<img height="1" width="1" style="display:none" src="https://q.quora.com/_/ad/1fa075f6a9144556974dd51ae0b653c7/pixel?tag=ViewContent&amp;noscript=1">
All Posts

This Fake CEO Con compromises your IT Security

CEO Scam.pngGot an email from the CEO requesting urgent payment of an invoice (or something similar)? Don’t rush in to get the job done, because you might just be participating in a clever new social engineering hack that's going to wreak havoc with your IT Security. In other words, that email might not be from the boss at all. Instead, you might have received an order from a hacker, to pay a hacker.

It’s a con as clever as it is simple: a hacker intercepts company information, some of which is freely available, creates an email address which looks like the one which belongs to the real boss, pops it off to the target in the finance department along with a fake invoice, and hits payday.

It works, too. Anyone can be a target; we’ve recently seen companies falling victim to this scam and in the process, losing thousands of dollars. In one case, the email legitimately came from the CEO’s email address. But the email account had been hacked, so the attached invoice which the unfortunate staff member paid, was anything but legitimate.

Security specialist Trustwave (which produces the industry-recognised Trustwave Report, which tracks information security trends) has a detailed blog on the fake CEO con. It says the ‘CEO Fraud is a type of Business Email Compromise (BEC) scam that has witnessed such explosive growth over the past 18 months, amid billions of dollars of losses, that it prompted an FBI warning.’

It is a major problem and it is costing businesses around the world – and right here in Australia - major money.

Trustwave continues: ‘What makes these hustles so worrying is that the senders go to great lengths to ensure their ruse sounds legitimate and won't raise any suspicion. This includes conducing reconnaissance on the company (via the corporate website, social networking accounts, etc.) in order to tailor a more believable message and impersonate the sender by either spoofing their email address or compromising their email account. As a result, the CEO Fraud is quite distinct from mass spam, which often contains obvious junk mail elements and for which companies tend to have better controls to guard against.’

While keeping these phishing emails out of the corporate network in the first place is the obvious and most optimal solution, it isn’t always possible. Hackers are smart and when there is a lot to gain from minimal effort, they become even more wily. Add to that, the concept of a network perimeter is fast becoming outdated in the highly-integrated, mobile-driven world.

CEO Fraud Example

Here are Trustwave’s recommendations to avoid the CEO Fraud:

  • Verify, Verify, Verify

You must have policies and procedures in place for handling emails that request wire transfers and other sensitive information. This might be something as simple as requiring that email recipients pick up the phone to verify the request directly with the email sender, double-check with the chief financial officer and/or notify the IT department. If you're unsure about the payment details referenced in the email, contact the vendor to whom you allegedly owe the balance. You also should consider requiring dual-approval for all wire transfers with the idea that if two people are required to initiate and authorize a transaction, it is more likely that someone will catch on to a scam. Finally, it's essential that the CEO and other top executives are on board with this plan (and won't chastise an employee for playing it safe).


  • Make Employee Education a Priority

Aside from just generally making employees acquainted with CEO fraud, you should teach workers how to spot offending emails. This blog post offers several examples of what CEO fraud emails tend to look like - notice that even though the messages are well crafted, their language, tone and style will likely appear off from how your CEO normally writes. Follow some of these tips to develop a well-liked security awareness program.

  • Beware of Other Tricks

Even if you've caught on to the scam, the miscreants will likely keep the jig going to try to assuage your apprehension. So expect the social engineering to continue even if you claim to have them figured out. Keep in mind, too, that the attackers may shift to the phone to lend more credibility - or skip email entirely. Phone calls may be even more convincing and effective for the criminals because they present an immediate high-stress scenario where the caller puts the target on the spot.

You should consider adopting an additional step of authentication for access to email accounts. Note, however, that this will only help in the cases in which the impersonators compromised an executive's email account, not when they spoofed the sender.

When in doubt, your employees must ask themselves: Is this an email they were expecting? If the answer is "no," they should trust their gut and follow up on their instinct.

Trustwave’s advice on how to avoid falling victim to the CEO Fraud is excellent.

At Techware, we’ll add one other extremely valuable piece of advice: Information security is everyone’s business. That means everyone. From the front desk, to the back office, from the interns to the CEO, information security has to be a part of company culture – or weak points will exist which can be exploited by determined attackers.

Did this article get you thinking about your Business Technology? Check out our FREE guide to reviewing your current IT and find out just where it stands. 

Related Posts

5 Reasons Your Disaster Recovery Plan Will Fail

A Disaster Recovery Plan is like an insurance policy. It’s the thing you never hope to need, but are thankful to have when you do. If accidentally putting your phone through the wash feels like a chilly Spring breeze, suffering an organisation–wide operations failure would be a category 5 tornado in the dead of winter. That insurance with the help of IT Managed Services would come in handy, wouldn’t it? For something so critical to maintaining the function and security of a business, you’d be surprised just how many don’t take disaster recovery seriously. You might even be one of them. And you’re not alone. 40% of all businesses rate their organisation’s ability to swiftly recover operations after a disaster as fair to poor, and 3 out of 4 businesses receive a fail grading for DR strategy. Ironically, 95% of businesses experience system failures due to incidents unrelated to natural disasters. These operational disasters account for 45% of all system disasters, with natural disasters and human error accounting for 35% and 19%. And then there’s that 1% of freak, what the hell just happened?!?! occurrences. So if the chance of suffering some kind of system disaster is so high, why aren’t more businesses investing in an effective DRP? Think you’ve got DR covered on your own? Here are 5 reasons your disaster recovery plan will fail.

Techware Rebranded

We’ve been working hard on this project and are extremely proud to be revealing our refreshed branding in 2019!

Anatomy of Attack - What a successful attack looks like

Trent: Welcome back to TechScoop, thankyou for joining us now today I am joined by an exceptionally special guest Mr Ryan Economos from Mimecast. Thanks for joiing us Ryan, good to see you again.