What is Business Email Compromise (“BEC”)?
BEC creates different types of attacks such as CEO fraud or impersonation to a third party. All these have in common the compromise of an email account or email accounts in your email domain, which is then leveraged to steal money through fraudulent transfer of invoices, dissemination of malware, or theft of confidential data. As the email address is legitimate, these attacks have a high rate of success for the threat actors and often fool colleagues and partners alike. In one of our cases, the threat actor passed several payment notes to the victim’s banks and stole more than $10M over a month and a half.
Business Email Compromise – How LIFARS Helps
LIFARS can assist your business in capturing the important artifacts and data such as fraudulent emails and documents, security and activity logs, and any other information of relevance to the case. Based on that information and using techniques recognized as forensically sound by courts and agencies, LIFARS will:
Determine the “what”, “when”, “where”, “who” and “how” of the attacks, provide all the context you need to react and respond to the incident.
- If required, draft affidavits and documents for use in court or relevant agencies and be available for expert witness testimony.
- Keep you informed of the new developments and findings, and will assist you in making the right decisions to prevent further harm.
- Provide a report and recommendations to ensure consistent cyber hygiene against these attacks.
For more information: