CCG Insights

Common Theme Unites Successful Business Phishing Attacks

  • Insight

Common Theme Unites Successful Business Phishing Attacks

Data Use Raises Creep Awareness When ‘Touching’ Customers

Common Theme Unites Successful Business Phishing AttacksOne common theme unites the most successful phishing attacks over the last year- identity deception, according to an Agari report. Opportunistic cybercriminals are tapping into the wealth of personal and behavioral data available online and using this information to spoof the identity of a trusted person or brand.

At the start of 2016, the FBI warned that it had seen a 270% increase in CEO scams in 2015. That trend continued this year. Within enterprises, scammers are convincing their victims to give away confidential information or transfer money into a fraudulent bank account by posing as a trusted business executive, often using highly targeted emails or social media messages.

Alternatively, they are looking to spread malware and compromise IT environments by tricking recipients into opening an email attachment or clicking on a link to a corrupted web page.

Agari revealed fraudsters more and more are targeting specific individuals with sophisticated spoofs pretending to be from banks, government departments, and major brands. Often the emails have ‘Attention’, ‘Important Notification’ or ‘Your account has been revoked’ in the subject line and the growing reliance on email means it’s becoming increasingly tricky for consumers to differentiate between fake and real communication.

Once the phisher has successfully exploited someone’s trust by posing as a senior business executive or gained access to a victim’s computing device, they have unlimited access. The attacker has a numerous methods to commit fraud, install malware, seek out privileged access accounts, or obtain confidential information and valuable data.

For example, once cybercriminal harvest personal information and learn the company processes, they can target carefully selected employees with a spear phishing email designed to get access to confidential business information or transfer money into an unknown account.

Companies that have recently fallen victim to this kind of criminal fraud include:

  • Ubiquiti Networks – finance department received a fraudulent request from an impersonated employee that resulted in $46.7 million transferred to an overseas account held by external third parties.
  • Mattel – a finance executive wired more than $3 million to the Bank of Wenzhou after the ‘new CEO’ requested a vendor payment. According to reports, Mattel quickly realized that it had been victim of a fraudulent request and worked with Chinese authorities to retrieve the money back.

In recent months, most ransomware arrives via attachments in emails. Ransomware’s efficiency hinges on two factors: tricking people into clicking on malicious content and banking on them not having advanced threat protection.

On both the enterprise and consumer side, ransomware is becoming a steadily growing form of malware that effectively holds a user’s device or files at electronic gunpoint. Ransomware infects a machine and renders it unusable until the infected user pays the ransom to either unlock the computer or decrypt the data. Levels of attacks can vary and often it uses scare tactics, deadlines and intimidation to trick victims into paying up.

To counter the threat of this attack, organizations must introduce policies that ensure that no one person or single email can authorize transactions. Instead, there needs to be a mixture of communication channels verifying any request for confidential or financial information.

  • Paul Schaus - Chief Executive Officer Paul Schaus - Chief Executive Officer
  • August 23, 2016
  • Cybersecurity, phishing

You Might Like These, Too

Tech Tuesday

Tech Tuesday: Ethical AI in Financial Services

The Shifting World of E-commerce
Tech Tuesday

Tech Tuesday: The Shifting World of E-Commerce

Presentation

Beyond Strategy to Execution: Business Customer Profitability and Pricing

Webcast

The 101 of Bank Integration Strategy

Leaders in Bank Consulting

About CCG Catalyst
Latest Insights
CCG

PHOENIX • NEW YORK • LONDON • SINGAPORE

Phone: +1-480-744-2240  • Contact Us

© 2021 CCG CATALYST CONSULTING. Privacy Policy & Terms of Service.
Request a Call Back
Linkedin
Twitter
Subscribe
for Insights
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT
BANK
FINTECH
FUSION
  • About
  • Services
  • Insights
  • Fintech
  • Research
  • Contact
  • Press
  • Careers
  • Events
  • Terms
  • Privacy
Linkedin
Twitter