“##ams as a variation of the business e - mail compromise ( bec ) scam. 1 it defines bec as a sophisticated scam targeting businesses that work with foreign suppliers and / or businesses that regularly perform wire transfer payments. the scam is carried out by compromising legitim…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
98%
“executive impersonation fraud is on the rise — and it is working executive impersonation scams are on the rise, costing businesses billions of dollars annually. organizations of all sizes can be targeted and fall victim to these crimes. understanding how these crimes are committe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
54%
“w - 2 forms, payroll, or other company employee personal identifiable information ( pii ) is contacted using the executive ’ s email address. frequently, the targeted individual is someone in human resources, payroll, finance, or audit, and the request by the executive often expr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
38%
“from a trusted vendor, customer, or foreign supplier. the email generally matches prior successful efts that have been completed in the past. in many cases, faxes or phone calls corresponding to past legitimate requests are also involved. scenario # 3 : executive and attorney imp…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
32%
“w - 2 forms, payroll, or other company employee personal identifiable information ( pii ) is contacted using the executive ’ s email address. frequently, the targeted individual is someone in human resources, payroll, finance, or audit, and the request by the executive often expr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Your company could lose hundreds of thousands in an impersonation scam, but here are eight things you can do to protect yourself.