Imagine your employee receives an email from you instructing them to pay an outstanding vendor invoice. You’re traveling and don’t have time to go through the proper channels, but the employee is reliable, and the situation is urgent. Listed in your email are instructions to wire the funds and an account number.
The employee, recognizing the urgency of the situation, carries out your request expeditiously. Only there’s a problem: you never sent the email. A hacker spoofed your email address and tricked the employee into transferring funds to a fraudulent account. You’re a victim of business email compromise (BEC). A BEC scam like this one isn’t an imaginary threat, but a very real problem that exploits businesses like yours across the world.
According to a study by IBM and Ponemon Institute, BEC scams cost businesses on average $4.89 million (USD) globally in 2021, making it the second most expensive type of cyberattack. BEC attacks, also known as spear phishing, accounted for 6% of all data breaches during that period.
While BEC scams affect organizations of all types and sizes, small-to-midsized businesses (SMBs) and managed service providers (MSPs) are especially vulnerable. SMBs and MSPs lack the cybersecurity resources and teams of larger enterprises, making them a preferred target for hackers seeking a monetary reward. Nearly eight out of 10 SMBs rely on the basic email security offered by their email provider. This helps explain why, in the past 12 months, 69% of SMBs experienced a serious data breach that bypassed their email security.
In this article, we examine the threat of a BEC scam, the common techniques used by hackers, and the solutions needed to keep your organization safe from exploitation.
Unlike a phishing or malware attack, a BEC scam presents a different but equally dangerous cyberthreat. A BEC scam is a cyberthreat that uses email-based social engineering techniques to coerce victims into taking a desired action, often with financial implications.
BEC scams don’t impersonate brands like phishing emails, nor do they contain malicious links or attachments. They impersonate individuals known to the victim, use text-only threats, and often rely on research to carry out highly targeted attacks.
Example of spear-phishing email
Several factors contribute to the cost and devastation of a BEC scam, including:
As mentioned previously, several types of BEC scams exist, each taking a different approach to exploiting an individual or organization, including:
While several forms of BEC scams exist, all rely on a proven set of techniques to socially engineer an exploitation, including:
As we covered previously, a BEC scam is difficult to detect. Traditional email security solutions often fall short of defending against BEC attacks for three reasons.
To protect against a BEC scam, organizations should adopt the following prevention measures.
When receiving a suspicious email, such as an urgent request for a wire transfer, victims should contact the sender by alternative means to verify the email’s legitimacy. A phone call or text message can quickly reveal a fraudulent email, saving your organization, clients, or partners from a significant financial loss. While this prevention measure isn’t fail-proof, it provides a layer of protection and should be institutionalized in your policies and practices.
As with all cyberthreats, the greatest weakness in your organization’s attack surface is users. They’re also the last line of defense when it comes to stopping a BEC scam. That’s why you should invest in user awareness training that empowers them to spot and respond to BEC attacks in real-time.
Several types of user awareness training programs exist. For the best learning outcomes, you should look beyond generic simulations or classroom-based training offered at predetermined intervals. While these are among the most common education programs, they’re remotely connected to the experience of encountering an actual cyberthreat—in terms of content, context, and timing.
Instead, consider training that is personalized to reflect the content and context of each user’s regular email interactions and automatically self-administers whenever they encounter a real threat. This training reaches users at the time and in the format most conducive for learning, increasing the likelihood they adopt better cybersecurity behaviors and practices.
For example, Vade’s Threat Coach™ delivers on-the-fly education to users automatically when they open an email-borne threat, with learning that mimics their daily email experiences.
Organizations need email security solutions that offer predictive defense against a BEC scam and can detect the techniques used by hackers. That calls for technology that goes beyond the capabilities of basic email security tools that rely on reputation- and signature-based filters. Threat detection and response technology that leverages Artificial Intelligence (AI) provides organizations with the forward-looking and superior solution they need.
AI-threat detection and response solutions combine a core set of AI technologies and features to prevent exploitation from a BEC scam, including:
AI has become one of the most promising fields across all industries. When it comes to cybersecurity, it has also become a buzzword used to market products, regardless of their true capabilities. To ensure your organization adopts a true AI-powered cybersecurity solution, look for products that possess the previous features and capabilities.
For example, Vade for M365 leverages Machine Learning, Natural Language Processing, and Computer Vision to detect and respond to all email-borne threats, known or unknown. The API-based solution also continually uses real-time threat intelligence from more than 1.4 billion mailboxes globally to enhance the precision and accuracy of its detection and response capabilities.
As a financially driven exploit, a BEC scam is among the costliest cyberthreats against organizations. Each year, a shocking number of businesses fall victim to this highly targeted and deceptive threat. But while the abundance of victims highlights the unfortunate reality of BEC schemes, your organization can avoid joining the alarming total. By adopting the prevention measures explored in this article, you can keep your organization, employees, clients, and partners protected.