One of the latest email scams is a simple yet masterful ploy that gets companies to give up money under the guise of communicating with senior members of an organization within an email chain.
As reported by ZDNet, the scam is called a business email compromise (BEC) campaign and is described as a prompt where a nefarious actor, disguised as a company boss, sends an email that looks like a forwarded email chain, with instructions to an employee to send money. Targets of this type of scam are typically employees in the finance department or someone who has the ability to send wire transfers.
TechRadar noted that the email chains are fake but appear authentic enough that victims typically do not question that they are not from a higher-up employee.
Many people have become accustomed to more traditional email attacks, such as viruses, malware, or malicious links, which can often be avoided by not clicking links, opening emails, or downloading attachments. However, BEC campaigns are typically just text emails and don’t have these markers that would make them stand out as coming from a nefarious entity. They also aren’t automatically filtered out as spam.
While there remain more common types of email attacks, such as ransomware, BEC campaigns are a steadily growing threat. According to the FBI, incidents of BEC attacks grew by almost two-thirds (65%) between July 2019 and December 2021, and the practice itself has drawn in approximately $43 billion. According to the Internet Crime Complaint Center (IC3), the reach of BEC scam is comparable to the global tuna industry and the global used-clothes industry.
The AI-based cloud-native email security platform Abnormal Security believes the latest BEC scam originated in Turkey from a bad actor known as Cobalt Terrapin, with the first attacks beginning in July 2022.
Scams such as BEC are not the only way that bad actors are bypassing the usual methods of cybercrime. “Cookie stealing” has also become one of the latest trends that hackers use to bypass credentials and access private databases.
One such attack involved a government-backed group known as Charming Kitten that was able to infiltrate the Gmail, Yahoo, and Outlook inboxes of at least two dozen high-profile users and download their content, using similar cookie-stealing tactics. The group developed a hacking tool called Hyperscape, which it used to bypass security measures such as multifactor authentication to access private email databases.
- This dangerous new Mac malware steals your credit card info
- How your boss can spy on you with Slack, Zoom, and Teams
- If you have a Gigabyte motherboard, your PC might stealthily download malware
- Microsoft just gave you a new way to stay safe from viruses
- Your Windows 11 screenshots may not be as private as you thought