BEC is a sophisticated type of attack that targets organizations through email. Attackers impersonate trusted individuals within your company, like executives, vendors, or colleagues, to manipulate employees into actions that benefit the attacker. BEC is one of the most prominent attack vectors around today, and it continues to increase year-over-year.
The facts on BEC:
BEC attack frequency doubled in 2023, and it is expected to increase again this year, largely due to the massive ROI it promises cybercriminals. According to FBI data, the average cost of a successful business email compromise attack is more than $125,000.
Organizations need to be prepared with a high level of security awareness and strong security programs to defend against this pervasive threat. In this blog, we’ll explore more about how BEC attacks work and how you can implement best practices to ensure your organization is safe.
BEC attacks utilize a complex web of social engineering and impersonation to achieve their goals. Here's a breakdown of how they typically work:
Phase one: research and planning
Phase two: impersonation and manipulation
Phase three: execution and exploitation
BEC attacks are constantly evolving, so staying informed and implementing security measures like multi-factor authentication, employee training, and email verification protocols are crucial for protecting your organization.
Recent BEC attacks:
Both BEC and phishing attacks involve email deception aiming to steal money or information, but they have key differences:
Target:
Method:
Complexity:
Impact:
BEC attacks can have devasting impacts to an organization, but proactive measures will strengthen your defenses and make your company much harder to target. A few ways to protect against BEC include:
1. Cultivate a security-first culture
Employees are your first line of defense against BEC attacks, which is why it’s critical that they’re trained to identify common red flags in emails like spoofed email addresses, urgency tactics, and requests for sensitive information. Regularly test employees with simulated phishing attacks to reinforce training and identify areas needing improvement.
2. Be proactive
Regularly review and update security measures, including employee training, technology solutions, and incident response plans, to stay ahead of evolving attack tactics.
3. Prioritize strong security
Consider implementing Security Information and Event Management (SIEM) and Managed Detection and Response (MDR) solutions to gain broader visibility into network activity and potential threats, allowing for faster detection and response to BEC attempts.
Multi-factor authentication (MFA) on all accounts is also critical, adding an extra layer of security beyond passwords. This process makes it harder for attackers to gain access, even if they obtain login credentials.
BEC attacks are more prevalent than ever, which is why it’s crucial that companies implement strong security programs to combat threat actor’s evolving techniques.
Todyl’s SIEM identifies suspicious activity on systems, apps, and infrastructure such as unusual login attempts and impossible travel. This also alerts our Managed eXtended Detection and Response (MXDR) team, allowing them to further investigate potential BEC attempts.
The MXDR team distinguishes genuine threats from false positives and recommends appropriate action such as disabling compromised accounts. This combined approach improves the chances of identifying and stopping BEC attacks before significant damage occurs.
Read how Todyl’s MXDR team jumped in to help a partner after they fell victim to a BEC attack.