BEC Scams are becoming much more common and can take many different forms. They are primarily used to gain access to financial accounts – however can also be used to gain access to someone’s email account or other sensitive information. This type of scam is increasing in popularity and becoming more frequent as the payoff is greater for the cybercriminal.
There are many types of BEC Scams, however the two most common are:
At it’s core – a BEC Scam is a form of social engineering. Social Engineering is the ability to manipulate people into giving up confidential information or carrying out deceitful requests. Cybercriminals take advantage of our natural human nature to trust each other – making it easier for them to trick individuals into falling for their scams.
BEC scam emails most commonly request the following information:
Other information to be cautious about which may not seem as suspicious could include:
Responding to a BEC Scam email could put your organization’s money and sensitive information directly in the hands of a cybercriminal. Never respond to a suspicious email – even if it appears to come from a trusted source until you’ve either verified the request by phone or by email with the assumed sender.
Being cautious and attentive when responding to emails or clicking links can greatly decrease your chances of falling victim of a BEC scam.
Every day, cybercriminals are becoming more sophisticated in their attempts. Never respond or confirm any requests by email. Even if the email appears to be legitimate and coming from a trusted source, assume that the email account may have been compromised. Always confirm any request for information or financial intent with the sender by phone or in person.
Finally – trust your gut. If something does not seem right or feels out of character, it probably is. Always think twice before completing any major action requested by email. Consider who is sending the email, what they are asking you to do and why they may be asking you to do their request.
Previous Chapter: Password Etiquette Next Chapter: What is the Dark Web?