About BEC (Business Email Compromise)

Business email compromise refers to fraudulent activity against businesses via email. In some cases, the emails are sent directly from the attacker, but in other cases, the supply chain companies are compromised in advance, the emails are snooped, and the emails are sent in the form of impersonating the supply chain company at the right timing.

The damage caused by this attack is being reported every day, regardless of whether it is a company in Japan or overseas. In addition, the damage amount reported by the FBI in 2019 reached approximately 190 billion yen, and it is currently considered to be one of the threats that should be recognized. Below are the changes in the amount of damage reported by FBI IC3.

As mentioned above, many domestic and foreign companies have been reported to have suffered damage from BEC. We have not yet confirmed any trends such as specific fields being targeted. For example, in the example of an overseas municipality, part of the construction costs of a school was stolen by an attacker. At the time, the attackers were impersonating construction contractors.

Below is a summary of publicly available information. *1

Damage example

Victim company Publication time Amount of damage *2
Domestic airline industry December 2017 380 million yen
united church May 2019 About 190 million yen (1.8 million US dollars)
US local government August 2019 About 270 million yen (2.5 million US dollars)
US local government October 2019 About 80 million yen (750,000 USD)
国内自動車部品(欧州小会社) September 2019 4 billion yen
Domestic publishing business (U.S. subsidiary) October 2019 About 3.1 billion yen (29 million USD)
British NGOs February 2020 About 130 million yen (932,000 pounds)
Puerto Rico government February 2020 About 280 million yen (2.6 million US dollars)
european investment fund May 2020 About 1.1 billion yen (US$10 million)

*1: As of May 2020, we have listed the cases that we have been able to grasp.
*2: Calculated at 1 US dollar = 107 yen, 1 pound = 135 yen

Defenders also recognize that this attack is basically based on a deception technique called social engineering, and that it is difficult to prevent damage with the conventional approach of discovering malicious points (attachments, URLs, etc.). This is the point you need to make.

Hard to find with security products

BECの分類

BEC is categorized by the FBI, IPA, etc., but considering the difference in countermeasures, we classify it into the following two.

classification

Pattern 1. Direct form

A pattern in which an attacker commits fraud against a target company. Attackers pretend to be executives of their own organization or affiliated companies (such as supply chains) and communicate urgent and confidential requirements. There are cases where a third party impersonating a real lawyer intervenes once the exchange is done.

direct type

Pattern 2. Indirect/Partner Infringement

Attackers masquerade as business applications (Office365, etc.) used by companies to steal credentials through phishing, brute force attacks against publicly available email services, etc., or compromise using malware. infiltrate the email infrastructure of After that, after waiting for the invoice sent from the first target to the customer, the second target will be notified that the invoice has been replaced for various reasons and requested to make a transfer to the fraudulent remittance account. It is said that the primary target of the indirect type is often vendor companies, which often issue invoices, because of this kind of attack strategy.

Indirect/Partner Infringement

Kill chain in BEC

Pattern 1. Direct form

Pattern 2. Indirect/Partner Infringement

Patterns for sending fraudulent emails

There are three possible deception methods in the phase of sending fraudulent emails in the kill chain in pattern 2 above. Each also has disadvantages for attackers.

technique

例)contact@example.comドメインを持つ企業が侵害されていた場合

Attack method Sender email address example Advantages for attackers Disadvantages for attackers
(1) Send an email from a compromised Box contact@example.com It is easy to deceive the target because there is no room for suspicion other than the content of the email. Traces such as transmission history remain, and there is a high possibility of being discovered
(2) Send an email with a disguised email address contact@example.com Disadvantages of 1 are eliminated If the primary target has sender authentication (DMARC) set, there is a high possibility that the email will not be delivered.
③ Create a similar domain and send an email contact@examp1e.com Freely create and send email accounts Recipients may discover that the source is a look-alike domain

Countermeasure method

Countermeasures in BEC do not end with a solution to detect suspicious emails. It may be necessary to review operations and policies such as accounting. In addition, there are cases in which companies that have been spoofed or victims of fraud have shared the damages evenly, so it is not enough to take measures to prevent only one company from being deceived.

Based on the above kill chain, countermeasures are listed for each phase.

Proposed countermeasures in the kill chain

The following are kill chain-based countermeasures. For the sake of convenience, the description assumes that the mail service is built on SaaS, but most of them can be applied to on-premise systems as well.

Proposed countermeasure

Attack procedure Proposed countermeasure
Collecting information on the Internet none
to your email account
unauthorized logon
  • (Advanced) Phishing email protection
  • Email-based malware protection
  • Ongoing threat education for email employees
Box reconnaissance
  • Thorough multi-factor authentication
  • Stop unused IMAP services
  • Monitor SaaS login attempts and detect suspicious behavior
  • Monitoring and remediation of outgoing message forwarding settings
Sending fraudulent emails
  • Advanced anti-phishing
  • Sender Authentication (DMARC) settings (must be set by the sender)
  • BEC education for employees who use e-mail
Persuasion to send money
  • Education of BEC methods for accounting departments, etc.
  • Policy development when suspicious account changes are confirmed

BEC email sample

Email example for Pattern 1:

In many cases, emails are sent impersonating an executive, such as the CEO of your own organization or an external organization. In many cases, you will be told that there is an urgent need for action, such as:
Also, in this pattern, there are cases where a similar domain (eg examp 1 e.com) is used as the sender, or free mail is used for Reply-To.