Guest Post – Whaling – the new evolution in email cybercrime

By Ben Adamson, Lead Technical Consultant (Presales) APAC, Mimecast

[Reading time: 1.30 mins]

Everyday cybercriminals learn from yesterday’s attacks to plan new ones. Whaling attacks, also known as Business Email Compromise or CEO fraud, are now the latest frontline.

These attacks are designed to trick key employees into making financial transactions by pretending to be the CEO or CFO in a spoofed email. Some also target those responsible for sensitive employee data, for example HR records or tax information, which could be used for identity theft.

Snapchat is just one example among a string of large organisations hit by attacks. This incident saw a targeted phishing email impersonate CEO Evan Spiegel to leak the company’s payroll data.

CybercrimeThe United States has been beset by these ‘W-2’ tax form attacks while New Zealand’s Inland Revenue has also issued a new warning. As the Australian tax season approaches, organisations must prepare for a new wave of attacks.

Cybercriminals realised that anti-virus, real-time URL checking and other security tools like attachment sandboxing are increasingly making their lives difficult, so new tactics were required. These attacks are designed to pierce email traditional security architecture, be it running on-premises, hybrid or even Office 365.

It’s widely known how damaging ransomware has been to Australian organisations but these sums pale in comparison to this latest threat. The FBI recently reported global business losses due to whaling of more than $1.2 billion in little over two years, and a further $800 million in the six months since August 2015.

This trend is also supported by new Mimecast research. Since January 2016, 67% of firms around the world have seen an increase in attacks designed to instigate fraudulent payments and 43% saw an increase in attacks asking for confidential data.

Even the smartest employees can fall victim to these malware-less crimes. Employee education and rigorous business processes play an important role, and I believe advanced pattern recognition can play a larger role in identifying social engineering attacks.

Email is a vital tool for getting work done but also contains much of an organisation’s valuable data. It’s also the primary vector of attack. As new attack patterns continue to appear, It critical for Australian organisations to invest in more regular training and appropriate security technology.

Data#3’s dedicated security practice, Data#3 Secure provides your business with the right platform to optimise and manage your IT security Environments, delivered via our secure framework.

Tags: Security



Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…