Tuesday, January 31, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

UK-Based Threat Actors Impersonate Global Law Firms in BEC Attacks

Researcher by Researcher
November 5, 2022
in Cybersecurity
0
Chinese Threat Actor Uses Ransomware as a ‘Smokescreen’ For Espionage
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Researchers have identified a new business email compromise (BEC) group that has been impersonating legitimate attorneys, law firms and debt recovery services in order to trick accounting employees into paying fake invoices.

The group, which researchers with Abnormal Security call Crimson Kingsnake, targets companies across different sectors in the U.S., Europe, the Middle East and Australia. Researchers said that since March, they have identified 92 domains linked to Crimson Kingsnake that have mimicked the domains of 19 law firms and debt collection agencies – including major global practices like Deloitte or Sulllivan & Cromwell – in the U.S., UK and Australia.

Crane Hassold, director of threat intelligence at Abnormal Security, said that researchers were able to link multiple non-proxy IP addresses to members of the group that would indicate that at least some of the actors are based in the UK.

“While Nigeria is still the main epicenter for BEC actors – about 65 percent of actors we’ve conducted active defense engagements with this year have been based in Nigeria – we’ve starting seeing a slow emergence of actors in other countries, such as South Africa, the United Arab Emirates, Turkey, and the United Kingdom,” said Hassold.

BEC continues to cost businesses millions of dollars, with the Internet Crime Complaint Center (IC3) showing that BEC (and email account compromise) victims reported nearly $2.4 billion in losses in 2021, and a recent Abnormal Security report highlighting that BEC attacks increased by 84 percent over the previous six months in the first half of 2022. The profitability of these types of attacks stem from a number of tactics that rely on social engineering and emotional manipulation, in order to foster a level of urgency with victims.

“Scammers behind blind impersonation attacks are relying on the hope that, like so many other types of social engineering attacks, a target isn’t paying close attention to the email and simply complies with the request.”

Crimson Kingsnake attackers first send an email impersonating real-life attorneys with legitimate law firms, and reference an overdue payment purportedly owed by the target to the firm that they represent. The BEC group uses email spoofing – leveraging email addresses hosted on domains that resemble these firms’ true domains – to add legitimacy to the scam. Once a victim responds, the actor replies with payment account details in a PDF invoice, which includes a bill number, bank account details and the company’s actual VAT ID. Researchers said the BEC group may even be using altered versions of legitimate invoices used by the impersonated firms.

If they face any resistance from the target, the BEC actors also have been observed impersonating an executive at the targeted company (under a new email with a spoofed display name) in order to put further pressure on the victim. Through this fake persona, the attackers “authorize” the employee to proceed with the payment.

“This additional step shows the lengths that this BEC group is willing to go to in order to receive payment,” said Hassold. “And it clearly pays off, as even one successful attack each day provides Crimson Kingsnake with tens of thousands of dollars.”

The impersonation of third-party companies – rather than the more traditional BEC method of impersonating executives within a victim’s organization – has rapidly increased over the years, and Hassold said that more than half of all BEC attacks observed in the first part of 2022 impersonated third parties.

“Unlike other forms of financial supply chain compromise, blind third-party impersonation attacks have no direct insight into vendor-customer relationships or financial transactions and instead rely on the effectiveness of pure social engineering to be successful,” said Hassold. “Scammers behind blind impersonation attacks are relying on the hope that, like so many other types of social engineering attacks, a target isn’t paying close attention to the email and simply complies with the request.”



Source link

Related articles

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
Tags: ActorsAttacksBECFirmsGlobalimpersonateLawThreatUKBased
Share76Tweet47

Related Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
0

VMware has released updates for a group of four vulnerabilities in its vRealize Log Insight logging platform, three of which...

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
0

There are many organizations moving to the cloud every day. Some are developing software at a fast pace, some are...

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

January 30, 2023
0

On Friday, January 20, 2023, Google announced it would lay off 12,000 employees. Amazon and Microsoft have laid off a...

How IT Budgets Should Fill Cybersecurity Moats in 2023

How IT Budgets Should Fill Cybersecurity Moats in 2023

January 30, 2023
0

TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity —...

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

January 30, 2023
0

Today, data is considered the new oil and rightly so because the amount and type of data collected on people...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023

Recent Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved