Published: 21 August 2023
Summary
BEC attacks use targeted social engineering to succeed and maximize payout to attackers, making them a fast-growing threat to all organizations. Security and risk management leaders should use this research to upgrade their existing technologies and processes to protect against this threat.
Included in Full Research
Overview
Key Findings
Endpoint protection platform (EPP) and endpoint detection and response (EDR) solutions do not protect against business email compromise (BEC) attacks, as BEC emails usually do not contain any malware/malicious links and can’t be filtered by basic anti-spam and anti-malware solutions.
BEC phishing is commonly combined with account takeover (ATO) of the sender’s account. As a result, the recipient or systems using only BEC protection solutions have no means to recognize that the email is not from a genuine user.
BEC phishing emails resemble regular email content, and aim to exploit business process errors and immature practices involving funds/sensitive data transfer
To view the entire document, log
in or purchase