{"id":4233,"date":"2020-03-13T19:19:44","date_gmt":"2020-03-14T00:19:44","guid":{"rendered":"https:\/\/www.kraftgrp.com\/?p=4233"},"modified":"2020-04-13T19:23:30","modified_gmt":"2020-04-14T00:23:30","slug":"microsoft-365-g-suite-users-targeted-in-business-email-compromise-scam","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/microsoft-365-g-suite-users-targeted-in-business-email-compromise-scam\/","title":{"rendered":"Microsoft 365 & G Suite Users Targeted In Business Email Compromise Scam"},"content":{"rendered":"
Microsoft 365 & G Suite Users Targeted In Business Email Compromise Scam<\/strong><\/p>\n If you use Microsoft Office 365 or Google G Suite, then you need to be on the lookout for business email compromise. Cybersecurity technology won\u2019t protect you from this cybercrime scam – it comes down to what you know. <\/strong><\/p>\n The FBI has released a private industry notification that a specialized business email compromise campaign is being carried out against Microsoft Office 365 and Google G Suite users, so far causing $2.1 billion in damages.<\/p>\n Click the following link to read the full report:<\/p>\n https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2020\/04\/PIN-20200303-001.pdf<\/a><\/p>\n Business Email Compromise is a social engineering technique used by cybercriminals in which they pose as a business or member of a business in order to execute fraudulent payments.<\/p>\n In layman\u2019s terms, a cybercriminal will write an email pretending to be from a known contact or organization (e.g. your credit union), and request that a payment be processed \u2013 instead of sending the funds to a legitimate source, the payment will go to them.<\/p>\n Business Email Compromise can be carried out a number of ways:<\/p>\n Cybercriminals are using a specially developed phishing kit that mimics the cloud-based email services of both Microsoft Office 365 and G Suite. The fraudulent emails request or misdirect the transfer of funds, costing businesses large sums of money.<\/p>\n Share these three tips with your staff to help them mitigate the risk of business email compromise and other social engineering scams:<\/p>\n The point is that this type of cybercrime methodology is that it doesn’t rely on digital security vulnerabilities or cutting-edge hacking technology; phishing targets the user, who, without the right training, will always be a security risk, regardless of the IT measures set in place.<\/p>\n Like this article? Check out the following blogs to learn more: Are You Familiar With Cybercriminal Tactics?<\/a><\/p>\n What Do I Do After I\u2019ve Been Hit with a Ransomware Attack?<\/a><\/p>\nWhat Is Business Email Compromise?<\/h3>\n
\n
\n<\/strong> Phishing emails are sent to large numbers of users simultaneously in an attempt to “fish” sensitive information by posing as reputable sources; often with legitimate-looking logos attached.<\/li>\n
\n<\/strong> This is a much more focused form of phishing. The cybercriminal has either studied up on the group or has gleaned data from social media sites to con users.<\/li>\n
\n<\/strong> LinkedIn, Facebook and other venues provide a wealth of information about organizational personnel, as do their company websites. This can include their contact information, connections, friends, ongoing business deals and more.<\/li>\n<\/ul>\nHow Are Cybercriminals Targeting Microsoft Office 365 And Google G Suite Users?<\/h3>\n
How Can You Protect Yourself From Business Email Compromise?
\n<\/strong><\/h3>\n\n
\n<\/strong><\/li>\n
\n<\/strong><\/li>\n<\/ul>\n
\n<\/strong><\/p>\n