Vane3alga

Business
Focused
Technology

A business email compromise (BEC) gang has launched more than 350 attacks against organizations in the US, according to researchers at Abnormal Security. The threat actor, which Abnormal Security tracks as “Firebrick Ostrich,” conducts open-source reconnaissance on their targets in order to construct their scam.

“In contrast to other forms of financial supply chain compromise where an attacker has deep insight into a specific vendor/customer relationship, third-party reconnaissance occurs when an attacker knows that there is a relationship between two organizations but has limited or no knowledge about actual outstanding payments,” the researchers write. “In essence, an attacker in these cases has the necessary context to impersonate a vendor but not enough information to be specific in their payment request.”

Cybercriminal Uses Direct Social Engineering

The threat actor then sends the customer organization an invoice posing as the vendor.

“Once an attacker has collected this information, they will then initiate their attack by impersonating the vendor and emailing the customer, inquiring about a potential outstanding payment,” the researchers write. “Because the attacker doesn’t have specific knowledge about an actual overdue invoice, these initial emails tend to be more general requests—rather than containing specific details that might be found in a traditional vendor email compromise attack.”

In addition, the threat actors can ask the victim to change the vendor’s banking information, so that future payments will be sent to the attackers until the vendor notices they haven’t been paid.

“Instead of requesting payment for a current invoice, another tactic that a threat actor might use is to simply request that a vendor’s stored bank account details be updated so any future payments get redirected to the new account,” the researchers explain. “This tactic is a little more stealthy, as the attacker isn’t requesting an immediate payment—the red flag accounts payable specialists are taught to notice. These attackers are playing a longer game, hoping that a simple request now will result in a payment to their redirected account with the next payment.”

Abnormal Security has the story.


Source: KnowBe4

Success Stories

Partner, Law Firm

We hired IT360 as our computer hardware and software computer consultants when the company first went into business. Since then, they have helped us purchase new software and hardware equipment that we have instituted into the law firm. Any time we needed them to be there they have been. They have solved all of our problems including: stand alone computers, networking issues, Internet access issues, and software. I would highly recommend IT360 to anybody who needs help in these areas.

Partner, Law Firm

Recent
Technology News

IT 360 News - Your Team is Wasting 10+ Hours a Week–Here’s Where
Your Team is Wasting 10+ Hours a Week–Here’s Where

Most teams aren’t struggling because they lack effort — they’re struggling because of friction.In many businesses, employees are losing more than 10 hours each week to inefficiencies that feel normal but quietly add up. It’s not one big problem. It’s the small, repeated moments throughout the day — re-entering information, searching for files, switching between […]

Read more
IT 360 News - Why Your Next Hardware Purchase Could Be More Expensive — and Harder to Find
Why Your Next Hardware Purchase Could Be More Expensive — and Harder to Find

A recent industry report highlights something we’re beginning to see ripple through the technology market: AI data centers are consuming massive amounts of hardware inventory. In fact, according to this article from Breitbart, Western Digital has already sold out much of its 2026 hard-drive production capacity as AI data centers purchase storage at unprecedented levels. […]

Read more