Crime, Geopolitical Instability and Business Email Compromise
-
bookmark
-
print
- Keywords:
The war in Ukraine—and the entire geopolitical situation in general—has altered the cybersecurity landscape. While most people probably think of fraud as something that affects their finances, the reality is even more far-reaching.
Fraud is not just about your business losing money; the downstream impacts can be devastating. The funds taken from cyber fraud schemes are often used to pay for hostile and unsavory acts such as wars, terrorist attacks, organized crime and human trafficking.
Fraud is the endgame, but business email compromise, or BEC, is often the starting point. And company executives may be leaving their companies—as well as their families and themselves—much more vulnerable to attack than they think.
How BEC works
BEC involves a comprehensive attack in which a bad actor takes over or spoofs a business email account in order to initiate fraudulent transactions. Typically, the fraudster sends an email message that appears to be from a known source making a legitimate request.
While fraudsters often target companies, they can also target specific individuals, including top executives and rank-and-file personnel in key positions. Business leaders are prime targets because of their positions and their authority to compel others to fulfill a request. In fact, any employee can be a target. People in accounts payable roles, for example, can be especially vulnerable as they’re the ones responsible for executing payments.
Fraud is a full-time job for criminals. They’ll conduct research about their targets—including studying their social media behavior to learn more about them and their habits—and then determine the right time for an attack. They’re also patient and diligent, willing to lurk within a company’s systems for months (or longer) until they spot their opportunity to strike.
Once they obtain funds, typically they are taken off the grid almost immediately. The money they steal is often funneled through cryptocurrency exchanges or through foreign financial institutions. By the time you notice money has disappeared from your ledger, it’s likely untraceable. Also, because these crimes originate in your company’s (or your personal) email system, your bank can’t monitor activity for warning signs. Bank mitigation fraud tools can monitor for financial irregularities, but that may be after the money has disappeared and is no longer recoverable.
Protecting your company and yourself
While BEC is an insidious crime, there are some fundamental mitigating measures companies and individuals can take to protect themselves, such as implementing two-factor authentication and following documented processes and thresholds for email payment requests. Importantly, when it comes to safeguarding your company, it’s also crucial to safeguard your personal information.
Executives often post information about their personal lives online, and criminals will leverage what they discover about an executive’s family to facilitate their crimes. Even something as seemingly innocuous as naming your family members in your company bio can provide an opening for fraudsters to exploit. Ultimately, being cautious about what you share online can help protect both your family and your company.
While it may seem like hyperbole, you’re also helping to protect society at large. While falling victim to a BEC puts your company’s finances, systems, data and reputation at risk, it has an impact beyond your organization. The world order is changing, and global cybersecurity concerns are evolving and increasing. A single compromised email could lead to a fraud scheme that bankrolls a devastating global event. Given the stakes involved, combating fraud is every company’s and every employee’s shared responsibility.
Ash Khan
Head, Enterprise Fraud Management, Financial Crimes Unit, BMO
The war in Ukraine—and the entire geopolitical situation in general—has altered the cybersecurity landscape. While most people probably think of fraud as something that affects their finances, the reality is even more far-reaching.
Fraud is not just about your business losing money; the downstream impacts can be devastating. The funds taken from cyber fraud schemes are often used to pay for hostile and unsavory acts such as wars, terrorist attacks, organized crime and human trafficking.
Fraud is the endgame, but business email compromise, or BEC, is often the starting point. And company executives may be leaving their companies—as well as their families and themselves—much more vulnerable to attack than they think.
How BEC works
BEC involves a comprehensive attack in which a bad actor takes over or spoofs a business email account in order to initiate fraudulent transactions. Typically, the fraudster sends an email message that appears to be from a known source making a legitimate request.
While fraudsters often target companies, they can also target specific individuals, including top executives and rank-and-file personnel in key positions. Business leaders are prime targets because of their positions and their authority to compel others to fulfill a request. In fact, any employee can be a target. People in accounts payable roles, for example, can be especially vulnerable as they’re the ones responsible for executing payments.
Fraud is a full-time job for criminals. They’ll conduct research about their targets—including studying their social media behavior to learn more about them and their habits—and then determine the right time for an attack. They’re also patient and diligent, willing to lurk within a company’s systems for months (or longer) until they spot their opportunity to strike.
Once they obtain funds, typically they are taken off the grid almost immediately. The money they steal is often funneled through cryptocurrency exchanges or through foreign financial institutions. By the time you notice money has disappeared from your ledger, it’s likely untraceable. Also, because these crimes originate in your company’s (or your personal) email system, your bank can’t monitor activity for warning signs. Bank mitigation fraud tools can monitor for financial irregularities, but that may be after the money has disappeared and is no longer recoverable.
Protecting your company and yourself
While BEC is an insidious crime, there are some fundamental mitigating measures companies and individuals can take to protect themselves, such as implementing two-factor authentication and following documented processes and thresholds for email payment requests. Importantly, when it comes to safeguarding your company, it’s also crucial to safeguard your personal information.
Executives often post information about their personal lives online, and criminals will leverage what they discover about an executive’s family to facilitate their crimes. Even something as seemingly innocuous as naming your family members in your company bio can provide an opening for fraudsters to exploit. Ultimately, being cautious about what you share online can help protect both your family and your company.
While it may seem like hyperbole, you’re also helping to protect society at large. While falling victim to a BEC puts your company’s finances, systems, data and reputation at risk, it has an impact beyond your organization. The world order is changing, and global cybersecurity concerns are evolving and increasing. A single compromised email could lead to a fraud scheme that bankrolls a devastating global event. Given the stakes involved, combating fraud is every company’s and every employee’s shared responsibility.
What to Read Next.
NextGen Treasury: Protecting Your Organization from a Cybersecurity Attack
August 09, 2022 | Manage Cash Flow
It’s a matter of when, not if, your organization will be the target of a cyberattack. Fraudsters have become extremely creative with their appr…
Continue Reading>More Insights
Tell us three simple things to
customize your experience.
Contact Us
Banking products are subject to approval and are provided in the United States by BMO Bank N.A. Member FDIC. BMO Commercial Bank is a trade name used in the United States by BMO Bank N.A. Member FDIC. BMO Sponsor Finance is a trade name used by BMO Financial Corp. and its affiliates.
Please note important disclosures for content produced by BMO Capital Markets. BMO Capital Markets Regulatory | BMOCMC Fixed Income Commentary Disclosure | BMOCMC FICC Macro Strategy Commentary Disclosure | Research Disclosure Statements.
BMO Capital Markets is a trade name used by BMO Financial Group for the wholesale banking businesses of Bank of Montreal, BMO Bank N.A. (member FDIC), Bank of Montreal Europe p.l.c., and Bank of Montreal (China) Co. Ltd, the institutional broker dealer business of BMO Capital Markets Corp. (Member FINRA and SIPC) and the agency broker dealer business of Clearpool Execution Services, LLC (Member FINRA and SIPC) in the U.S. , and the institutional broker dealer businesses of BMO Nesbitt Burns Inc. (Member Canadian Investment Regulatory Organization and Member Canadian Investor Protection Fund) in Canada and Asia, Bank of Montreal Europe p.l.c. (authorised and regulated by the Central Bank of Ireland) in Europe and BMO Capital Markets Limited (authorised and regulated by the Financial Conduct Authority) in the UK and Australia and carbon credit origination, sustainability advisory services and environmental solutions provided by Bank of Montreal, BMO Radicle Inc., and Carbon Farmers Australia Pty Ltd. (ACN 136 799 221 AFSL 430135) in Australia. "Nesbitt Burns" is a registered trademark of BMO Nesbitt Burns Inc, used under license. "BMO Capital Markets" is a trademark of Bank of Montreal, used under license. "BMO (M-Bar roundel symbol)" is a registered trademark of Bank of Montreal, used under license.
® Registered trademark of Bank of Montreal in the United States, Canada and elsewhere.
™ Trademark of Bank of Montreal in the United States and Canada.
The material contained in articles posted on this website is intended as a general market commentary. The opinions, estimates and projections, if any, contained in these articles are those of the authors and may differ from those of other BMO Commercial Bank employees and affiliates. BMO Commercial Bank endeavors to ensure that the contents have been compiled or derived from sources that it believes to be reliable and which it believes contain information and opinions which are accurate and complete. However, the authors and BMO Commercial Bank take no responsibility for any errors or omissions and do not guarantee their accuracy or completeness. These articles are for informational purposes only.
This information is not intended to be tax or legal advice. This information cannot be used by any taxpayer for the purpose of avoiding tax penalties that may be imposed on the taxpayer. This information is being used to support the promotion or marketing of the planning strategies discussed herein. BMO Bank N.A. and its affiliates do not provide legal or tax advice to clients. You should review your particular circumstances with your independent legal and tax advisors.
Third party web sites may have privacy and security policies different from BMO. Links to other web sites do not imply the endorsement or approval of such web sites. Please review the privacy and security policies of web sites reached through links from BMO web sites.
Notice to Customers
To help the government fight the funding of terrorism and money laundering activities, federal law (USA Patriot Act (Title III of Pub. L. 107 56 (signed into law October 26, 2001)) requires all financial organizations to obtain, verify and record information that identifies each person who opens an account. When you open an account, we will ask for your name, address, date of birth and other information that will allow us to identify you. We may also ask you to provide a copy of your driver's license or other identifying documents. For each business or entity that opens an account, we will ask for your name, address and other information that will allow us to identify the entity. We may also ask you to provide a copy of your certificate of incorporation (or similar document) or other identifying documents. The information you provide in this form may be used to perform a credit check and verify your identity by using internal sources and third-party vendors. If the requested information is not provided within 30 calendar days, the account will be subject to closure.