chat
expand_more

Executive Impersonation: The BEC Hunt for Customer Payment Records

C-suite impersonation used to extract sensitive financial information.

Piotr Avatar Attacks 11 1x1

What is the attack?

  • Collection of Financial Data: Targeted attempts to extract sensitive financial information, such as pending payment details and contact information.

  • Executive Impersonation: Emails impersonated high-ranking executives, including the CEO and CFO, to add credibility.

  • Exploitation of Authority: The attack leveraged the human desire to be helpful, especially to individuals perceived as authoritative.

Why did it get through?

  • Verified Source: Email sent from a domain that passed sender authentication checks.

  • VIP Impersonation: The emails utilized impersonated names of the company's CEO and CFO adding a false layer of trust.

  • Benign Content: The absence of malicious links or attachments allowed the email to bypass traditional security measures.

What is required to solve for this attack?

  • Behavioral Analysis: Abnormal's Human Behavioral AI detects deviations from normal communication patterns, like unusual AR requests from high-ranking officials.

  • Content Analysis and Natural Language Processing: Abnormal understands the email's content, recognizing the urgency and financial implications as indicators of a potential financial themed attack.