top of page

Sophisticated Email Fraudsters Targeting Businesses



Businesses are increasingly at threat from cyber attackers who are using sophisticated emails to extract money. Leading Dorset-headquartered cyber-security company C3IA Solutions said Business Email Compromise (BEC) is a fast-developing crime.


Those within companies who have the authorisation to handle or approve financial transactions are the usual targets. One method criminals use is to create an email that looks like it comes from a known contact and worded in a way that persuades the target to send money.


But with filters and security getting better, this type of attack is proving less effective, but a more malicious method is replacing it. This is when attackers compromise a legitimate email account or IT network of a supplier, contractor or business partner.


Tactics include waiting for a genuine email asking for payment to be sent to the target, then issuing a follow-up email from the same account saying the bank details have changed – and providing the hackers’ own.


The criminals are also utilising AI so they can replicate the type of wording used in genuine emails so their fraudulent ones sound right as well as look right.


Rory Griffin from C3IA Solutions, based in Poole, said:

“Government figures show that about half of all businesses have reported a cyber breach or attack, and BEC attacks make up a large number of them."

“The attacks using personalised, impersonation emails are becoming less and less likely to succeed because of better filters and security. But a compromised, legitimate and known email account would not be picked up by spam filters, and the recipient already trusts information from that account. This is what hackers are now using."


“And utilising AI means that even if the criminals are working from abroad and don’t speak English, they can accurately replicate wording that the recipient would recognise. Businesses are only responsible for the cyber security measures inside their own organisations, but it doesn’t mean they can’t speak to business partners to discuss mutual security."


“Collaborating with contacts and partners could prove a valuable alliance. It is worth finding out if partners use multi-factor authentication or two-step authentication across all their accounts. It is useful to decide upon an unwritten one-time codeword only to be used if the already-agreed and documented bank details are changed."


"Internal cyber security practices can also be improved, by such things as specialised training for the employees who handle or approve financial transactions. This could include things like following up a change in bank details with a telephone call, in order to prove it is genuine. Although not always practical, this would be an extra assurance step before transferring money out of the business."


“Not all protective measures need to be technical in nature; a renewed sense of understanding, gained through education and awareness activities, is sometimes all that is required to identify and thwart a potential cyber-attack.”

Most Read

Oodles Of Noodles: A Culinary Journey Through The World Of Noodles

Oodles Of Noodles: A Culinary Journey Through The World Of Noodles

Noodles, the beloved and versatile staple found in cuisines across the globe, have been captivating taste buds for centuries. From the...

Major Global Survey By STEP Reveals Attitudes To Wealth

Major Global Survey By STEP Reveals Attitudes To Wealth

STEP, the professional body for trust and estate practitioners, has today launched a major report Attitudes to Wealth – the first STEP...

Furniture Village To Open In Glasgow

Furniture Village To Open In Glasgow

Furniture Village is delighted to announce that it has recently exchanged contracts on its largest store to date, in a prominent location...

Categories



Businesses are increasingly at threat from cyber attackers who are using sophisticated emails to extract money. Leading Dorset-headquartered cyber-security company C3IA Solutions said Business Email Compromise (BEC) is a fast-developing crime.


Those within companies who have the authorisation to handle or approve financial transactions are the usual targets. One method criminals use is to create an email that looks like it comes from a known contact and worded in a way that persuades the target to send money.


But with filters and security getting better, this type of attack is proving less effective, but a more malicious method is replacing it. This is when attackers compromise a legitimate email account or IT network of a supplier, contractor or business partner.


Tactics include waiting for a genuine email asking for payment to be sent to the target, then issuing a follow-up email from the same account saying the bank details have changed – and providing the hackers’ own.


The criminals are also utilising AI so they can replicate the type of wording used in genuine emails so their fraudulent ones sound right as well as look right.


Rory Griffin from C3IA Solutions, based in Poole, said:

“Government figures show that about half of all businesses have reported a cyber breach or attack, and BEC attacks make up a large number of them."

“The attacks using personalised, impersonation emails are becoming less and less likely to succeed because of better filters and security. But a compromised, legitimate and known email account would not be picked up by spam filters, and the recipient already trusts information from that account. This is what hackers are now using."


“And utilising AI means that even if the criminals are working from abroad and don’t speak English, they can accurately replicate wording that the recipient would recognise. Businesses are only responsible for the cyber security measures inside their own organisations, but it doesn’t mean they can’t speak to business partners to discuss mutual security."


“Collaborating with contacts and partners could prove a valuable alliance. It is worth finding out if partners use multi-factor authentication or two-step authentication across all their accounts. It is useful to decide upon an unwritten one-time codeword only to be used if the already-agreed and documented bank details are changed."


"Internal cyber security practices can also be improved, by such things as specialised training for the employees who handle or approve financial transactions. This could include things like following up a change in bank details with a telephone call, in order to prove it is genuine. Although not always practical, this would be an extra assurance step before transferring money out of the business."


“Not all protective measures need to be technical in nature; a renewed sense of understanding, gained through education and awareness activities, is sometimes all that is required to identify and thwart a potential cyber-attack.”

Most Read

Oodles Of Noodles: A Culinary Journey Through The World Of Noodles

Oodles Of Noodles: A Culinary Journey Through The World Of Noodles

Noodles, the beloved and versatile staple found in cuisines across the globe, have been captivating taste buds for centuries. From the...

Major Global Survey By STEP Reveals Attitudes To Wealth

Major Global Survey By STEP Reveals Attitudes To Wealth

STEP, the professional body for trust and estate practitioners, has today launched a major report Attitudes to Wealth – the first STEP...

Furniture Village To Open In Glasgow

Furniture Village To Open In Glasgow

Furniture Village is delighted to announce that it has recently exchanged contracts on its largest store to date, in a prominent location...

Categories

The Delicate Dance Of Butterflies

The Delicate Dance Of Butterflies

There is something undeniably enchanting about the sight of a butterfly drifting lazily through a summer garden. With their delicate...

Notts Forest Fires Up Celebrations After Firm’s Donation

Notts Forest Fires Up Celebrations After Firm’s Donation

A Nottinghamshire outdoor activity centre that has been enjoyed by thousands of scouts for decades has received a welcome financial boost...

Central Foods Appoints New Sales Manager

Central Foods Appoints New Sales Manager

A new sales manager has been appointed by frozen food distributor Central Foods as part of the company’s expansion plans. Les Romney has...

Recent Posts

bottom of page