• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   BEC

How HTML Attachments and Phishing Are Used In BEC Attacks

  • Posted on:July 27, 2017 at 7:00 am
  • Posted in:Social, Targeted Attacks
  • Author:
    Lord Alfred Remorin (Senior Threat Researcher)
0

Traditionally, BEC attacks have used keyloggers to steal saved account information from target machines. However, using an executable file for the attachment usually flags a user not to click them as there is a high chance that the file is malicious. As a result, we’ve seen a trend wherein the attached files are no longer executable files but HTML pages.

Read More
Tags: BECHTML attachmentsphishing

CEO Fraud Email Scams Target Healthcare Institutions

  • Posted on:November 23, 2016 at 8:00 am
  • Posted in:Malware, Targeted Attacks
  • Author:
    Ryan Flores (Threat Research Manager)
0

A series of Business Email Compromise (BEC) campaigns that used CEO fraud schemes was seen targeting 17 healthcare institutions in the US, ten in the UK, and eight in Canada over the past two weeks. These institutions range from general hospitals and teaching hospitals to specialty care and walk-in clinics. Even pharmaceutical companies were not safe from the BEC scams, as one UK-based company and two Canadian pharma companies were also targeted.

Read More
Tags: BECbusiness email compromiseCEO fraud

Ransomware and Business Email Compromise (BEC) Lead Year of Online Extortion

  • Posted on:August 23, 2016 at 5:15 am
  • Posted in:Malware, Ransomware, Social, Targeted Attacks
  • Author:
    Trend Micro
0

Emails have become the battleground for the first half of the year in terms of security. It is the number one infection vector that have ushered in 2016’s biggest threats so far—ransomware and business email compromise (BEC). Ransomware infections normally start via email. Based on our findings, 71% of the known ransomware families’ delivery method is through spam.

Looking at the threat trends so far, both ransomware and BEC have proved profitable across the world. This echoes our prediction that 2016 would be the Year of Online Extortion. Ransomware continues to threaten business-critical data and cost organization thousands of dollars in losses; BEC scams bank on social engineering lures that lead even companies’ top decision-makers to transfer huge sums of money—totaling to over US$3 billion in estimated losses.

Read More
Tags: 1H 2016 security roundupBECbusiness email compromiseexploit kitsspam mails

INTERPOL Arrests Business Email Compromise Scam Mastermind

  • Posted on:August 1, 2016 at 3:54 am
  • Posted in:Social, Targeted Attacks
  • Author:
    Trend Micro Forward-Looking Threat Research Team
0

Business Email Compromise (BEC) attacks have proven to be an effective tactic, with criminals stealing large amounts of money from various businesses. From 2013 to 2015, BEC-related damages were estimated at US$ 2.3 billion. Targeting C-level executives has proven to be a very successful tactic, with multiple companies falling victim to this kind of scam.

The operators behind these scams operate from countries where they believe they are safe from law enforcement. Bringing down these syndicates is no easy task: law enforcement agencies and researchers need to work across borders, with differing laws coming into play.

Read More
Tags: arrestsBECbusiness email compromiseInterpol

Company CFOs Targeted The Most By BEC Schemes

  • Posted on:June 9, 2016 at 5:00 am
  • Posted in:Social, Targeted Attacks
  • Author:
    Ryan Flores (Threat Research Manager)
0

It should not come as a surprise that company executives (particularly the CEO and President) and other revered high-level employees get to be impersonated often for criminal reasons. How can you say no when it’s the CEO asking? How can you not comply when it’s already the President specifically requesting? Gone are the days of the telltale signs of an email scam: glaring grammatical errors and outlandish stories about lottery winnings or royalty riches. Today, Business Email Compromise (BEC) scammers use this regard of authority to target internal employees who may deal with and handle the finance of the company: the Chief Financial Officers (CFOs).

Read More
Tags: BECbusiness email compromiseCEO fraudemail fraud
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.