It has been reported that Japanese media company Nikkei Inc. is the latest organization to be hit by BEC scammers, costing the enterprise $29 million. The company confirmed last week that, in late September, an employee of its US subsidiary,“had transferred approximately 29 million United States dollars (approximately 3.2 billion Japanese Yen) of Nikkei America funds based on fraudulent instructions by a malicious third party who purported to be a management executive of Nikkei.”
Full story here: https://www.helpnetsecurity.com/2019/11/05/nikkei-bec-scam/
Commenting on the news are the following cybersecurity professionals:
Martin Jartelius, CSO at Outpost24:
“To mitigate such a threat occurring, an excellent set of security processes need to be instilled:
- Do not process financial transactions solely based on email.
- Do not authorize transactions over certain amounts without verification from the one instructing on the transaction.
- Do not authorize new recipients of any transactions without an approval process within the finance team.
The last step is one of the easier to implement, and it is one of the most efficient.
Adding a header “This email originate from outside the organization” to all emails not sent by an authenticated user from the internal email server further gives a degree of resilience, but the problem is soft – staff related – and the solution hence is also soft – implementation of soft controls. Human error is not a technical error, we can by technology empower employees to make more educated guesses, but the best control is one that catches when the human fail, which is the reason for the above recommendations.”
Felix Rosbach, product manager at comforte AG:
“Here we have yet another example of how easy it is to steal someone’s identity – given there are no countermeasures in place. The reason for this is simple: most hackers aren’t geniuses, but neither is the average employee. We’re only human after all. Sometimes we make mistakes. Sometimes we get complacent or distracted and, unfortunately, our tendency to slip up every once in a while leaves us open to exploitation. That’s why you always have to have the human element in mind when thinking about security. So the question is: how do we protect our organization from the phishing scheme du jour? With an increasing attack surface and an endless number of ways to get access to a company, the name of the game is sophisticated identity access management coupled with verification from an actual human. And last but not least, having solid data protection will act as a fail-safe to minimize the damage in the event of a breach.”