Trend Micro’s Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC) attack that targeted multiple business partners.
The incident, which occurred over several days, involved the exploitation of a compromised email server to orchestrate a complex fraud scheme.
The attack involved three business partners (Partner A, Partner B, and Partner C) engaged in regular email communications.
The threat actor gained control of a third-party email server, which was then used to send fraudulent emails.
This compromised server allowed the attacker to maintain full visibility of all email conversations between the three business partners.
The incident unfolded in two phases. In the first phase, the attacker inserted themselves into existing email chains, carefully timing their interventions to avoid raising suspicion.
They waited approximately 4.5 hours before positioning themselves in the conversation, mimicking legitimate communication patterns.
During the second phase, the threat actor took complete control of the conversation, gradually swapping out recipients with email accounts under their control.
To maintain the illusion of legitimacy, the “From” field contained the intended recipient’s address, while the “Reply-To” field was set to the attacker’s email address.
The compromised third-party email server appeared to have an insecure configuration, allowing the fraudulent emails to pass Sender Policy Framework (SPF) authentication.
According to Trend Micro Report, this misconfiguration, whether pre-existing or deliberately altered by the attacker, played a crucial role in the success of the scheme.
The attackers employed several advanced techniques, including:
The ultimate goal of the attack was financial theft (T1657), with the added consequence of resource hijacking (T1496) for the owner of the compromised email server.
This incident highlights the evolving sophistication of BEC attacks and underscores the importance of implementing robust email security measures, including DMARC, DKIM, and SPF.
Organizations are advised to consider digital signatures for financial transactions, implement extended auditing for high-profile individuals, and establish out-of-band validation protocols with business partners to mitigate the risks of such advanced fraud schemes.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
Zero Trust is a security framework that operates under the assumption that no implicit trust…
Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline…
Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious purposes,…
Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive their…
Kudelski Security Research recently published an article detailing advanced methods for tracking and analyzing threat…
HUMAN's Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed "BADBOX 2.0,"…