BEC Attacks Cost Businesses $1.8B in 2019

According to the FBI’s 2019 Internet Crime Report, Business Email Compromise (BEC) attacks cost businesses $1.8B, with 94% of all data breaches originating from phishing attacks. Modern BEC attacks are becoming not only more common, but also more successful. The improved effectiveness of these attacks stems from hackers creating elaborate campaigns that cover tracks and evade signs of detection. To improve the success rate of their campaigns, cybercriminals are meticulously researching their target, its supply chains and users, leveraging company news and events, and tracking social media channels.

Although these attacks are a global threat across all industries, the financial sector is typically a primary target. According to the American International Group (AIG), BEC attacks are the top cause of cyber claims with the financial services industry accounting for 15% of all claims made in 2018. Whether they are the main target of the attack or a means to a target, banks are often pursued due to the large volume of phishing attempts they receive and numerous high-value transactions.

Criminals in general are typically interested in where the money is. Cyber criminals are no different. Instead of having to physically break into a bank like an old Hollywood style robbery movie, we are seeing an increase in cyber heists where the criminal does not have to physically break into a property to take any money away. This makes these heists much “safer” for the criminals and can be far more lucrative, as they are not only taking what is available at present.

Cybercriminals are often heavily armed with rich information about their targeted organisation and its supply chain. Taking a note that the vast majority of data breaches have originated from a BEC attack, it is not surprising that adversaries are crafting highly credible, targeted emails that are virtually indistinguishable from those sent by colleagues, clients, and suppliers we are communicating with on a daily basis.

As phishing attacks become more complex and sophisticated, it becomes harder for users to identify one when it lands in their inbox. Financial institutions, as well as businesses from all other industries, should be ensuring their brand, clients, supply chain, and internal users are protected against BEC attacks by reinforcing their email security posture. 

At Red Sift, we help our clients protect assets outside of their network by supporting them to implement the DMARC protocol. By closing the gap between what is provided by traditional email gateways and user awareness training, we empower users to quickly identify malicious emails and help to protect a company’s email domain. 

Click below to check your current email security hygiene.

PUBLISHED BY

Red Sift

19 Mar. 2020

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
AI

Red Sift’s AI Agent, Part III: Performance in action

Phong Nguyen

This is the third article in our AI Agent series. In Part 1, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent solution for handling the ambiguous cases that rule-based automation can’t confidently resolve, offering analyst-grade triage autonomously. In Part 2, we took readers behind the scenes to explore the engineering…

Read more
Finance

41% of top Fintech companies are vulnerable to email phishing

Jack Lilley

Only 26% of leading Fintechs enforce DMARC at p=reject, the strongest protection against spoofing by bad actors. Phishing remains a top driver of breaches and fraud. Financial services are a prime target because email moves money, resets passwords, and confirms identity. Verizon’s 2025 Data Breach Investigations Report again lists social engineering and phishing among…

Read more
Certificates

New in Certificates Lite: Active certificate scanning and smarter expiry alerts

Francesca Rünger-Field

A quick recap Earlier this year, we launched Red Sift Certificates Lite, the free TLS certificate expiration monitoring service recommended by Let’s Encrypt. Since launch, thousands of organizations have adopted it to track their certificates and avoid expiry-related outages. What we heard from customers At launch, we had adopted Let’s Encrypt’s approach for consistency…

Read more
AI

Red Sift’s AI Agent, Part II: Optimization for accuracy and scale

Phong Nguyen

In our previous blog post, we introduced Red Sift’s AI Agent for lookalike classification – an intelligent system that determines whether a suspicious domain has been deliberately crafted to mimic a legitimate one or if the resemblance is merely coincidental. That post focused on the what and why of the solution: why rule-based automation…

Read more