Collection of Financial Data: Targeted attempts to extract sensitive financial information, such as pending payment details and contact information.
Executive Impersonation: The BEC Hunt for Customer Payment Records
C-suite impersonation used to extract sensitive financial information.
What is the attack?
Executive Impersonation: Emails impersonated high-ranking executives, including the CEO and CFO, to add credibility.
Exploitation of Authority: The attack leveraged the human desire to be helpful, especially to individuals perceived as authoritative.
Why did it get through?
Verified Source: Email sent from a domain that passed sender authentication checks.
VIP Impersonation: The emails utilized impersonated names of the company's CEO and CFO adding a false layer of trust.
Benign Content: The absence of malicious links or attachments allowed the email to bypass traditional security measures.
What is required to solve for this attack?
Behavioral Analysis: Abnormal's Human Behavioral AI detects deviations from normal communication patterns, like unusual AR requests from high-ranking officials.
Content Analysis and Natural Language Processing: Abnormal understands the email's content, recognizing the urgency and financial implications as indicators of a potential financial themed attack.