BSN 8 24 2020 png

Impersonation Nation

BSN 8 24 2020 png

Business Email Compromise (BEC) is not a new term. BEC scams have been growing in popularity for some time now. If you’re not familiar with BEC, it’s when a fraudulent email is sent to a company or individual, and the email appears to be from a legitimate business resource or person, often varying from the legitimate email address by just a letter or two. There may be instructions within the scam email for the recipient to transfer money, purchase gift cards, click on a malicious link, or perform some other activity at the behest of the sender. Unfortunately, BEC scams often put the recipient at a disadvantage because they see the name or title of the sender and react quickly, or are hesitant to question authority.

badge w light burst white (1)

Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

So, what’s the secret sauce that cybercriminals use across the board when launching their attacks on unsuspecting victims? According to a recent report from Barracuda, it’s surprisingly simple and straightforward: legitimate email accounts.

Let’s elaborate on that. Barracuda found that hackers launched 100,000 BEC attacks on over 6,000 organizations by using 6,170 legitimate email accounts (which of course, were created with malicious intent). We’re talking Gmail, AOL, and other verified email services.

The report further outlines the details of the attacks, identifying that 45% of the BEC attacks since April of 2020 were carried out with these email accounts. It appears that Gmail is the platform of choice with 59% of the accounts originating there. This may be a result of the cost to create an account (it is free), the ease of registration of a new account, and the solid reputation that a company like Google carries – meaning it is much more likely to pass through security filters.

Change in Identity

While the email account will remain the same, the sender name does get updated from time to time by the cybercriminal in order to go unnoticed by the recipient. These accounts are not often used for more than a 24-hour period and then will go dormant for a while to lessen suspicion or if it has been flagged already, to reduce the likelihood of being detected by another server. That doesn’t mean it goes away forever. Like your MySpace account, it stays out there in cyberspace waiting to be revisited.

Phishing for…Anything

Again, BEC scams are not new and they are just a small ‘subdivision’ of the much bigger issue of phishing – the single most used point of entry to a company in order to breach the data contained within the business infrastructure. And with the cost being minimal (basically it is free to do) and return on investment being potentially huge, the risk far outweighs the benefits.

Ongoing training is one of the best ways to arm employees and clients with the right tools to catch the phish.

More on blogs

Ready. Set. Accelerate to Awareness at IT Nation Connect 2025

Breach Secure Now is headed to IT Nation Connect 2025! Visit booth #417 to learn how MSPs can launch a foundational AI service offering, explore

AI Adoption Is Inevitable: How MSPs Can Make It Safe with the Right Training

Artificial Intelligence is already reshaping how businesses operate—but many employees are using it without the right guidance. Discover how MSPs can lead clients toward responsible,
Take the First Step

Experience Training That Makes a Difference

during the demo you’ll:

Take the First Step

Experience Training That Makes a Difference

During the demo you’ll:
slot gacor hari ini monk4d slot dana slot gacor SBCTOTO DAFTAR toto slot deposit 1000 joker123 JHONBET77 top1toto pucuk138 agendunia55 idrtoto daftar hoki99 toto toto slot pulsa toto togel naruto88 babeh188 slot88 gacor slot thailand Login shope168 Login shope168 interwin situs toto situs toto toto toto slot situs toto toto