According to IC3, since the beginning of 2015 there
has been a 270 percent increase in identified
Business Email Compromise (BEC) victims. Victim
companies have come from all 50 U.S. states and
nearly 80 different countries.
FBI calls BEC "a serious threat on a global scale", and calls out that
"companies should make themselves aware of the BEC threat and take measures to avoid becoming victims."
Using social engineering, BEC is immune to
traditional firewalls, cryptography, spam filters
and anti-virus technology. Scammers use spoofing,
account takeovers and deceptive sender names
to masquerade as trusted parties.
According to industry estimates, a majority of BEC emails
come from strangers who register accounts or
domains that look very similar to entities trusted by the
victims. Traditional filters do not block these attacks.
And most recipients do not notice the subtle differences.
ZapFraud's Structural Deception Analysis™ does.
What does your company do when a trusted service
provider sends an invoice? And what do you do when
the trusted service provider was compromised, and the
invoice contains the scammer's payment instructions?
ZapFraud automatically verifies high-risk
emails with senders, using second factor technologies.
How do you know that your incoming email was not
spoofed when not all your contacts support DMARC?
ZapFraud's Structural Deception Analysis™
identifies likely spoof, automatically verifying
high-risk emails with senders using a variety
of second factor authentication options.