BEC attacks up by 45%, use spoofed email domains to trick victims: Proofpoint
Proofpoint, a leading security and compliance company released a new report. A 45 % increase in Business email compromise (BEC) attacks during the last months of 2016. More than 45,000 companies reported at least one incident of a BEC attack. Attackers are using more and more sophisticated ways to attack a larger area of companies.
During the months of July to December 2016 the manufacturing, retail and technology industries were prone to more attacks as the attackers took advantage of more supply chains and SaaS infrastructure of the targeted companies. Companies of all sizes were prone to these attacks.
“ Seventy-five percent of our customers were hit with at least one attempted BEC attack in the last three months of 2016&mdash and it only takes one to cause significant damage,” said Ryan Kalember, senior vice president of Cybersecurity Strategy for Proofpoint.
The attackers also upped their sophistication of the attacks by creating an email domain to spoof the targeted personnel of the company using a familiar name, thus making the email look more realistic and make to act the personnel with so much as a second thought. This process is done not only to senior executives of the company but also the personnel in accounts department, to wire money and confidential tax information and also identity theft.
This spoof can be found out in the subject line of the email proofpoint found the subject mail contains words like urgent (30%), payment (21%), and request (21%) often to deeper personnel of the targeted organization.
The size of the target is also considered because larger organizations were less likely to fall due to their cyber security, but it is the opposite for smaller organizations.