www.armorblox.com Open in urlscan Pro
2a05:d014:275:cb00::c8  Public Scan

Submitted URL: https://em.armorblox.com/MTc2LVhNSi0wMzAAAAGLzseZNkBbsgu3kH8MUG6lsT4Q-w6zGCgEgufEknYWeKWjri_vv5Ytv9RzKzxYQzwEy86ZBCw=
Effective URL: https://www.armorblox.com/blog/fbi-2020-ic3-report-findings-bec-and-eac-losses-continue-to-rise/?mkt_tok=MTc2LVhNSi0wMzAAA...
Submission: On June 09 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="mktoForm_1082" class="MarketoForm-module--form--4d59f mktoForm mktoHasWidth mktoLayoutLeft" data-form="1082" __bizdiag="196351835" __biza="W___" novalidate="novalidate">
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>Email:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired input"
          aria-required="true" style="width: 150px;" placeholder="Email" data-personalize-email="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton action" data-personalize-button="true">Subscribe</button></span></div><input type="hidden" name="formid"
    class="mktoField mktoFieldDescriptor input" value="1082" placeholder="formid"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor input" value="176-XMJ-030" placeholder="munchkinId">
</form>

<form class="MarketoForm-module--form--4d59f mktoForm mktoHasWidth mktoLayoutLeft" data-form="1082" __bizdiag="389636160" __biza="W___" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

Why Armorblox
Why ArmorbloxAbout UsNews & PressContact Us
Popular Content

 * Blog
   
   
   CHECKMATE: NEW VIP INVOICE AUTHORIZATION FRAUD ATTACK TARGETING BUSINESSES
   
   Learn more

Product
Product Capabilities
 * Advanced Threat Protection
 * Advanced URL Protection
 * Advanced Malware Detection
 * Advanced Data Loss Prevention
 * Security Operations
 * All Products

Product Tours
 * Main Product Tour
 * Phishing Product Tour
 * Business Email Compromise Tour
 * Brand Impersonation Tour
 * Data Loss Prevention Product Tour
 * Vendor Compromise Tour
 * Security Operations Product Tour
 * All Product Tours

Integrations
 * All Integrations

Popular Content

 * Blog
   
   
   HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER
   
   Learn more

Solutions
By Use Case
 * Business Email Compromise
 * Email Account Compromise
 * Graymail and Recon Threats
 * Executive Phishing
 * Data Loss Prevention
 * Abuse Mailbox Remediation

By Platform
 * Microsoft Office 365
 * Google Workspace
 * Secure Email Gateway Augmentation

By Industry
 * Financial Services
 * Education
 * Healthcare
 * Manufacturing
 * Retail

Popular Content

 * Blog
   
   
   HOW CHATGPT WILL CHANGE CYBERSECURITY FOREVER
   
   Learn more

CustomersResources
Learning Center
 * Business Email Compromise
 * Vendor Email Compromise
 * Spear Phishing
 * Ransomware
 * Vishing
 * Email DLP
 * Tools and Templates
 * All Topics

Resources
 * Templates
 * Whitepapers
 * Solution Briefs
 * Datasheets
 * Videos
 * Webinars
 * All Resources

Blog
 * Articles & Thought Leadership
 * Threat Research
 * Product Features
 * Customer Success Stories
 * All Articles

Humans of Cybersecurity
 * All Stories

Popular Content


 * UNDERSTANDING YOUR ORGANIZATION’S VENDOR FRAUD AND SUPPLY CHAIN RISK


 * PROTECTING YOUR ORGANIZATION AGAINST VENDOR FRAUD AND SUPPLY CHAIN ATTACKS


 * PREVENT VENDOR AND SUPPLY CHAIN ATTACKS WITH ARMORBLOX

Pricing

Get a Demo

Articles & Thought Leadership | 10 min read


FBI 2020 IC3 REPORT: BEC AND EAC LOSSES CONTINUE TO RISE

Share:

 1. Armorblogs
    /
 2. Articles & Thought Leadership
    /
 3. FBI 2020 IC3 Report: BEC and EAC Losses Continue to Rise

Anand Raghavan
Mar 19, 2021

Learn more about the trends highlighted in the FBI’s 2020 Internet Crime Report,
spotlighting the continued danger posed by BEC and EAC attacks.

--------------------------------------------------------------------------------

Earlier this week, the FBI Internet Crime Complaint Center (IC3) released their
2020 Internet Crime Report, with updated statistics on Business Email Compromise
(BEC), Email Account Compromise (EAC), and COVID-19 scams. This article will
compile our understanding of the trends highlighted in the report, signifying
how some things changed while others remained largely the same.


BEC AND EAC REMAIN THE COSTLIEST SCAMS

The Internet Crime Report discovered an interesting BEC pattern. While there was
a reduction in the number of BEC/EAC complaints (from 20,373 in 2018 to 19,369
in 2020), the reported losses increased year-over-year, from $1.29 billion in
2018 to $1.86 billion in 2020.

It’s likely that attackers have refined their BEC tactics and are confident
enough to pursue higher dollar amounts in their scams. While other forms of
cybercrime continue to endanger organizations’ security processes and peace of
mind, BEC and EAC remain the forerunners in harming bank balances.

Fig: BEC and EAC complaints fell in 2020, but reported dollar losses increased
YOY from 2018 to 2020

Learn how a typical BEC attack works in What Is Business Email Compromise? A
Definitive Guide to BEC

The IC3 report also spotlights the evolution of BEC and EAC attacks since 2013,
when the FBI first started tracking them. While these attacks began as
relatively simple email spoofs requesting fraudulent wire payments, they have
grown to encompass attacks like payroll diversion fraud, vendor email
compromise, and industry-focused scams targeting sectors like real estate and
healthcare.

Fig: The evolution of targeted email attacks


THE PHISHING PROBLEM PERSISTS

Since phishing attacks have existed for a long time, you might assume that the
problem has already been solved. However, stats from the 2020 Internet Crime
Report tell another story.

The IC3 received 241,342 complaints on phishing and related attacks like
smishing, vishing, and pharming in 2020. This number increased by almost 110%
from 2019 when they received 114,702 complaints.

Since these numbers constitute only reported complaints, we can assume that the
real phishing impact numbers are much higher than those presented in the report.

Fig: Number of complaints on phishing, smishing, vishing, and pharming attacks
increased by 110% from 2019 to 2020

This trend aligns with what the Armorblox threat research team has observed,
mainly related to a consistent increase in 0-day credential phishing attacks. We
have seen cybercriminals exploit Google and other free online services,
impersonate known brands, and use voice in combination with email in their
attempts to extract victims’ credentials.


EXPLOITING TRUST IN A YEAR OF UNCERTAINTY

In 2020, the IC3 received over 28,500 COVID-19 related complaints. Additionally,
in mid-April of 2020, Google’s Threat Analysis Group reported that they detected
18 million COVID-19 themed malware and phishing emails per day.

During times filled with volatility and uncertainty, our brains tend to take
specific shortcuts on whom to trust. We lean into trusting people we know,
entities with authority, and anyone who can help reduce our uncertainty. Thus,
it is disappointing (but not surprising) to see government impersonation attacks
reported by the IC3 rise in 2020.

Scammers also exploited trust by replicating processes that the government had
already instituted. Scammers hijacked these government measures to steal money
and data, whether it was unemployment insurance, small business loans,
vaccination programs, or stimulus checks.

Since the programs were already in place, scammers did not have to employ any
sophisticated tradecraft other than asking for money or PII by pretending to be
someone else.

Armorblox has observed persistent email attacks that use COVID-19 as a lure.
Read COVID Email Scams Aren’t Going Away to learn more.


SOCIALLY ENGINEERING THE MOST VULNERABLE

The report highlighted some sobering statistics on how cybercriminals continue
to use social engineering techniques to prey on vulnerable people.

Most COVID-19 related scams involved attackers fraudulently submitting
unemployment insurance claims after stealing victims’ identities. In addition,
paycheck Protection Programs (PPP) and small business economic injury disaster
loans were also used in scams, harming people and businesses that were already
most at risk from pandemic-related upheaval.

If we look at cybercrime victims by age group, almost 22% of all complaints
involved victims over 60, with reported losses above $966 million. People over
the age of 60 are often the subjects of romance scams, grandparent scams,
caregiver scams, and charity scams.

Given how uncertain and isolating 2020 was for all of us, the average person
would be even more likely to respond to these social engineering cues.


GUIDANCE AND RECOMMENDATIONS

If you or your organization are victims of a BEC attack, the IC3 provides the
following guidance:

 * Contact the originating financial institution as soon as fraud is recognized
   to request a recall or reversal.
 * File a detailed complaint with www.ic3.gov.
 * Never make any payment changes without verifying them with the intended
   recipient directly.
 * Visit the IC3 website regularly for updated PSAs regarding BEC trends and
   other fraud schemes targeting specific populations or industries.

Here are some additional security hygiene recommendations from the Armorblox
team:

 * Follow MFA and password management best practices: 
   * Deploy multi-factor authentication (MFA) on all possible business and
     personal accounts. 
   * Don’t use the same password on multiple sites/accounts.
   * Use password management software to store your account passwords. 
   * Avoid using passwords that reference your publicly available information
     (date of birth, anniversary date, etc.). 
   * Don’t repeat passwords across accounts or use generic passwords such as
     your birth date, ‘password123,’ ‘YourName123,’ etc.

 * Watch out for social engineering cues
   
   As most inboxes today are overflowing with unreads, we know that ‘read every
   email rationally’ is not realistic advice.
   
   Nonetheless, everyone should carefully engage with emails related to money or
   data requests. Subject the email to an eye test that includes inspecting the
   sender name, email address, the language within the email, and any logical
   inconsistencies.
   
   Examples:
   
   * Why is the IRS asking for my social security number over email? 
   * Why is a known vendor changing bank account details the day before an
     invoice is due?
   
   
   AUGMENT NATIVE EMAIL SECURITY WITH ADDITIONAL CONTROLS 
   
   For better protection against targeted email attacks like BEC, EAC, and 0-day
   credential phishing, organizations should invest in technologies that take a
   materially different approach to threat detection from built-in email
   security controls like Exchange Online Protection (EOP) and Microsoft
   Defender for Office 365 (MSDO).
   
   Gartner’s Market Guide for Email Security covers new approaches that vendors
   brought to market in 2020 and should be a good starting point for your
   evaluation.
   
   For more email security tips, threat research, and industry trends, join the
   Armorblox mailing list. If you’re reevaluating your email security stack and
   are interested in augmenting your built-in email security, schedule a demo
   with Armorblox to learn how we stop BEC and other targeted phishing attacks
   using Natural Language Understanding.
   
   Schedule a Demo
   
   --------------------------------------------------------------------------------

Schedule a Demo


SUBSCRIBE FOR THE MOST UP-TO-DATE EMAIL SECURITY INSIGHTS

Sign up for our newsletter to get the latest updates on the email threat
landscape, including new trends and attacks.

*
Email:




Subscribe


SEE ARMORBLOX IN ACTION

See how Armorblox uses the power of Natural Language Understanding (NLU) and
machine learning models to prevent BEC and targeted phishing attacks, prevent
unauthorized exposure of  sensitive PII, PCI, and PHI, and reduce incident
response times.

Take Product Tour


RELATED ARTICLES

Articles & Thought Leadership


GARTNER RELEASES 2020 MARKET GUIDE FOR EMAIL SECURITY

The Gartner Market Guide for Email Security defines market challenges, outlines
vendor technology attributes, and provides recommendations for email security
leaders. Read Armorblox thoughts on the Market Guide and get a complimentary
copy.

Customer Success Stories


CUSTOMER STORY: CUTTING THROUGH THE NOISE

Learn how Intermedia enlisted Armorblox to streamline and accelerate phishing
response.

Customer Success Stories


CUSTOMER STORY: KEEPING THE CITY RUNNING

Learn how City of San Jose used Armorblox to stop targeted email attacks from
disrupting City operations.

Threat Research


OK GOOGLE, BUILD ME A PHISHING CAMPAIGN

In this blog, we will outline five targeted phishing campaigns that weaponize
various Google services during their attack flow.

Threat Research


YOU’VE GOT A PHISH PACKAGE: FEDEX AND DHL EXPRESS PHISHING ATTACKS

This blog focuses on two email attacks impersonating FedEx and DHL Express. Both
attacks aimed to extract email account credentials. Phishing pages were hosted
on free services like Quip and Google Firebase to trick users into thinking they
were legitimate.






EXPERIENCE THE ARMORBLOX DIFFERENCE

If you have questions about email security, Armorblox has the answers you're
looking for. Request a product demo to find out more.

Get a Demo



100 S. Murphy Avenue, Suite 200
Sunnyvale, CA 94086
(650) 260-5352


Armorblox
Email Security
4.7
11 Ratings
Submit a review
As of 9 Jun 2023
Company
 * Why Armorblox
 * About Us
 * News
 * Careers
 * Customers

Product
 * Overview
 * Product Tour
 * Integrations
 * Pricing

Solutions
 * Business Email Compromise
 * Email Account Compromise
 * Graymail and Recon Threats
 * Executive Phishing
 * Email Data Loss Prevention
 * Abuse Mailbox Remediation

Resources
 * Resources
 * Trust Center
 * Blog
 * Contact Support

© 2023 Armorblox. All Rights Reserved. Privacy Policy.

Cookies Settings


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Privacy Policy

Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎

SOCIAL MEDIA COOKIES

Social Media Cookies

These cookies are set by a range of social media services that we have added to
the site to enable you to share our content with your friends and networks. They
are capable of tracking your browser across other sites and building up a
profile of your interests. This may impact the content and messages you see on
other websites you visit. If you do not allow these cookies you may not be able
to use or see these sharing tools.

Cookies Details‎
Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
Switch Label label
Switch Label label
Switch Label label

 * 
   
   View Cookies
   
    * Name
      cookie name

Reject All Confirm My Choices




Have you heard the news? Cisco recently announced their intent to acquire
Armorblox.
Read more about how Cisco is furthering the AI-first security cloud.
Read More