chat
expand_more

Israel-Based Threat Group Launches Multi-Phase BEC Attacks Using an M&A Lure

Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
May 16, 2023

For as long as business email compromise (BEC) schemes have existed, they have always been driven by a singular mission: to get away with as much money as possible. Cybercriminals used to be able to get their paydays through distributing generic phishing campaigns, but as organizations have strengthened their defense and improved security awareness among employees over time, criminals have adapted accordingly, becoming even more savvy in their attack techniques. Now, instead of generic phishing emails, we’re seeing the rise of highly sophisticated, socially-engineered BEC attacks that can slip by unnoticed—until it’s too late.

We recently discovered a threat group that has gone to extra lengths to do just that, and their profile is not one that you’d expect.

The Rise of Israel-Based BEC Campaigns

Dating back to February 2021, we identified more than 350 BEC campaigns that can be linked to Israel, a historically unlikely location for BEC activity.

The primary epicenter for BEC scams is typically linked to West Africa, specifically Nigeria. Many are familiar with notoriously popular “Nigerian prince” scams, and this isn’t a coincidence. Of all the attacks that Abnormal analyzed since the beginning of 2022, 74% originated in Nigeria, far ahead of the next most common countries associated with BEC attackers: the United Kingdom (5.8%), South Africa (5.7%) and the United States (3.6%). Meanwhile, countries in Asian and Middle Eastern regions, where Israel sits, are at the very bottom of the list, serving as the home base for 1.2% and 0.5% of BEC actors respectively. Israel is also a country that’s known for being a cybersecurity innovation powerhouse, which perhaps adds to the unexpectedness of a sophisticated threat group originating from this location.

Targets by country:

Is BEC 1


When it came to targeting their victims, this Israel-based group aimed high. They went after large and multinational enterprises with more than $10 billion in average annual revenue, casting a wide net. Across these targeted organizations, employees from 61 countries across six continents received emails.

But what really stood out about this group was the highly sophisticated, multi-phase method they used to execute their attack. Here is a look into how a typical attack flow would play out.

The Attack Scheme, Phase One: CEO Impersonation

The primary pretext used by this group is a merger and acquisition (M&A) transaction, where the criminals impersonate the targeted employee’s CEO and ask for their help––confidentially––with the initial payment required for the merger. The criminals used several tactics to give their emails a sense of legitimacy, improving their ability to evade detection by the human eye or by traditional email security solutions:

  • They targeted senior leaders, who could reasonably be involved in a financial transaction such as the one the criminals used as their pretext.

  • They spoofed CEO email addresses using real domains. And if the target organization had a DMARC policy in place that would prevent email spoofing, the group would update the sending display name to still make it look as though emails were coming from the CEO.

  • They translated emails into the language that their target organization would ordinarily use. Translations included English, Spanish, French, Italian, and Japanese.

Example of an initial email by the spoofed CEO, highlighting the importance of confidentiality:
Is BEC 2

Examples of an initial email that spoofs the impersonated CEO’s address, and an initial email that uses an extended spoofed display name:

(Note: Names and email addresses have been changed.)

Is BEC 3

Examples of initial email correspondence in Spanish, French, Italian, and Japanese:

Is BEC 4

The Attack Scheme, Phase Two: Attorney Impersonation

After the targeted employee responds to the initial email, the attack moves to the next stage: a handoff to a second external persona, typically a spoofed M&A attorney, whose job it is to facilitate the payment.

The employee is introduced to an “attorney” and asked by the “CEO” to coordinate on bank account details and on sending the initial payment. The attorney’s email address is usually hosted either on a lookalike domain mimicking the law firm’s legitimate domain, or a free mail.com domain like consultant.com or accountant.com. While the impersonated attorneys come from a number of different law firms, the threat group seems to prefer impersonating solicitors at KPMG, which carries a perception of reputability.

Examples of follow-up emails introducing a KPMG attorney, written in English and Spanish:

Is BEC 5


Is BEC 6


While the average amount requested in payment fraud attacks is around $65,000, this group requests an average of $712,000—more than ten times the average––which is unknowingly sent to a mule account operated by the criminals. Because the main theme of these attacks is the acquisition of a company, the exchange of such a large sum of money is unlikely to raise any red flags.

In some campaigns, once the attack has reached this second stage, the group asks to transition the conversation from email to a voice call via WhatsApp, both to expedite the attack and to minimize the trail of evidence.

Example of an email requesting to switch to WhatsApp:

Is BEC 7

Mitigating Sophisticated Attacks Requires Sophisticated Solutions

Our research into this Israel-based threat group puts a spotlight on the continuing rise of BEC attacks. In addition to increasing in prevalence geographically, these attacks are also becoming more sophisticated, as seen in the execution of multi-phase attacks like this one. Furthermore, the amount of money requested is becoming significantly higher than we've seen historically, causing often irreparable financial devastation to victims.

To prevent these attacks, enterprises will need an intelligent cloud email security solution that can precisely detect and block attacks before they reach email inboxes.

The Abnormal platform uses behavioral AI to baseline known-good behavior across employees, vendors, applications, and tenants in the email environment. By understanding what is normal, Abnormal can then detect anomalies and remediate malicious emails in seconds, before employees ever have an opportunity to engage with them. This risk-adaptive approach enables Abnormal to prevent emails sent from attackers like this Israel-based group and others, so organizations can stay safe from evolving email attacks.

To learn more about this Israel-based threat group, download the full report here.

To discover how Abnormal helps protect organizations from sophisticated, multi-phase BEC attacks and other emerging threats, schedule a demo today.

Schedule a Demo
Israel-Based Threat Group Launches Multi-Phase BEC Attacks Using an M&A Lure

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More
B 2024 ISC2 Cybersecurity Workforce Study Recap
Explore key findings from the 2024 ISC2 Cybersecurity Workforce Study and find out how SOC teams can adapt and thrive amidst modern challenges.
Read More