BEC Attacks: Trends & Predictions For 2024

Brought to you by Gilad David Maayan  

BEC Attacks: Trends and Predictions for 2024

What Are BEC Attacks?

To briefly set the context for our discussion of BEC attacks, imagine a scenario where an employee receives a seemingly innocent email from their superior or colleague. The email might request a wire transfer or sensitive information, and because it appears to come from a trusted source, the unsuspecting employee complies.

Only later does the company realize they've been duped. The email was not from who they thought it was, but from a cybercriminal.

This is the essence of a BEC attack - a crafty, well-planned scheme that exploits the trust within a business setting to extract money or valuable information. It's a type of phishing attack, but what makes it stand out is its level of sophistication and the difficulty in tracing the perpetrators.

Factors Contributing to the Rise in BEC Attacks

Increase in Remote Work and Digital Communication:   The first factor contributing to the rise in BEC Attacks is the increase in remote work and digital communication. In recent years many businesses have adopted a work-from-home model. This transition has resulted in an increased reliance on digital communication, with a majority of business transactions and interactions happening via email.

While this shift has undoubtedly brought about convenience and efficiency, it has also opened up new avenues for cybercriminals. With employees working remotely, there's often a lack of direct, face-to-face communication. This means cybercriminals can more easily impersonate colleagues or superiors via email without arousing suspicion.

Moreover, with the surge in digital communication, employees are dealing with an overflow of emails. This can lead to hurried responses without thorough verification of the sender's identity, making it easier for BEC attacks to succeed.

Sophistication of Social Engineering Tactics:   Another factor leading to the rise in BEC attacks is the sophistication of social engineering tactics employed by cybercriminals.

Cybercriminals have become adept at creating emails that look and sound authentic, often mimicking the tone, language and email format used within the targeted organization. They spend time understanding the company's structure, the relationships between employees, and even the specific projects they are working on.

This level of detail and personalization makes it extremely difficult for employees to identify these emails as fraudulent, thus leading to a higher success rate for BEC attacks.

The Role of Cryptocurrency in Anonymous Transactions:   Lastly, the rise of BEC attacks can be attributed to the role of cryptocurrency in facilitating anonymous transactions. Traditionally, money stolen through BEC attacks would be transferred through conventional banking channels, which left a traceable paper trail.

However, with the advent of cryptocurrencies, cybercriminals now have a way to move large sums of money while remaining virtually untraceable. This has made BEC attacks an even more attractive option for cybercriminals, as the risk of getting caught is significantly reduced.

Trends in BEC Schemes Expected in 2024

Shift Towards Targeting Small and Medium-Sized Businesses:   Looking ahead to 2024, one trend we expect to see in BEC schemes is a shift towards targeting small and medium-sized businesses (SMBs). Initially, BEC attacks primarily targeted large corporations with substantial financial resources. However, cybercriminals have realized that SMBs, while having smaller funds, often lack the advanced security measures of larger companies, making them easier targets.

SMBs also tend to have a more informal communication style and less stringent protocols around money transfers, which can be exploited in BEC attacks. Therefore, it's imperative for SMBs to invest in cybersecurity measures and employee training to mitigate the risk of BEC attacks.

The Rise in Multi-Stage Attacks Involving Ransomware:   Another trend we anticipate is the rise in multi-stage attacks involving ransomware. In these attacks, cybercriminals first gain access to the company's network through a BEC attack. Once inside, they deploy ransomware that encrypts the company's data, rendering it inaccessible until a ransom is paid.

This multi-stage attack is particularly damaging as it combines the financial loss from the initial BEC attack with the potential loss of business operations due to the ransomware. It also signifies a dangerous evolution in cybercriminal tactics, as it indicates a move towards more destructive and disruptive attacks.

Personalization of Attack Methods Using AI:   Lastly, we expect to see an increased personalization of attack methods. As mentioned earlier, BEC attacks are already highly personalized, with cybercriminals tailoring their approach to the targeted company. However, as AI and machine learning technologies advance, we anticipate that these attacks will become even more sophisticated.

For instance, cybercriminals could use generative AI to simulate text and audio messages that are convincingly similar to those sent by real company officials.

Trends in Defensive Measures Against BEC Attacks

In 2024, just as attackers advance in their techniques, we expect to see significant advances in the available defensive measures.

Advancements in Email Authentication Protocols:   One of the key defenses against BEC attacks is the use of advanced email authentication protocols. These protocols verify the identity of the sender before the email is delivered to the recipient's inbox. This process helps to prevent spoofed emails, which are often used in BEC attacks, from reaching their intended targets.

One such protocol is the Domain-based Message Authentication, Reporting, and Conformance (DMARC). DMARC builds on two other authentication protocols, the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). These protocols work together to authenticate the sender's domain and provide a policy on how to handle emails that fail the authentication check.

The adoption of these advanced email authentication protocols has significantly reduced the success rate of BEC attacks. However, it is important to note that while these protocols are effective, they are not foolproof. Attackers are constantly finding new ways to bypass these security measures, which necessitates the need for additional defenses.

AI-Driven Anomaly Detection Systems:   Another defense against BEC attacks is the use of AI-driven anomaly detection systems. These systems use machine learning algorithms to analyze email traffic and identify anomalies that may indicate a BEC attack.

For example, these systems can detect sudden changes in an email account's behavior, such as a sudden increase in sent emails or a change in the language or tone of the emails. These anomalies may indicate that the account has been compromised and is being used for a BEC attack.

These AI-driven systems offer a dynamic and proactive defense against BEC attacks. They can identify and stop an attack in its early stages, minimizing the potential damage to the business.

Employee Training and Awareness Programs:   Despite the advancements in technology, the human factor remains a significant weak point in cybersecurity. BEC attacks often rely on social engineering techniques to trick employees into divulging sensitive information or performing actions that benefit the attacker.

To counter this, many businesses have implemented employee training and awareness programs. These programs educate employees about the threats of BEC attacks and how to recognize and respond to them effectively.

In conclusion, BEC attacks pose a significant threat to businesses worldwide. However, with the right defensive measures and a forward-looking approach, businesses can effectively mitigate these attacks and secure their digital future.

Gilad David Maayan is a technology writer producing thought leadership content that elucidates technical solutions for developers and IT leadership.     

Image: PashaIgnatov

You Might Also Read: 

What Is Email Spoofing & How to Protect Your Organization:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« The Cyber Skills Gap Is Still Not Getting Better
Australian Ports Recovering After Large-Scale Attack  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.