO Fraud,” “Business Executive Scam,” “Masquerading,” and “Financial Industry Wire Frauds.”
An employee of a business has his/her personal e-mail hacked. Requests for invoice payments to fraudster-controlled bank accounts are sent from this employee’s personal e-mail to multiple vendors identified from this employee’s contact list. The business may not become aware of the fraudulent requests until they are contacted by their vendors to follow up on the status of their invoice payment.
It is very important that business employees are informed about Business Email Compromise, I suggest you to carefully read the suggestions for protections reported in the online statement from the Internet Crime Complaint Center (IC3) and the FBI.
(Security Affairs – Business Email Compromise, cybercrime)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.