Fraud remains a concern for business leaders, as the prevalence of cyberattacks continues to escalate. As businesses enhance their strategies, cybercriminals are equally enhancing their tactics, aiming to outwit established safeguards. This trend has led to businesses shouldering more of the responsibility to combat cybercrime.
Phishing is a form of social engineering or scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing usually involves an attacker impersonating someone you know using a platform that you trust. Phishing most frequently comes in the form of an email, a business email compromise (BEC) attack, from individuals outside the organization. Treasury and accounting staff discover the majority of payments fraud.
The FBI reports that BEC complaints between 2022 and 2024 resulted in close to $2.8 billion in reported losses.
BEC is a sophisticated scam compromising legitimate email accounts, typically to fraudulently obtain funds, sensitive data, or intellectual property.
Spam filters defend us from a raft of suspicious emails, but occasionally a malicious email can sneak into our inbox sent from a hacked or impersonated account. A BEC can be challenging to detect and, as one of the most financially damaging cybercrimes, costly to resolve. Fortunately, security precautions and employee training can help prevent these crimes.
Vishing, short for “voice phishing,” is a type of fraud attempt over the phone, often using the same interactive voice response (IVR) technology used by financial institutions. Attackers typically send a message disguised as coming from a bank, government institution, or another trustworthy entity requesting a callback. The callback number pushes the victim to the attacker’s IVR technology, which prompts them to enter their account information and/or PIN, putting their sensitive information in the hands of the cybercriminal.
Smishing is a fraud attempt using text messages to trick victims into clicking malicious links. “Smishing,” a clever portmanteau combining “SMS” (aka “texting”) and “phishing,” falls in the phishing category of scams. Victims receive text messages with malicious links that can download malware or redirect recipients to illegitimate websites that request sensitive information. Like BEC, smishing can wreak havoc for your business, but proactive measures can help prevent attacks.
With “clone phishing,” a fraudster replicates a previous message between an employer and employee with one key difference — the cloned email includes an attachment embedded with malware.
Because the sender’s email address and the style and substance of the email text match the original message, recipients have no reason to doubt the legitimacy. So, they’re more likely to fall for the attacker’s trap and click on the malicious attachment.
Unlike regular phishing, which casts a wide net, spear phishing zeroes in on a specific organization or group of entities, e.g., a government agent from one country targeting another country to learn sensitive intel.
Attackers research their victims and tailor their messages accordingly so the bait appears more credible.
Like phishing, whaling uses email and website spoofing to trick individuals — but with an added social engineering element. Masquerading as influential leaders in an organization, attackers target other key individuals, like the CEO or finance manager, in hopes of gaining access to computer systems or stealing money or sensitive data. The tactic presumes staff are more likely to divulge information or follow along when the request comes from another “big fish” or “whale” in the organization.
Coach employees to trust but verify emails
Be vigilant, and encourage employees with company-owned devices to do the same
Opt to take the conversation offline
Keeping up with the fast pace of emerging cyber fraud can feel overwhelming, but the right tools, tactics, and actions can help keep you in control. Webster is here with the guidance, products, and expertise to help protect your business against the risks of cyberattacks.
Source: https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf
The opinions and views herein are for informational purposes only and are not intended to provide specific advice or recommendations. Please consult professional advisors with regard to your situation.