The Zimbabwe Independent

Beware of email compromise attacks

- Jacob Mutisi ICT EXPERT Mutisi is the CEO of Hansole Investment­s (Pvt) Ltd. He is the current chairperso­n of Zimbabwe Informatio­n & Communicat­ion Technology, a division of Zimbabwe Institutio­n of Engineers.

INTERNATIO­NALLY, business email compromise (BEC) attacks are skyrocketi­ng, as are global losses of more than US$2,4 billion last year, according to the FBI’s Internatio­nal Internet Crime Report.

BEC is equally common in Zimbabwe but our ZRP do not have the right structures to record these crimes and neither do they have the right training to prevent these kinds of crimes.

BEC is a scam also called the man-in-themiddle scam or also described as the email account compromise scam. is is when scammers target businesses working with foreign suppliers and/or businesses that regularly perform wire-transfer payments.

e scammers use computer intrusion techniques to compromise real business email accounts and perform unauthoris­ed transfers of funds out of business bank accounts.

e scammer emails a phishing document to an intended victim via the address of a legitimate supplier and asks them to change the wire transfer payments of paying invoices.

Phishing is when scammers send malicious emails designed to trick victims into providing their personal online details so that they fall for a scam.

is email request tricks the victim into clicking on a malicious email or link that downloads malware on his computer and allows the scammer to gain unrestrict­ed access to personally identifiab­le informatio­n (PII), including financial account data and passwords.

e scammer now has all the informatio­n he needs to wire money out of the victim's bank account.

It is Now Game over! When the real supplier delivers the goods and asks for payment, the victim only realises then that he has been scammed.

Another version of the scam targets upper-level executives in an organisati­on who receive email requests for wire transfers to bank accounts.

e emails are spoofed by adding, removing, or subtly changing characters in the email address that make it difficult to differenti­ate the perpetrato­r's email address from the legitimate address.

In another version, scammers send spoofed emails to suppliers, supposedly from their customer companies asking for quotes or orders for merchandis­e.

Many suppliers receive the emails at the same time, which alert them to possible suspicious behaviour.

Some companies follow up and easily link the IP addresses to previous email scams based abroad.

Sometimes, a scammer, who typically takes on the identity of a lawyer or a representa­tive of a law firm, contacts a victim via email or phone at the end of the business day or work week claiming to be handling confidenti­al or time-sensitive matters. Of course, the scammer creates a sense of panic to pressure the victim to expedite a funds transfer.

Many businesses have protected themselves from BEC scam by detecting it before they transfer funds to scammers and becoming victims.

ey do this by holding their customer requests for internatio­nal wire transfers for an additional period of time, to verify the legitimacy of the request.

Some businesses measures that include:

•Creating

intrusion detection system rules that flag emails with extensions that are similar to the company email. For example, legitimate email of abc_company.co.zw would flag fraudulent email of abc-company.co.zw

Registerin­g all company domains that are slightly different from the actual company domain. is is mandatory eg fbc.co.zw can also register fbcbank.co.zw

Verifying changes in vendor payment location by adding additional two-factor authentica­tion such as having a secondary sign-off by company personnel. also have protective

•When

Confirming requests for transfers of funds.

using phone verificati­on as part of the two-factor authentica­tion, use previously known numbers, not the numbers provided in the email request.

Knowing the habits of your customers, including the details of, reasons behind, and amount of payments. Know Your Customer

(KYC).

Carefully scrutinisi­ng all email requests for transfer of funds to determine if the requests are out of the ordinary.

In cases where funds are transferre­d to a fraudulent account, you must act quickly: Contact your financial institutio­n immediatel­y.

•contact

Request that your financial institutio­n

the correspond­ing financial institutio­n where the fraudulent transfer was sent.

Contact your local law enforcemen­t if the wire is recent.

File a complaint, regardless of dollar loss. Report the crime to local law enforcemen­t agencies, the media and even the Reserve Bank of Zimbabwe. Zimbabwe’s business should now have robust email security, domain authentica­tion, account protection, content inspection and user awareness must work together in a holistic fashion and there is a need for businesses to have cyber security as a Corporate Social Responsibi­lity (CRS) to educate their clients and stakeholde­rs. For more details please Whatsapp/call +2637722781­61.

 ?? ??
 ?? ??

Newspapers in English

Newspapers from Zimbabwe