CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
Risk Management for Cloud Computing and Data Services

Ramesh Munamarty, Group CIO, International SOS

Risk Assessment - Keeping Cyber Bully Away

Paul Ernst, CIO, Sandler Capital Management

All Roads Lead to Risk Assessment

Christopher R. Barber, EVP & CIO, Commonwealth Business Bank

Keeping up with the pace of change in cybersecurity

Susan Rassas, Information Risk Management - Transformation and Engagement Manager, Shell [Euronext: RDSA]

Evolving ERM in Banking with Recent Technology Development

Frank Tian, VP - Risk Management, Union Bank

There's a Framework that can Help your Business hoist its Sails

Jane Couchman, Chief Risk Officer, Aware Super

Captives' Value Rising as Tools for Resilience

Steven R. Bauman, Head of Global Programs and Captive Practice in North America, AXA XL

Too Much Data? Apply Intelligence Techniques to Financial Crime Risk Data Analytics.

Francisco Mainez, Head of Data and Analytics, Business Financial Crime Risk, HSBC [Euronext: HSB]

right

THANK YOU FOR SUBSCRIBING

What Makes Email Scammers Hard to Detect?

CIO Advisor Apac | Friday, January 17, 2020

Tweet

CIO Advisor apac scam newsNowadays, attackers use advanced techniques to scam organizations to pay them a hefty amount via fake invoicing.

Fremont, CA: Email scammers are getting sophisticated every day using advanced tactics for stealing from organizations across the world. Earlier, scammers used to send an invoice, letter, or invitation to be listed in a bogus trade directory or renew the website domain name. Today, however, the attacker’s campaigns revolve around supply chains, espionage, and research. Attackers dupe their victims by injecting themselves into a legitimate email thread about finance. These attacks are difficult to detect, and victims will realize that they have been scammed when their vendor follows up about an unreceived payment.

According to researchers at Agari, email fraud is linked to a cyber-criminal gang operating out of Nigeria. Known as Silent Starling, the group started in 2015 with romance scams and cheque fraud and then later advanced to wire transfer requests and gift card scams. Employing new attacks, the group has duped over 500 companies in 14 countries with the majority of their victims from the U.S., Canada, and the UK. The group has hacked 700 employee email accounts and stole over 20,000 emails to help cash-out campaigns successfully.Top Risk and Compliance Solution Companies

The attack begins with the hackers attempting to steal email login credentials using phishing attacks redirecting users to a spoofed version of tools like Office365 and other enterprise software. After gaining the credentials, the attacker’s login and set up a forwarding rule to automatically redirect copies of all the emails to a separate account they control. Further, they inspect the content of the emails to understand their victims. Later, email scammers set up alerts for keywords such as invoices and payments to gather information such as the language used by the real sender and the times of day they tend to be most active. Further, they gain access to the attachments and links used in the email to create a fake invoice that looks completely legitimate.

The invoice requests are precise because the customers will be expecting an invoice from the vendor. The only detail which is different in the invoice is the bank details, which redirects the money to the bank account of the cyber-criminal. These attacks are more time and resource consuming as compared to a regular BEC campaign, but the reward is higher. These attacks are stealthy, and they cannot be caught. In the meantime, the organizations can cross-check the outgoing payments to protect themselves from these attacks.

See also: Top Supply Chain Tech Companies

tag

scam

Fraud

Enterprise software

spam

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/what-makes-email-scammers-hard-to-detect-nwid-2072.html