Vane3alga

Business
Focused
Technology

A business email compromise (BEC) gang has launched more than 350 attacks against organizations in the US, according to researchers at Abnormal Security. The threat actor, which Abnormal Security tracks as “Firebrick Ostrich,” conducts open-source reconnaissance on their targets in order to construct their scam.

“In contrast to other forms of financial supply chain compromise where an attacker has deep insight into a specific vendor/customer relationship, third-party reconnaissance occurs when an attacker knows that there is a relationship between two organizations but has limited or no knowledge about actual outstanding payments,” the researchers write. “In essence, an attacker in these cases has the necessary context to impersonate a vendor but not enough information to be specific in their payment request.”

Cybercriminal Uses Direct Social Engineering

The threat actor then sends the customer organization an invoice posing as the vendor.

“Once an attacker has collected this information, they will then initiate their attack by impersonating the vendor and emailing the customer, inquiring about a potential outstanding payment,” the researchers write. “Because the attacker doesn’t have specific knowledge about an actual overdue invoice, these initial emails tend to be more general requests—rather than containing specific details that might be found in a traditional vendor email compromise attack.”

In addition, the threat actors can ask the victim to change the vendor’s banking information, so that future payments will be sent to the attackers until the vendor notices they haven’t been paid.

“Instead of requesting payment for a current invoice, another tactic that a threat actor might use is to simply request that a vendor’s stored bank account details be updated so any future payments get redirected to the new account,” the researchers explain. “This tactic is a little more stealthy, as the attacker isn’t requesting an immediate payment—the red flag accounts payable specialists are taught to notice. These attackers are playing a longer game, hoping that a simple request now will result in a payment to their redirected account with the next payment.”

Abnormal Security has the story.


Source: KnowBe4

Success Stories

President, Manufacturing Company

We are high speed and wireless with computer systems for everything we do. I do not worry at all because it has not been an issue since IT360 became a part of our company.

President, Manufacturing Company

Recent
Technology News

IT 360 News - Why Your Next Hardware Purchase Could Be More Expensive — and Harder to Find
Why Your Next Hardware Purchase Could Be More Expensive — and Harder to Find

A recent industry report highlights something we’re beginning to see ripple through the technology market: AI data centers are consuming massive amounts of hardware inventory. In fact, according to this article from Breitbart, Western Digital has already sold out much of its 2026 hard-drive production capacity as AI data centers purchase storage at unprecedented levels. […]

Read more
IT360 News
Why Your Old Phone System Is Holding You Back

It’s Time to Rethink How Your Business Communicates Many businesses are still relying on traditional phone systems that were designed for a very different era—when everyone worked in one building, at one desk, on one device. Today’s workforce looks nothing like that. Teams are remote or hybrid. Employees expect mobility. Companies are growing, changing, and […]

Read more