Skip to main content

A new phishing scam pretends to be your boss sending you an email

One of the latest email scams is a simple yet masterful ploy that gets companies to give up money under the guise of communicating with senior members of an organization within an email chain.

As reported by ZDNet, the scam is called a business email compromise (BEC) campaign and is described as a prompt where a nefarious actor, disguised as a company boss, sends an email that looks like a forwarded email chain, with instructions to an employee to send money. Targets of this type of scam are typically employees in the finance department or someone who has the ability to send wire transfers.

Related Videos

TechRadar noted that the email chains are fake but appear authentic enough that victims typically do not question that they are not from a higher-up employee.

Many people have become accustomed to more traditional email attacks, such as viruses, malware, or malicious links, which can often be avoided by not clicking links, opening emails, or downloading attachments. However, BEC campaigns are typically just text emails and don’t have these markers that would make them stand out as coming from a nefarious entity. They also aren’t automatically filtered out as spam.

While there remain more common types of email attacks, such as ransomware, BEC campaigns are a steadily growing threat. According to the FBI, incidents of BEC attacks grew by almost two-thirds (65%) between July 2019 and December 2021, and the practice itself has drawn in approximately $43 billion. According to the Internet Crime Complaint Center (IC3), the reach of BEC scam is comparable to the global tuna industry and the global used-clothes industry.

The AI-based cloud-native email security platform Abnormal Security believes the latest BEC scam originated in Turkey from a bad actor known as Cobalt Terrapin, with the first attacks beginning in July 2022.

Scams such as BEC are not the only way that bad actors are bypassing the usual methods of cybercrime. “Cookie stealing” has also become one of the latest trends that hackers use to bypass credentials and access private databases.

One such attack involved a government-backed group known as Charming Kitten that was able to infiltrate the Gmail, Yahoo, and Outlook inboxes of at least two dozen high-profile users and download their content, using similar cookie-stealing tactics. The group developed a hacking tool called Hyperscape, which it used to bypass security measures such as multifactor authentication to access private email databases.

Editors' Recommendations

This new malware is targeting Facebook accounts – make sure yours is safe
Facebook logo appears with a hooded figure over a cracked blue background.

In the ongoing barrage of cyberattacks, Facebook users are being targeted by a new version of the Ducktail malware that originally surfaced in July. The first implementation was specifically aimed at Facebook Business accounts, but it has recently become a more widespread danger.

The latest version of Ducktail collects any and all Facebook data available on an infected computer. If it happens to be a business account, payment methods could be discovered, putting your money at risk. Furthermore, Facebook Business data might include billing information and cycles, which could be used to help disguise unauthorized purchases.

Read more
New COVID-19 phishing emails may steal your business secrets
Woman Checking Her Email

Google Forms are being used as a way to obtain the sensitive information of business owners through COVID-19 phishing emails, according to a new report.

As reported by Bleeping Computer, phishing messages based on COVID-19 have started to become increasingly popular in recent weeks.

Read more
This dangerous new hacker tool makes phishing worryingly easy
Computer user touching on Microsoft word icon to open the program.

Setting up phishing campaigns for Microsoft 365 has become a relatively straightforward process due to a phishing-as-a-service (PhaaS) platform named Caffeine.

As reported by Bleeping Computer, the service offers a way for cybercriminals to target individuals in order to obtain access to their Microsoft 365 accounts.

Read more