A New Twist in Account TakeoverFBI Warns of Scam Linked to E-mail Compromises
A so-called "man-in-the-e-mail" scam that's targeted at least three Seattle-area businesses reflects a growing trend in account takeover compromises.
See Also: Role of Deception in the 'New Normal'
Fraudsters intercepted legitimate e-mails between the businesses and their suppliers and then spoofed subsequent e-mails impersonating each company to the other, according to a Dec. 2 warning issued by the Federal Bureau of Investigation. Losses linked to the attacks have so far totaled approximately $1.65 million.
The affected businesses were fooled into thinking they were sending money to an established supply partner in China. But the money was actually being sent directly to bank accounts managed by the attackers, according to the FBI.
John LaCour of the online security firm Phish Labs says these types of e-mail attacks are becoming increasingly common. "We have seen a huge increase in the amount of Webmail accounts targeted by phishers in the last year," he says. "By compromising the e-mail accounts of buyers and sellers using these marketplaces, fraudsters are able to spoof the e-mails between buyers and sellers necessary to redirect shipments and payments."
Tips from the FBI
The FBI is warning businesses as well as consumers to be wary of e-mails from unrecognized sources and take steps to double-check the source of origin. In some cases, the metadata on the spoofed e-mails in the Seattle-area incidents indicated that they actually originated in Nigeria or South Africa, the FBI notes.
Among the FBI's other top recommendations for avoiding falling victim to such schemes:
- Use out-of-band verification, such as telephone calls, and second-factor authentication that does not rely on e-mail, for all monetary transactions;
- Avoid free Web-based e-mail accounts, such as G-mail and Hotmail;
- Use digital signatures;
- Always forward business e-mails, rather than simply replying, to ensure e-mails are going to a legitimate address that is manually entered;
- Never open spam; delete it immediately;
- Beware of odd changes in business practices, such as a supplier suddenly asking that you contact a sales representative through her personal e-mail address.
Source of Attacks
Most man-in-the-e-mail attacks originate from China, LaCour says. And many of the sites attackers use to launch their spoofed campaigns have been nearly impossible to shut down, he says.
"These phishing sites are some of the longest living ones out there," LaCour explains. "We know of some that have been live for over two years."
The sites survive because the spoofed e-mails they are sending out don't target a specific brand, and therefore aren't detected by current anti-spam and phishing methods, he says.
"They either spoof many brands at once - such as four or more Webmail providers - or are generic enough not to draw attention from any company that might pursue shutdown of the phishing site," La Cour says.
This is why banking institutions and other businesses, for that matter, should focus on more customer education, says Suzanne Phegley, an ATM and financial fraud investigator at Swansea, Ill.-based FCB Banks. Although the latest attack seems to only have targeted businesses on the West Coast, the campaign likely will soon spread, she says.
Banking institutions should use FBI alerts about online scams as important educational tools, Phegley advises.
"When consumers and businesses are made aware of fraud trends by their financial institution, they may spot a phishing e-mail or recognize a phishing call more quickly, and that is what can stop fraud trends," she says. "If the fraudsters are not successful, they will move on."