Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
At the Cyber and Fraud Centre, we provide an Incident Response Helpline to support organisations that have fallen victim to cyber attacks or financial fraud.
One of the most commonly reported incidents is Business Email Compromise (BEC) attacks. In almost all cases, multi-factor authentication was not enabled. Some organisations only became aware that they had a compromised account when they discovered irregular bank account transactions.
If the motivating factor behind a BEC attack is financially motivated, then the threat actor will usually make it worth their while. Five-figure sums were transferred in each successful attempt reported to us this year. This ensures a nervy process of attempting to understand whether the funds can be recovered. In some cases, the transactions cannot be reversed.
One of the reasons why these attacks are so common is that for a threat actor to be successful, they do not necessarily need to invest a significant amount of time and resources for the reward. This makes BEC relatively cost-effective when considering other attack types requiring more significant overheads, such as malware development for phishing campaigns or attempting to exploit vulnerabilities within an organisation’s externally exposed infrastructure.
By compromising an email account, the attacker will be in a position where they can exfiltrate information from the organisation by accessing the victim’s mailbox, resulting in a loss in the confidentiality of the information it stores.
It also allows the attacker to impersonate the account’s owner, making it very difficult for recipients of emails originating from the compromised account to distinguish legitimate requests from fraudulent ones. In such cases, the only factor that may alarm recipients about this behaviour is that the request may be out of context or abnormal.
This blog intends to raise awareness of BEC attacks and how to deal with this type of incident. It may also help identify whether any security controls are absent and if there are any missed steps in an organisation’s Incident Response Plan.
Impact
In addition to the scenarios described above, an organisation that falls victim to this type of attack may suffer from the following:
Initial Access
To compromise an unprotected email account, an attacker only requires two parameters; username and password. The first component is the easiest to acquire. An attacker can research the target organisation and its employees. To identify the password used to secure an account, threat actors may explore the following techniques:
Containment and Recovery
Many organisations tend only to identify an account compromise when an external party notifies them. Implementing proactive monitoring controls (as discussed within the detection section) is possible, but this is not feasible for many small organisations.
If an account is identified to be compromised, the following actions should be considered:
Reporting
Upon identification of a Business Email Compromise account, external parties may need to be contacted dependent on the scenario:
Basic Prevention
To increase an organisation’s resilience to this type of attack, we recommend reviewing whether the following remedial action would be appropriate to implement:
Detection and Analysis
Depending on the email service supplier, organisations can implement proactive detection mechanisms for identifying account compromises as they occur.
Email service solutions such as Exchange and Google Workspace all record details associated with an email account’s activity for varying periods.
From the logs, it is possible to extrapolate details which can be evaluated by rules to identify compromised accounts. Controls which monitor for the following can help identify accounts which are compromised to help reduce the impact:
For organisations using M365 services, consideration should be given to enabling Unified Audit Logs. This feature is enabled by default for enterprise organisations. Still, we recommend double-checking that the feature is enabled, as it will not be possible to access logs retrospectively if this feature is disabled. These can be particularly useful for identifying whether an attacker has authenticated to other Microsoft services, such as Teams and SharePoint, beyond Outlook.
Organisations with the appropriate licensing can also review audit trails to understand what emails a threat actor accessed upon compromising an account. Upon investigating MailItemsAccessed records, which log IP address, username, timestamp and session information, inspecting bind and sync MailAccessType operations will be possible.
The bind operation details where an individual email has been accessed, whereas a sync operation denotes the download of a large volume of emails, synonymous with synchronisation when using the Outlook application to populate emails within the client. Attackers commonly perform a sync operation to access the entire contents of the mailbox. At that point, it can only be assumed that there is a complete loss of confidentiality.
A Final Word
Many more organisations are expected to continue to fall victim to this type of attack until vendors implement the most secure default settings, such as mandatory MFA.
Until then, an organisation’s nescience to improve upon the default configuration ultimately means that their primary defence from an email account compromise is likely reduced to the trust bestowed upon employees to make effective password choices and their resilience to interacting with malicious emails or web pages.
The information presented in this blog is intended to be generic, and additional factors in each scenario may require further investigation. If you have been affected by a cyber incident, please contact our Incident Response Line on 0800 1670 623 for assistance.