New Report Shows the Success of Business Email Compromise Come from a Calculated Attack Approach

Angler_PhishingThe newest data from security vendor Barracuda provides insight into exactly how attackers execute BEC attacks and what makes them so successful.

Business Email Compromise (BEC) attacks are responsible for $26 Billion in losses over the last 4 years, according to the FBI. It makes sense for organizations to pay attention to these costly attacks, working to understand what an average attack looks like so a proper security response can be put in place.

According to Barracuda’s Spear Phishing: Top Threats and Trends, Volume 3 report, BEC attacks tend to follow some very specific behaviors that demonstrate how specifically executed these attacks are:

  • 91 percent of BEC attacks occur on weekdays
  • 84 percent are “urgent” requests
  • Attacks generally appear to come from “trusted” sources with Gmail addresses used in nearly half of all BEC attacks
  • The average attack targets 6 people or less in an organization

With the average BEC attack costing organizations $270,000, it’s imperative that preventative measures be put in place. Given the attack vector is email, and that most of these attacks have no malicious attachments, it’s up to the user to act as your last line of defense.

These attacks are successful simply because users take the emails received at face value, believing them to be from a known individual. Putting users through Security Awareness Training helps to educate users on how to identify BEC attacks, and how to avoid falling for them.

Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Topics: Phishing

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews