therecord.media Open in urlscan Pro
2606:4700:4400::ac40:91e2  Public Scan

URL: https://therecord.media/orion-carbon-black-bec-scam-millions?_hsmi=320119461&utm_content=320116890&utm_medium=social&utm...
Submission: On November 07 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>

Text Content

 * Leadership

 * Cybercrime

 * Nation-state

 * Elections

 * Technology

 * Cyber Daily®

 * Click Here Podcast

Go
Subscribe to The Record

✉️ Free Newsletter


Orion’s carbon black plant in Kalscheuren, Germany. Credit: Orion S.A.
Jonathan Greig
August 13th, 2024


CARBON BLACK SUPPLIER ORION LOSES $60 MILLION IN BUSINESS EMAIL COMPROMISE SCAM

About $60 million was stolen from one of the leading suppliers of carbon
products after an employee was tricked into making several wire transfers to
cybercriminals. 

The funds were stolen from Orion, a Luxembourg-based company that produces
carbon black,  a material used to make tires, ink, batteries, plastics and more.

A spokesperson declined to explain the situation in detail but the company filed
documents with the Securities and Exchange Commission (SEC) about the incident,
which it discovered on Saturday. 

A non-executive employee “was the target of a criminal scheme that resulted in
multiple fraudulently induced outbound wire transfers to accounts controlled by
unknown third parties,” they wrote. 

“As a result of this incident, and if no further recoveries of transferred funds
occur, the Company expects to record a one-time pre-tax charge of approximately
$60 million for the unrecovered fraudulent wire transfers.”

There is now a law enforcement investigation into the theft and the company said
it plans to “pursue recovery of these funds through all legally available means,
including potentially available insurance coverage.” 

Law enforcement agencies like the FBI have long warned businesses of
cybercriminals specifically targeting employees with access to an organization’s
funds, often impersonating other executives in order to convince financial
departments to approve transfers. 

Typically referred to as business email compromise (BEC), the schemes can take a
number of forms but often involve impersonation or other tricks to send company
funds to bank accounts owned by attackers. 

In 2023, the FBI said BEC fraud was the second most damaging type of internet
crime, accounting for $2.9 billion in losses. In some instances, vendor email
accounts are compromised while others involve phishing emails used to steal the
login information of people who have access to company funds. 

Scammers “are increasingly using custodial accounts held at financial
institutions for cryptocurrency exchanges or third-party payment processors, or
having targeted individuals send funds directly to these platforms where funds
are quickly dispersed,” the FBI said last year.

Police agencies have had some success in recent years in clawing back stolen
funds and arresting the people behind the scams, but FBI data shows that more
than $43 billion was lost through business email compromise and email account
compromise scams between 2016 and 2022.

 * 
 * 
 * 
 * 
 * 

 * News
 * Cybercrime

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.
Tags
 * business email compromise (BEC)
 * Securities and Exchange Commission (SEC)
 * manufacturing
 * Cybercrime

No previous article
No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across
the globe as a journalist since 2014. Before moving back to New York City, he
worked for news outlets in South Africa, Jordan and Cambodia. He previously
covered cybersecurity at ZDNet and TechRepublic.


BRIEFS

 * Outages impact Washington state courts after ‘unauthorized activity’ detected
   on networkNovember 6th, 2024
 * SelectBlinds says 200,000 customers impacted after hackers embed malware on
   siteNovember 6th, 2024
 * Cyberattack disables tracking systems and panic alarms on British prison
   vansNovember 6th, 2024
 * Georgia hospital unable to access record system after ransomware
   attackNovember 5th, 2024
 * Top US cyber agency says no ‘significant incidents’ impacting election so
   farNovember 5th, 2024
 * Alleged Snowflake hacker detained in Canada at DOJ's requestNovember 5th,
   2024
 * Ukraine accuses Google of revealing locations of its military systemsNovember
   5th, 2024
 * Schneider Electric says hackers accessed internal project execution tracking
   platformNovember 5th, 2024
 * Cisco notifies ‘limited set’ of customers after hacker accessed non-public
   filesNovember 4th, 2024


RUSSIAN STRATEGIC INFORMATION ATTACK FOR CATASTROPHIC EFFECT


Russian Strategic Information Attack for Catastrophic Effect


OPERATION OVERLOAD IMPERSONATES MEDIA TO INFLUENCE 2024 US ELECTION


Operation Overload Impersonates Media to Influence 2024 US Election


OUTMANEUVERING RHYSIDA: HOW ADVANCED THREAT INTELLIGENCE SHIELDS CRITICAL
INFRASTRUCTURE FROM RANSOMWARE


Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical
Infrastructure from Ransomware


RHADAMANTHYS STEALER ADDS INNOVATIVE AI FEATURE IN VERSION 0.7.0


Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0


TARGETS, OBJECTIVES, AND EMERGING TACTICS OF POLITICAL DEEPFAKES


Targets, Objectives, and Emerging Tactics of Political Deepfakes
 * 
 * 
 * 
 * 
 * 

 * Privacy

 * About

 * Contact Us

© Copyright 2024 | The Record from Recorded Future News