• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » FBI Warns Hackers are Targeting Businesses Using Cloud Email Services

FBI Warns Hackers are Targeting Businesses Using Cloud Email Services

2020-04-07 by Max

FBI BEC Scams

FBI Warns Business Email Compromise Scams Losses Have Increased Every Year

The US Federal Bureau of Investigation (FBI) Internet Crime Complaint Center (IC3) issued a PSA warning business that hackers are targeting cloud-based email services to steal money from the businesses that use them. Cyberattacks of this nature are known as Business Email Compromise (BEC) scams and accounted for $2.1 billion in reported losses between January 2014 and October 2019.

BEC scams often use a targeted phish kit, or spoofed backend, designed to look and function like the cloud-based email service. The targeted employee is tricked into giving up login credentials that leads to compromised business email accounts. The email account is scanned to look for evidence of financial transactions. In the end, the hacked email account is used to request or misdirect transfers of funds.

Cloud-based email services, like Microsoft Office 365, Amazon WorkMail, and Google G Suite, provide email service as well as shared calendars, file storage, and team messaging apps as subscription services. Some cloud-based services may also provide cyber security features like email phishing protection and two-factor or multi-factor authentication. Some of these features must be enabled by account administrators. Some cloud-based business email services charge more for these security features while others may provide these for no additional cost. These security features can help prevent BEC scams.

What are BEC Scams?

A Business Email Compromise occurs when a hacker gains access to a legitimate business email account and uses it to initiate or redirect an unauthorized money transfer to a bank account the hacker can access. The email accounts are often compromised using social engineering with information taken from corporate websites, press releases, or social media. BEC scams can also use information from malware attacks like infostealers and spyware.

Criminals impersonate email communications between compromised businesses, employees, business partners or third parties, such as vendors or customers. Businesses that routinely process electronic payments like wire transfers are typical targets of BEC scams.

In March 2020, the bookkeeper for Shark Tank host Barbara Corcoran was fooled into paying a fraudulent invoice. The malicious email appeared to come from Corcoran’s assistant and asked for payment for a real estate related transaction. This made sense for Corcoran’s line of work. But the nature of the email contained information that is easily gleaned from the internet especially when a high-profile person is targeted.

The creditor details were closely named for a German company Corcoran actually does business with. So, the bookkeeper paid it without verifying the email sender or the company requesting payment. Fortunately, they realized the error and with the cooperation of a German bank, the $388,700 wire transfer was recovered.

“Losses from BEC scams overall have increased every year since IC3 began tracking the scam in 2013. BEC scams have been reported in all 50 states and in 177 countries. Small and medium-size organizations, or those with limited IT resources, are most vulnerable to BEC scams because of the costs of robust cyber defense.” the FBI said in the PSA.

Recommendations for Cloud Email Users
It is important to protect account login credentials. Often humans are the weakest link in online account security. System administrators should enable alerts to warn them about suspicious activity, such as foreign logins.

  • Use two-factor authentication (2FA) on all email accounts. If available, enable multi-factor authentication
  • Verify all payments in person or by calling the payment recipient using a known telephone number. Do not use the phone number the creditor supplies
  • Train employees to recognize online scams including BEC scams
  • Teach employees about how to recognize and report phishing emails
  • Educate employees on how to respond to suspected account compromises
  • Establish protocols for help desk employees to follow when responding to requests for resetting passwords or account login credentials
  • System Administrators should not allow users to forward emails to external email addresses
  • Email filtering polices should be set up to block suspected phishing emails and certain types of email attachments
  • Email protocols, such as POP, IMAP, and SMTP should not be allowed

If reported within 24 hours, unauthorized wire transfers can often be recalled by your financial institution.

Filed Under: News

About Max

Max is a Data Privacy Coordinator at a major global law firm and a science fiction author residing in the Philadelphia area. He has been writing for https://www.askcybersecurity.com since early 2017.


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version