{"id":14098,"date":"2019-09-24T13:34:48","date_gmt":"2019-09-24T09:34:48","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/bec-toyota\/14098\/"},"modified":"2019-11-15T15:21:55","modified_gmt":"2019-11-15T11:21:55","slug":"bec-toyota","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/bec-toyota\/14098\/","title":{"rendered":"How business e-mail compromise can cost millions"},"content":{"rendered":"<p>Generally, hijacked accounts are used to distribute spam and bypass filters. However, a hijacked mailbox can be used for far nastier things, such as a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bec\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">business e-mail compromise (BEC) attack<\/a>. Last month, a subsidiary of Toyota Boshoku Corporation was hit by such a scam, causing an estimated 4 billion yen (more than $37 million) of damage.<\/p>\n<h2>What happened?<\/h2>\n<p>According to the company\u2019s <a href=\"https:\/\/www.toyota-boshoku.com\/global\/content\/wp-content\/uploads\/190906e.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">official statement of September 6<\/a>, as well as comments from <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-37-million-lost-by-toyota-boshoku-subsidiary-in-bec-scam\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">news publications<\/a>, unknown cybercriminals launched a BEC attack. The incident is still being investigated and no details have been released, so it is not clear whether a hijacked mailbox was used or if the attackers simply impersonated someone. What we do know is that the financial loss was attributed to fraudulent bank transfer instructions that someone in the company took for legitimate.<\/p>\n<p>Shortly after the transfer, Toyota security experts realized that the money had gone to outside accounts, but it was too late to stop the transfer. Meanwhile, the company is working to get the funds returned.<\/p>\n<h2>What is a BEC attack?<\/h2>\n<p>A BEC attack does not necessarily involve hijacking other people\u2019s mailboxes. Sometimes cybercriminals try to impersonate senior company employees or partners using third-party addresses. However, using an insider\u2019s mail account makes the attack a whole lot easier \u2014 after all, an e-mail from someone you really do correspond with raises far less suspicion.<\/p>\n<p>For the attack to be successful, the cybercriminal must of course have excellent social-engineering skills; impersonating another person and convincing someone to do something is not so easy. Here again, a hijacked mailbox simplifies the attackers\u2019 task; having studied the contents of the Inbox and Sent folders, they will be able to imitate the person\u2019s style and character much more convincingly.<\/p>\n<p>The goal of a BEC attack is not always the transfer of funds (convincing someone to send millions of dollars is not a trivial task in anyone\u2019s book). It is far more common for attackers to try to extract confidential data from the victim.<\/p>\n<h2>Other examples of BEC attacks<\/h2>\n<p>The Toyota attack is by no means the first case of this kind. This year, we <a href=\"https:\/\/www.kaspersky.com\/blog\/sharepoint-phishing-attack\/25515\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">wrote<\/a> several times about a <a href=\"https:\/\/www.kaspersky.co.uk\/blog\/brazil-spam-mail-takeover\/15789\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybercriminal scheme<\/a> aimed at seizing the accounts of company employees. In May we <a href=\"https:\/\/www.kaspersky.com\/blog\/boca-juniors-case\/27107\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">chronicled how cybercriminals tricked<\/a> a football club into using the wrong payment details for a player\u2019s transfer fee. Last month, scammers tried to <a href=\"https:\/\/www.kgw.com\/article\/news\/crime\/portland-public-schools-says-it-has-recovered-the-29-million-nearly-lost-in-scam\/283-c747b698-4a2e-4705-b3d2-da17bb982c15\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">phish $2.9 million<\/a> out of Portland Public Schools (Oregon). And in July, Cabarrus County Schools (North Carolina) lost <a href=\"https:\/\/statescoop.com\/north-carolina-cabarrus-county-lost-1-7-million-email-scam\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">$1.7 million<\/a>, having received bogus instructions by e-mail. Staff initially transferred $2.5 million, supposedly for the construction of a new school, but later recouped part of the funds.<\/p>\n<h3>How to avoid becoming a victim<\/h3>\n<p>To safeguard against social engineering, technical means alone are inadequate \u2014 especially if the attackers are professionals with access to the real mailbox of the person they are trying to impersonate. Therefore, to avoid falling for this kind of scam, we advise that you:<\/p>\n<ul>\n<li>Clearly set out the company\u2019s funds transfer procedure so that no employee is able to make a transfer to a third-party account unsupervised. Ensure that transfers of large sums are authorized by several managers.<\/li>\n<li>Train employees in the basics of cybersecurity, and teach them to be skeptical about incoming e-mails. Our <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">security awareness programs<\/a> greatly assist in this regard.<\/li>\n<li>Prevent the hijacking of corporate mail accounts with phishing protection at the mail server level. For example, install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Toyota\u2019s European division just lost more than $37 million to cybercriminals. Learn how to avoid becoming a victim of a BEC attack.<\/p>\n","protected":false},"author":700,"featured_media":14099,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[2176,80,2177],"class_list":{"0":"post-14098","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-bec","11":"tag-fraud","12":"tag-transfer"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/bec-toyota\/14098\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/bec-toyota\/16711\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/bec-toyota\/18673\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bec-toyota\/16745\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/bec-toyota\/15448\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bec-toyota\/19339\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bec-toyota\/18030\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bec-toyota\/23653\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bec-toyota\/6467\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bec-toyota\/28715\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/bec-toyota\/12328\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/bec-toyota\/12427\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/bec-toyota\/11219\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bec-toyota\/20242\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/bec-toyota\/24662\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bec-toyota\/23491\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bec-toyota\/23334\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/fraud\/","name":"fraud"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14098"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14098\/revisions"}],"predecessor-version":[{"id":14345,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14098\/revisions\/14345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/14099"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}