Phishing scam pretends to be your boss sending you an email

Phishing scam pretends to be your boss sending you an email

Phishing scam pretends to be your boss sending you an email Digital Trends

A new phishing scam pretends to be your boss sending you an email

October 5, 2022 Share , the scam is called a business email compromise (BEC) campaign and is described as a prompt where a nefarious actor, disguised as a company boss, sends an email that looks like a forwarded email chain, with instructions to an employee to send money. Targets of this type of scam are typically employees in the finance department or someone who has the ability to send wire transfers. noted that the email chains are fake but appear authentic enough that victims typically do not question that they are not from a higher-up employee. Many people have become accustomed to more traditional email attacks, such as viruses, malware, or malicious links, which can often be avoided by not clicking links, opening emails, or downloading attachments. However, BEC campaigns are typically just text emails and don’t have these markers that would make them stand out as coming from a nefarious entity. They also aren’t automatically filtered out as spam. While there remain more common types of email attacks, such as ransomware, BEC campaigns are a steadily growing threat. According to the FBI, incidents of BEC attacks grew by almost two-thirds (65%) between July 2019 and December 2021, and the practice itself has drawn in approximately $43 billion. According to the Internet Crime Complaint Center (IC3), the reach of BEC scam is comparable to the global tuna industry and the global used-clothes industry. The AI-based cloud-native email security platform Abnormal Security believes the latest BEC scam originated in Turkey from a bad actor known as Cobalt Terrapin, with the first attacks beginning in July 2022. Scams such as BEC are not the only way that bad actors are bypassing the usual methods of cybercrime. “Cookie stealing” has also become one of that hackers use to bypass credentials and access private databases. involved a government-backed group known as Charming Kitten that was able to infiltrate the Gmail, Yahoo, and Outlook inboxes of at least two dozen high-profile users and download their content, using similar cookie-stealing tactics. The group developed a hacking tool called Hyperscape, which it used to bypass security measures such as multifactor authentication to access private email databases.

Editors' Recommendations

Portland New York Chicago Detroit Los Angeles Toronto Digital Trends Media Group may earn a commission when you buy through links on our sites. ©2022 , a Designtechnica Company. All rights reserved.
Share:
0 comments

Comments (0)

Leave a Comment

Minimum 10 characters required

* All fields are required. Comments are moderated before appearing.

No comments yet. Be the first to comment!