therecord.media
Open in
urlscan Pro
2606:4700:4400::ac40:91e2
Public Scan
URL:
https://therecord.media/orion-carbon-black-bec-scam-millions?_hsmi=320119461&utm_content=320116890&utm_medium=social&utm...
Submission: On November 07 via manual from IN — Scanned from DE
Submission: On November 07 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>
Text Content
* Leadership * Cybercrime * Nation-state * Elections * Technology * Cyber Daily® * Click Here Podcast Go Subscribe to The Record ✉️ Free Newsletter Orion’s carbon black plant in Kalscheuren, Germany. Credit: Orion S.A. Jonathan Greig August 13th, 2024 CARBON BLACK SUPPLIER ORION LOSES $60 MILLION IN BUSINESS EMAIL COMPROMISE SCAM About $60 million was stolen from one of the leading suppliers of carbon products after an employee was tricked into making several wire transfers to cybercriminals. The funds were stolen from Orion, a Luxembourg-based company that produces carbon black, a material used to make tires, ink, batteries, plastics and more. A spokesperson declined to explain the situation in detail but the company filed documents with the Securities and Exchange Commission (SEC) about the incident, which it discovered on Saturday. A non-executive employee “was the target of a criminal scheme that resulted in multiple fraudulently induced outbound wire transfers to accounts controlled by unknown third parties,” they wrote. “As a result of this incident, and if no further recoveries of transferred funds occur, the Company expects to record a one-time pre-tax charge of approximately $60 million for the unrecovered fraudulent wire transfers.” There is now a law enforcement investigation into the theft and the company said it plans to “pursue recovery of these funds through all legally available means, including potentially available insurance coverage.” Law enforcement agencies like the FBI have long warned businesses of cybercriminals specifically targeting employees with access to an organization’s funds, often impersonating other executives in order to convince financial departments to approve transfers. Typically referred to as business email compromise (BEC), the schemes can take a number of forms but often involve impersonation or other tricks to send company funds to bank accounts owned by attackers. In 2023, the FBI said BEC fraud was the second most damaging type of internet crime, accounting for $2.9 billion in losses. In some instances, vendor email accounts are compromised while others involve phishing emails used to steal the login information of people who have access to company funds. Scammers “are increasingly using custodial accounts held at financial institutions for cryptocurrency exchanges or third-party payment processors, or having targeted individuals send funds directly to these platforms where funds are quickly dispersed,” the FBI said last year. Police agencies have had some success in recent years in clawing back stolen funds and arresting the people behind the scams, but FBI data shows that more than $43 billion was lost through business email compromise and email account compromise scams between 2016 and 2022. * * * * * * News * Cybercrime Get more insights with the Recorded Future Intelligence Cloud. Learn more. Tags * business email compromise (BEC) * Securities and Exchange Commission (SEC) * manufacturing * Cybercrime No previous article No new articles Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic. BRIEFS * Outages impact Washington state courts after ‘unauthorized activity’ detected on networkNovember 6th, 2024 * SelectBlinds says 200,000 customers impacted after hackers embed malware on siteNovember 6th, 2024 * Cyberattack disables tracking systems and panic alarms on British prison vansNovember 6th, 2024 * Georgia hospital unable to access record system after ransomware attackNovember 5th, 2024 * Top US cyber agency says no ‘significant incidents’ impacting election so farNovember 5th, 2024 * Alleged Snowflake hacker detained in Canada at DOJ's requestNovember 5th, 2024 * Ukraine accuses Google of revealing locations of its military systemsNovember 5th, 2024 * Schneider Electric says hackers accessed internal project execution tracking platformNovember 5th, 2024 * Cisco notifies ‘limited set’ of customers after hacker accessed non-public filesNovember 4th, 2024 RUSSIAN STRATEGIC INFORMATION ATTACK FOR CATASTROPHIC EFFECT Russian Strategic Information Attack for Catastrophic Effect OPERATION OVERLOAD IMPERSONATES MEDIA TO INFLUENCE 2024 US ELECTION Operation Overload Impersonates Media to Influence 2024 US Election OUTMANEUVERING RHYSIDA: HOW ADVANCED THREAT INTELLIGENCE SHIELDS CRITICAL INFRASTRUCTURE FROM RANSOMWARE Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware RHADAMANTHYS STEALER ADDS INNOVATIVE AI FEATURE IN VERSION 0.7.0 Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0 TARGETS, OBJECTIVES, AND EMERGING TACTICS OF POLITICAL DEEPFAKES Targets, Objectives, and Emerging Tactics of Political Deepfakes * * * * * * Privacy * About * Contact Us © Copyright 2024 | The Record from Recorded Future News