BreachExchange mailing list archives
Social engineering scams: How hackers are stealing from your clients
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Fri, 7 Aug 2015 14:01:21 -0600
http://www.propertycasualty360.com/2015/08/07/social-engineering-scams-how-hackers-are-stealing As businesses and insurers become more educated about the new threats posed by cyber thieves and hackers, both sides are engaging in an escalating battle. “Some insureds have described fighting cyber risks as an arms race,” explains Bill Jennings, an underwriter for Beazley Insurance Co., Inc., which focuses on writing a number of specialty insurance products in the U.S. “The hackers improve their tools and the way they can hack into an insured’s system. Insureds improve their tools and install patches, and hackers continue to improve their methods of attack.” When it comes to social engineering fraud, many people confuse this with the more traditional cyber attacks in which a person or entity tries to gain information from a company for a variety of reasons. With social engineering fraud the goal is always the same: cold, hard cash. “It’s not the old idea of hackers sitting in a basement trying to crack a system,” says Jennings. “The real weakness is the human element. Instead of trying to fool a computer system, I’m fooling a human being into thinking I’m a vendor, senior management or an important customer of theirs.” And successful hackers can get rich quickly, leaving a target company with little recourse to recover its money. Any time, any place, any industry The hackers can be located in any country and their targets can be found in any industry. Company size really doesn’t matter—everyone is a target. Jennings says if all of the social engineering hacks occurred in the U.S. with the funds transferred between U.S. banks, the losses would be reversible. Issues arise when funds are transferred out of the country to an emerging economy like China, Nigeria or Russia. After the money goes oversees, it’s impossible to get it back. Social engineering fraud is changing and evolving, according to Jennings. While hackers used to copy data and use it for other purposes, now the focus is on how to get money from their targets transferred into offshore accounts. “They have figured out simple ways to set up domain names and email addresses that look like the customers’ email addresses,” he adds. The hackers will spell the company name slightly differently so it looks close, but not exactly like the company’s address. The changes are frequently so subtle that it would be easy for an employee to miss them. The fraudsters also use social media to see where and when executives might be traveling and then send the emails to someone in the finance department of the company posing as the executive. “I’m in Romania on vacation and involved in a secret deal, and I need these funds right away,” says the official-looking email that may be complete with the company logo and confidentiality statement at the bottom. Jennings recommends that all companies conduct employee training on a regular basis (at least once or twice a year) to educate employees about the various types of fraud targeting businesses. They also should have a policy in place for verifying the transfer of any significant sums of money. This includes alerting others in the company about the request and verifying it with the executive involved. “Most amounts are in the low six-figure range and the average amount is around $100,000 or $200,000. These guys will test to see if they can get it to go through,” he explains, “maybe starting with $10,000 and if that works, increasing the amount of the request.” He recounts the story of one company who suffered significant losses (somewhere between $20 and $30 million) over an extended period of time. He says companies should use an out-of-band system of verification. If the request comes in by email (band 1) the recipient should move the verification to the next tier by either texting the person who sent the email (band 2) or calling him or her directly (band 3) to verify the information. “However this request is communicated to you, that is one band. Don’t confirm by the same band,” counsels Jennings. Social engineering fraud is not covered by other cyber policies. “People get confused about what it is,” says Jennings. “This is not Cyber Liability insurance for someone hacking your system. This is first party commercial coverage for an actual loss.” Beazley offers fraudulent instruction coverage in addition to their commercial crime policies, and other insurers have similar options. Jennings says that it’s not universally offered yet, but that insurers will underwrite more of this type of insurance as additional controls are put into place.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Social engineering scams: How hackers are stealing from your clients Audrey McNeil (Aug 17)
