Impostor Email Attacks Targeting Financial Services Firms

Socially engineered attacks target people within financial services organizations who can execute requests on the attacker’s behalf.

Email attacks. (Source: Shutterstock)

Quarterly impostor email attacks aimed at financial services organizations increased more than 60% year-over-year but cybercriminals continue to primarily target people, and not infrastructure, with advanced and highly targeted assaults.

Those were among the findings Sunnyvale, Calif.-based cybersecurity and compliance company Proofpoint revealed in its “Email Fraud in Financial Services Report,” for the fourth quarter of 2018.

Proofpoint said it analyzes more than 5 billion email messages, hundreds of millions of social media posts and more than 250 million malware samples to protect organizations around the world from advanced threats daily. For this study, they analyzed a subset of more than 160 billion emails sent across 150 countries in 2017 and 2018. They focused on email fraud attacks targeting more than 100 financial services organizations.

Proofpoint explained email fraud is a broad category that includes business email compromise, a form of wire fraud, and other threats in which the attacker uses some form of identity deception to manipulate an individual. These socially engineered attacks target specific people within financial services organizations who can execute requests on the attacker’s behalf.

“While email fraud is not unique to financial services organizations, this industry’s employees hold the keys to one of the most potentially lucrative paydays for cybercriminals. One wrong click can expose an entire brand and its customers to substantial risk and even bigger losses,” Ryan Kalember, executive vice president of Cybersecurity Strategy for Proofpoint, said. “It is critical that organizations prioritize the implementation of solutions that defend against these attack methods, specifically against domain spoofing, display name spoofing, and look-alike domains, and train employees to identify and report socially-engineered attacks across email, social media, and the web.”

Proofpoint’s key findings for the fourth quarter of 2018 also included within targeted financial services firms, 56% saw more than five employees targeted by BEC attacks. The study also found the largest volume of email fraud attacks targeting financial services companies arrived on weekdays between 7 a.m. and 2 p.m. in the target’s time zone, with Mondays the favored day by fraudsters. “Impostor attacks are socially engineered to be believable. A business partner, for example, is less likely to make a payment request after work hours or during a weekend,” the report confirmed.

Email fraudsters use a variety of techniques, often in tandem, to pose as someone the victim trusts or does business with. Proofpoint revealed the most common:

Proofpoint recommended effective security against these types of socially engineered attacks requires a people-centric approach, including robust email defenses and inbound threat blocking capabilities, combined with cybersecurity awareness programs that train users to spot and report malicious emails. “Businesses must assume that someone within their organization will always click and craft a security strategy that caters to their most attacked and vulnerable individuals and also protects against both internal and external impersonation attacks.”