Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Executive Impersonations Lead to $2.7 Billion in Costs To Businesses
Facebook   X   LinkedIn   Email

Executive Impersonations Lead to $2.7 Billion in Costs To Businesses

December 26, 2024

Executive impersonation attacks, also known as CEO fraud or whaling attacks, are a type of phishing attack where attackers pose as a high-level executive, such as a CEO, CFO, or other C-Level, in order to trick employees into revealing sensitive information or transferring money. Essentially, these are other ways attackers use Business Email Compromise (BEC) attacks.

These types of attacks, no matter which name you call them, are often very sophisticated and can be difficult to detect. Attackers may use stolen email accounts or create fake email accounts that look very similar to real ones. They may also use social engineering techniques to gain the trust of employees, such as by pretending to be in a hurry or by using urgent or stern language.

Once an attacker has gained the trust of an employee, they may ask for a variety of things, such as:

  • Sensitive information, like customer lists, financial data, or employee passwords
  • Money transfers, often to overseas accounts
  • Help with a confidential project or task

Executive impersonation attacks can be very costly for businesses. In 2022, the FBI's Internet Crime Report found that these types of attacks cost businesses over $2.7 billion.

Connection to Business Email Compromise (BEC) Attacks

Executive impersonation attacks are often used in BEC attacks. BEC attacks are a type of phishing attack where attackers target businesses with emails that appear to be from legitimate vendors or customers. These emails may request payment for fake invoices or ask for confidential information.

Executive impersonation attacks can be used to make BEC attacks more convincing. For example, an attacker may pose as a CEO and email an employee asking them to approve a large payment. The employee may be more likely to approve the payment if they believe that it is coming from the CEO.

Executive Impersonation Attacks in Job Posting Scams and Social Media Scams

Executive impersonation attacks can also be used in job posting scams and social media scams. For example, an attacker may create a fake job posting on LinkedIn and pose as a recruiter from a well-known company. The attacker may then contact potential candidates and ask for their personal information or financial data.

Executive impersonation attacks can also be used on social media. For example, an attacker may create a fake social media profile and pose as a high-level executive. The attacker may then contact people on that platform and ask for their help with a confidential project or task.

Prevention Tips

There are a number of things that businesses and individuals can do to prevent executive impersonation attacks. Here are some tips:

Educate employees about executive impersonation attacks: Employees should be aware of the signs of an executive impersonation attack and know what to do if they receive a suspicious email or message.

Implement security policies and procedures: Businesses should have security policies and procedures in place to make it more difficult for attackers to succeed. For example, businesses should require employees to verify all payment requests with two people before approving them.

Use strong passwords and multifactor authentication: Employees should use strong passwords for all of their online accounts and enable multifactor authentication whenever possible.

Be careful about what information you share online: Individuals should be careful about what information they share on social media and other online platforms. They should also be careful about clicking on links in emails and messages from unknown senders.

Executive Impersonation Attacks are a threat to businesses of all sizes. By understanding these attacks and implementing robust prevention measures, you can shield your organization from falling prey to digital deception.


Online Security Tips From The BBB

Your Security

Online Security Tips From The BBB

Champions of consumers that they are, the Better Business Bureau (BBB) posted a warning reminder on their website about some of the risky online scenario’s consumers face every day. Keeping cyber safety in the forefront of our online activities isn’t always easy, but it’s always possible to do. The BBB knows this and wants consumers to be aware of some of the latest cyber scams and just how truly slippery they can be. It’s well-worth heeding what the BBB has to say about cybercrime and how to avoid the pitfalls that every hacker hopes we fall into. READ FULL STORY

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

General News

FBI Ranks “Most Hacked” States In The US. Does Your State Rate?

First of all, no need to panic. No one expects you to pack your bags and move to a state with a lower cybercrime ranking. Every year, the FBI’s Internet Crime Complaint Center (IC3) releases its national cybercrime rankings by state. The data comes from only those cybercrimes reported to the IC3. With their “2022 Internet Crime Report” release, buckle up, read on, and find out if (and where) your state rates. In a contest no one wants to win, there is still a clear leader. READ FULL STORY

AI Helps BEC Attacks Spread Worldwide Despite Language Barriers

Your Security

AI Helps BEC Attacks Spread Worldwide Despite Language Barriers

While many schools are concerned with students using AI (artificial intelligence) for assignments, the international world of business should be on high alert too. There are a growing crop of business email compromise (BEC) attacks using AI as a translation tool for their own benefit. The previous tell-tale signs of phishing are now fixed with AI, making it more difficult to spot an attack email. Hackers were once limited by their own language skills, but not anymore, thanks to AI. READ FULL STORY

Cybercrime Is Costly; Organizations Urged To Re-evaluate Cybersecurity Strategies

Corporate Security

Cybercrime Is Costly; Organizations Urged To Re-evaluate Cybersecurity Strategies

The cost to companies due to a data breach can bankrupt a business. There is no type of or size of an organization that isn’t a target of cybercrime. Several years ago, the CIA and NSA were victims of cyberattacks, and the attackers rubbed it in by exposing not only data they stole from these organizations but also by revealing the cyber tools they use. It’s natural to want to throw in the towel. After all, sometimes it feels like we just cannot win this battle. But this is a fight the good guys really can’t afford to lose. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...