{"id":23209,"date":"2025-07-03T10:53:37","date_gmt":"2025-07-03T09:53:37","guid":{"rendered":"https:\/\/rosoft.si\/?p=23209"},"modified":"2025-07-03T10:53:59","modified_gmt":"2025-07-03T09:53:59","slug":"abuses-of-business-email-bec-business-email-compromise","status":"publish","type":"post","link":"https:\/\/rosoft.si\/en\/abuses-of-business-email-bec-business-email-compromise\/","title":{"rendered":"Abuses of Business Email (BEC &#8211; Business Email Compromise)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"23209\" class=\"elementor elementor-23209\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f337e07 e-flex e-con-boxed e-con e-parent\" data-id=\"1f337e07\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-650c28af elementor-widget elementor-widget-text-editor\" data-id=\"650c28af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"MsoNormal\"><span style=\"color: #000000;\"><b>Abuses of Business Email<\/b><\/span><\/h2>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">Online attacks with <\/span><span style=\"color: #000000;\">fake data (in the context of email abuse) have become a significant problem, <\/span><span style=\"color: #000000;\">affecting both individuals and organizations. Cyber attackers exploit these&nbsp;<\/span><span style=\"color: #000000;\">attacks to impersonate trusted sources, convincing victims to disclose&nbsp;<\/span><span style=\"color: #000000;\">sensitive information or fall for malicious schemes. Recently, there has been&nbsp;<\/span><span style=\"color: #000000;\">an increase in breaches of corporate email systems, infiltrating business&nbsp;<\/span><span style=\"color: #000000;\">communications and directly causing financial harm to companies that fall&nbsp;<\/span><span style=\"color: #000000;\">victim to such abuses.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><b>Example of infiltrating business communication (BEC &#8211; Business Email Compromise)<\/b><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">At a crucial moment&nbsp;<\/span><span style=\"color: #000000;\">during a sale, cyber attackers infiltrate the communication between the seller&nbsp;<\/span><span style=\"color: #000000;\">and buyer, redirecting the payment of funds to their own accounts. By the time&nbsp;<\/span><span style=\"color: #000000;\">companies notice the irregularity, it is often too late. Companies dealing with&nbsp;<\/span><span style=\"color: #000000;\">international transactions in large amounts are especially vulnerable.&nbsp;<\/span><span style=\"color: #000000;\">Attackers can easily obtain company data from publicly available records.&nbsp;<\/span><span style=\"color: #000000;\">Cyber attackers breach corporate email systems, allowing them to monitor email&nbsp;<\/span><span style=\"color: #000000;\">communication with clients. Once they gather enough critical information about<\/span><br><span style=\"color: #000000;\">business processes, they can actively interfere in communication at the right&nbsp;<\/span><span style=\"color: #000000;\">moment, sending the customer a fake message regarding a change in the&nbsp;<\/span><span style=\"color: #000000;\">transaction account. This redirects payments for invoices and other expenses to&nbsp;<\/span><span style=\"color: #000000;\">their fake bank accounts. By the time companies realize something is wrong,&nbsp;<\/span><span style=\"color: #000000;\">substantial damage has already been done, ranging from a few thousand to tens&nbsp;<\/span><span style=\"color: #000000;\">of thousands of EUR.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><b>The Process of acquiring company data and Email addresses<\/b><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">The goal of cyber&nbsp;<\/span><span style=\"color: #000000;\">attackers (hackers) is to gain insight into a company&#8217;s communication, which&nbsp;<\/span><span style=\"color: #000000;\">they can achieve in various ways. They might breach the control panel of an&nbsp;<\/span><span style=\"color: #000000;\">email service provider and redirect email forwarding to their own address, from&nbsp;<\/span><span style=\"color: #000000;\">which they can discreetly monitor the company&#8217;s communication. They may even&nbsp;<\/span><span style=\"color: #000000;\">infect the computer of one of the employees. They can also obtain email access&nbsp;<\/span><span style=\"color: #000000;\">credentials through a targeted phishing attack. Regular phishing attacks are&nbsp;<\/span><span style=\"color: #000000;\">sent to many addresses and are typically filtered into spam by email servers.&nbsp;<\/span><span style=\"color: #000000;\">In contrast, targeted attacks are much more sophisticated: the attacker sends a&nbsp;<\/span><span style=\"color: #000000;\">personalized message to a chosen victim, bypassing email filters and appearing&nbsp;<\/span><span style=\"color: #000000;\">more trustworthy. As a result, such attacks are more \u201csuccessful\u201d in practice.&nbsp;<\/span><span style=\"color: #000000;\">In regular phishing emails, victims are told they must re-enter their email&nbsp;<\/span><span style=\"color: #000000;\">credentials, otherwise, they will lose access to their inbox. Although the&nbsp;<\/span><span style=\"color: #000000;\">reasons are fictitious and impossible even theoretically, the threat alone is&nbsp;<\/span><span style=\"color: #000000;\">often enough to convince users to enter their login details on a fake phishing<\/span><br><span style=\"color: #000000;\">site. In the case of targeted attacks, the attacker&#8217;s message is tailored&nbsp;<\/span><span style=\"color: #000000;\">specifically to the recipient, and because the content of the message relates&nbsp;<\/span><span style=\"color: #000000;\">to the recipient\u2019s activities, it is much more likely that the recipient will<\/span><br><span style=\"color: #000000;\">fall for it.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><b>Sending fake Emails with fake information (Business Email Abuse or BEC attack)<\/b><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">Once attackers gain&nbsp;<\/span><span style=\"color: #000000;\">access to a company\u2019s email, they set up email forwarding to their own email&nbsp;<\/span><span style=\"color: #000000;\">address, which they have created with a free provider (such as Gmail or&nbsp;<\/span><span style=\"color: #000000;\">Hotmail). They then monitor the entire communication for a while to determine&nbsp;<\/span><span style=\"color: #000000;\">how business transactions and payments are conducted, and to identify the&nbsp;<\/span><span style=\"color: #000000;\">largest clients or those with the most transactions. At a crucial moment, such&nbsp;<\/span><span style=\"color: #000000;\">as just before the payment of a large invoice, they actively intervene in the&nbsp;<\/span><span style=\"color: #000000;\">communication. They register an email address using the name and surname of an&nbsp;<\/span><span style=\"color: #000000;\">employee in the company (for example, name.surname@company.com becomes&nbsp;<\/span><span style=\"color: #000000;\">name.surname@gmail.com).&nbsp;<\/span><span style=\"color: #000000;\">They then send the victim an email with fake account details for the payment.&nbsp;<\/span><span style=\"color: #000000;\">The funds are redirected to the attackers&#8217; accounts, and communication with the&nbsp;<\/span><span style=\"color: #000000;\">client is also redirected to their email. Since users usually do not pay&nbsp;<\/span><span style=\"color: #000000;\">attention to the sender&#8217;s email address, the victim rarely notices the change.&nbsp;<\/span><span style=\"color: #000000;\">The attackers provide various reasons for the change in bank account details,&nbsp;<\/span><span style=\"color: #000000;\">such as difficulties with their bank, faster payment processing if the payment&nbsp;<\/span><span style=\"color: #000000;\">is made to an account in a nearby country, or the use of an intermediary&nbsp;<\/span><span style=\"color: #000000;\">account. In most known cases, the bank accounts involved belong to individuals,<\/span><br><span style=\"color: #000000;\">often referred to as \u201cmoney mules,\u201d who immediately withdraw the transferred&nbsp;<\/span><span style=\"color: #000000;\">funds and send them further via another channel, typically using services like&nbsp;<\/span><span style=\"color: #000000;\">Western Union. This method quickly obscures the trace of the money.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><b>Analysis of a business Email abuse attack, step-by-step<\/b><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><u>How does the breach occur in Email communication?<\/u><\/span><br><span style=\"color: #000000;\">Attackers may breach the control panel of the email service provider and&nbsp;<\/span><span style=\"color: #000000;\">redirect emails to their own address, infect the computer of an employee, or&nbsp;<\/span><span style=\"color: #000000;\">obtain the email password via a targeted phishing attack.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><u>What is a targeted phishing attack?<\/u><\/span><br><span style=\"color: #000000;\">Targeted attacks, unlike regular ones, are much more sophisticated: the&nbsp;<\/span><span style=\"color: #000000;\">attacker\u2019s message is carefully prepared and tailored for a specific recipient,&nbsp;<\/span><span style=\"color: #000000;\">which helps it bypass email filters and appear more credible. As a result, such<\/span><br><span style=\"color: #000000;\">an attack is more &#8220;successful.&#8221;<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><u>How does the financial harm occur?<\/u><\/span><br><span style=\"color: #000000;\">The responsible person (e.g., accounting) receives a message in the employee\u2019s&nbsp;<\/span><span style=\"color: #000000;\">name with information about a changed bank account for the payment. Funds are&nbsp;<\/span><span style=\"color: #000000;\">then redirected to the attackers&#8217; accounts, and email communication with the&nbsp;<\/span><span style=\"color: #000000;\">client is redirected to their accounts as well.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><u>Who owns these bank accounts?<\/u><\/span><br><span style=\"color: #000000;\">In all examined cases, the bank accounts belonged to individuals, known as&nbsp;<\/span><span style=\"color: #000000;\">&#8220;money mules,&#8221; who immediately withdrew the funds upon receipt and&nbsp;<\/span><span style=\"color: #000000;\">transferred them via another method, usually through services like Western<\/span><br><span style=\"color: #000000;\">Union, to the criminals. This quickly obscures the trace of the money.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><u>Why is the trail of money lost?<\/u><\/span><br><span style=\"color: #000000;\">To assist with withdrawing and transferring funds of suspicious origin,&nbsp;<\/span><span style=\"color: #000000;\">criminals use physical individuals \u2013 intermediaries, also known as \u201cmoney&nbsp;<\/span><span style=\"color: #000000;\">mules.\u201d Once the victim is defrauded and the amount is transferred to the<\/span><br><span style=\"color: #000000;\">individual\u2019s personal account, the individual uses transfer services (such as&nbsp;<\/span><span style=\"color: #000000;\">Western Union) to send the money further, which makes tracing the funds almost&nbsp;<\/span><span style=\"color: #000000;\">impossible.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\"><br><\/span><\/p>\n<p class=\"MsoNormal\">\n<\/p><p class=\"MsoNormal\"><span style=\"color: #000000;\"><b>Preventive Measures &#8211; what can you do<\/b><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">If you do business&nbsp;<\/span><span style=\"color: #000000;\">internationally, be especially cautious of any sudden deviations from&nbsp;<\/span><span style=\"color: #000000;\">established practices. Verify any changes in sensitive data, especially those&nbsp;<\/span><span style=\"color: #000000;\">related to money transfers, through multiple channels, including phone calls&nbsp;<\/span><span style=\"color: #000000;\">and online communication tools.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">Check the email&nbsp;<\/span><span style=\"color: #000000;\">addresses of your business partners. Some email programs only display the name&nbsp;<\/span><span style=\"color: #000000;\">of the sender, which anyone can alter. However, by hovering over the name, you&nbsp;<\/span><span style=\"color: #000000;\">can see the full email address. Is it possibly altered? Pay attention to the&nbsp;<\/span><span style=\"color: #000000;\">domain part of the sender\u2019s address (the part after the \u201c@\u201d symbol). Does the&nbsp;<\/span><span style=\"color: #000000;\">address change from name.surname@company.com to name.surname@gmail.com?<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">Regularly check your&nbsp;<\/span><span style=\"color: #000000;\">email settings to see if your messages are being forwarded to an unknown email<\/span><br><span style=\"color: #000000;\">address. In Gmail, you can find this under &#8220;Filters&#8221; and&nbsp;<\/span><span style=\"color: #000000;\">&#8220;Forwarding&#8221; in settings. If you&#8217;re using another email provider,&nbsp;<\/span><span style=\"color: #000000;\">check their documentation for where to find these settings. If you notice any&nbsp;<\/span><span style=\"color: #000000;\">suspicious forwarding, act immediately.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">If your email provider&nbsp;<\/span><span style=\"color: #000000;\">allows you to view the IP addresses from which your inbox has been accessed,&nbsp;<\/span><span style=\"color: #000000;\">regularly check this data. It is possible to determine the email provider\u2019s&nbsp;<\/span><span style=\"color: #000000;\">location and, in some cases, the approximate physical location. In the case of&nbsp;<\/span><span style=\"color: #000000;\">a criminal investigation, the exact IP address and timestamp can help identify<\/span><br><span style=\"color: #000000;\">the user behind the access.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">Do not ignore any&nbsp;<\/span><span style=\"color: #000000;\">suspicious activity notifications from your email provider. Each such&nbsp;<\/span><span style=\"color: #000000;\">notification needs to be analyzed, and you should investigate the cause of the&nbsp;<\/span><span style=\"color: #000000;\">issue (but be careful not to confuse these with fake phishing emails that look&nbsp;<\/span><span style=\"color: #000000;\">like official messages from your provider).<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"color: #000000;\">What is your company\u2019s&nbsp;<\/span><span style=\"color: #000000;\">password policy? Use complex passwords and ensure that no password is shared&nbsp;<\/span><span style=\"color: #000000;\">between users. Be especially cautious with the password for accessing your&nbsp;<\/span><span style=\"color: #000000;\">company\u2019s email system\u2019s control panel. The theft of a single password can&nbsp;<\/span><span style=\"color: #000000;\">compromise access to all company email accounts. Therefore, enable two-factor&nbsp;<\/span><span style=\"color: #000000;\">authentication (2FA) for the email system if your provider offers it.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Abuses of Business Email Online attacks with fake data (in the context of email abuse) have become a significant problem, affecting both individuals and organizations. Cyber attackers exploit these&nbsp;attacks to impersonate trusted sources, convincing victims to disclose&nbsp;sensitive information or fall for malicious schemes. Recently, there has been&nbsp;an increase in breaches of corporate email systems, infiltrating&#8230;<\/p>","protected":false},"author":1,"featured_media":23192,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,18],"tags":[],"class_list":["post-23209","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-novice_1","category-digital-technology"],"rttpg_featured_image_url":{"full":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025.jpg",1600,1095,false],"landscape":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025.jpg",1600,1095,false],"portraits":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025.jpg",1600,1095,false],"thumbnail":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-150x150.jpg",150,150,true],"medium":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-300x205.jpg",300,205,true],"large":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-1024x701.jpg",640,438,true],"rsaddon-team-round-style":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-500x500.jpg",500,500,true],"1536x1536":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-1536x1051.jpg",1536,1051,true],"2048x2048":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025.jpg",1600,1095,false],"trp-custom-language-flag":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-18x12.jpg",18,12,true],"braintech_portfolio-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-520x640.jpg",520,640,true],"braintech_portfolio-full-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-1400x650.jpg",1400,650,true],"braintech_portfolios-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-1000x1000.jpg",1000,1000,true],"braintech_blog-slider":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-365x243.jpg",365,243,true],"braintech_blog_long_height":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-365x480.jpg",365,480,true],"braintech_latest_blog_small":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-255x157.jpg",255,157,true],"braintech_latest_blog_medium":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-340x270.jpg",340,270,true],"braintech_image_slider_big":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-860x450.jpg",860,450,true],"braintech_blog-footer":["https:\/\/rosoft.si\/wp-content\/uploads\/BEC-2025-80x68.jpg",80,68,true]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/rosoft.si\/en\/author\/rosoft_admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/rosoft.si\/en\/category\/novice_1\/\" rel=\"category tag\">Novice<\/a> <a href=\"https:\/\/rosoft.si\/en\/category\/digital-technology\/\" rel=\"category tag\">Digitalne tehnologije<\/a>","rttpg_excerpt":"Abuses of Business Email Online attacks with fake data (in the context of email abuse) have become a significant problem, affecting both individuals and organizations. Cyber attackers exploit these&nbsp;attacks to impersonate trusted sources, convincing victims to disclose&nbsp;sensitive information or fall for malicious schemes. Recently, there has been&nbsp;an increase in breaches of corporate email systems, infiltrating...","_links":{"self":[{"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/posts\/23209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/comments?post=23209"}],"version-history":[{"count":8,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/posts\/23209\/revisions"}],"predecessor-version":[{"id":23217,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/posts\/23209\/revisions\/23217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/media\/23192"}],"wp:attachment":[{"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/media?parent=23209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/categories?post=23209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rosoft.si\/en\/wp-json\/wp\/v2\/tags?post=23209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}