BEC Attacks: Most Victims Don't Use Multi-Factor Authentication - Apply It Now and Stay Safe

BEC Attacks: Most Victims Don’t Use Multi-Factor Authentication – Apply It Now and Stay Safe

a-woman-who-looks-worried-using-a-laptop-in-an-office

Image: Getty/LaylaBird

There has been a sharp increase in business email compromise (BEC) attacks and most victims work in organizations that were not using multi-factor authentication (MFA) to secure their accounts.

BEC attacks are one of the most lucrative forms of cybercrime: according to the FBI, total combined losses exceed $43 billion, with attacks reported in at least 177 countries.

These attacks are relatively simple for cybercriminals to perform – all they need is access to an email account and a bit of patience as they attempt to trick victims into making money transfers under false presences. This usually involves sending messages to employees, allegedly from their boss or a colleague, suggesting that a payment – ​​often very large – must be made quickly in order to secure an important business transaction.

More advanced BEC attacks hijack a corporate account and use a legitimate email address to request payment.

Scammers have even been known to monitor inboxes for long periods of time, choosing to knock only when a real business transaction is about to take place – at which point they step in and direct payment to their own account.

SEE: The biggest cybercrime threat is also the one no one wants to talk about

With money to be made this way, cybercriminals are increasingly turning to BEC campaigns and businesses are falling victim. According to cybersecurity analysts Arctic Wolf, the number of BEC attacks they responded to doubled between January-March and April-June – and these attacks accounted for more than a third of all incidents investigated.

There was a common theme among many victims: according to incident responders, 80% of organizations that fell victim to BEC attacks did not have MFA in place.

Multi-factor authentication provides an additional layer of security for email accounts and cloud application suites, requiring the user to verify that it was they who logged into the account, helping to protect against intrusions unauthorized, even if the attacker has the correct username. and password.

Organizations that ignore MFA expose themselves to BEC campaigns and other cyberattacks, despite repeated recommendations from cybersecurity agencies that it should be enforced. So why aren’t they using it?

“MFA requires careful planning and coordination for successful implementation, ensuring organizations can continue to operate without disruption. Since users need training on using the MFA system, this can be difficult for some organizations,” said Adrian Korn, threat intelligence research manager. at Arctic Wolf Labs, told ZDNET.

“Additionally, setting up and testing a new MFA deployment in an organization can place a heavy load on already overstretched IT departments,” he added.

Also: The Scary Future of the Internet: How Tomorrow’s Technology Will Pose Even Greater Cybersecurity Threats

Despite these potential constraints, applying MFA to all user accounts is one of the most important things companies can do to help protect their employees and network from cyberattacks, if configured correctly. .

“Organizations should plan their MFA deployments well in advance to account for any technical issues they may encounter. Additionally, organizations should take the time to ensure that MFA configurations are tested before peak hours. and that users are well trained in using the new MFA platform of choice,” Korn said.

But while MFA helps prevent cyberattacks, it isn’t foolproof, and determined cybercriminals are finding ways around it.

With BEC attacks using social engineering to trick people into thinking they’re doing the right thing, it’s also important for organizations to train their employees to detect when a request – even if it comes from a legitimate account – might be suspicious.

“Users should be trained to recognize suspicious financial requests. If something goes wrong, users should heed this instinct and investigate further. Urgent financial requests should be validated by additional means before finalizing major transactions” , Korn said.

LEARN MORE ABOUT CYBERSECURITY

#BEC #Attacks #Victims #Dont #MultiFactor #Authentication #Apply #Stay #Safe

Leave a Comment

Your email address will not be published. Required fields are marked *

Prendre rendez-vous en ligne