Investment Firm Hit by BEC Scam (2024)

Business Email Compromise (BEC) , Cybercrime ,

Norway's Norfund Investigating Breach of Internal Network Scott Ferguson (Ferguson_Writes) • May 15, 2020
Investment Firm Hit by BEC Scam (1)

Fraudsters have conned Norfund, a private equity investment firm based in Oslo, Norway, out of more than $10 million in what the company calls an "advanced data breach." But the incident bears the hallmarks of a business email compromise scam.

See Also:

Scammers spent months within Norfund's internal IT network, gaining access to emails and other communications between the company executives and the partners and businesses in which the firm has made investments, CEO Tellef Thorleifsoon told the Norwegian newspaper Aftenposten. This provided fraudsters with knowledge of documents and other data, which enabled them to falsify payment details, he said.

The $10 million theft, which occurred on March 16, went undetected until April 30, when the fraudsters attempted a second, unsuccessful scam, according to a company statement.

The incident is now under investigation by Norfund's internal security, local police and the Norway Ministry of Foreign Affairs. In addition, the company as hired consulting firm PwC to review its internal security, Thorleifsoon notes in the company statement.

"The fact that this has happened shows that our systems and routines are not good enough. We have taken immediate and serious action to correct this," Thorleifsoon said.

Norfund, which is also known as the Norwegian Investment Fund and is owned by the country's Ministry of Foreign Affairs, invests in a range of clean energy, financial services and agribusinesses mainly in Africa, Asia and Latin America. At the end of 2019, it had invested over 24 billion Norwegian krone ($2.5 billion) in over 160 projects, according to its website.

Piecing the Scam Together

Although investigators are still piecing together just how the scam worked, it appears that after gaining access to Norfund's IT network and email communications, fraudsters began posing as a legitimate microfinance institution in Cambodia, sending emails and other financial and payment documents back to the investment firm, according to Norfund’s statement and the Aftenposten account.

At the same time, the fraudsters sent fake Norfund emails to the Cambodian firm, telling that company that payments would be delayed due to the COVID-19 pandemic in Norway, according to the account in Aftenposten.

Because both Norfund and the Cambodian company believing they were receiving legitimate emails and documents from each other, Norfund sent the $10 million, which instead of going to the Cambodian firm was transferred by the fraudsters to an account in Mexico and disappeared before Norfund executives realized the payment was missing, according to the company statement.

"The fact that the defrauders were able to manipulate the communication between Norfund and the intended recipient was a major contributing factor in delaying detection," the statement notes.

Since that fraud was uncovered, Thorleifsoon says that no other fraudulent incidents have been found, according to Aftenposten.

Hallmarks of BEC

While not directly mentioned by Norfund, this incident appears to involve a business email compromise scheme. These scams typically start with attackers stealing the email credentials of a top executive through phishing or other methods before tricking lower-level employees into transferring funds or making fraudulent payments to accounts controlled by scammers.

"While details are limited, it appears the same attack patterns appear in the Norfund case - the interception of emails, diversion of funds, and obfuscation of the trail by owning email communications," Chris Pierson, CEO of cybersecurity firm BlackCloak tells Information Security Media Group. "In most cases, this includes forwarding emails based on keywords such as wire and ACH to hacker-controlled accounts, not delivering real emails to their intended parties, and creating a man-in-the-middle scenario for the transfer of funds."

Pierson notes that the risk of falling victim to this type of scheme can be mitigated by requiring two-factor authentication for email communication as well as applying anti-phishing controls and improving employee training.

Chris Hazelton, director of security solutions at security firm Lookout, says the incident should serve as a warning call to other companies that make large digital transactions.

"This speaks to the risks of digital communications and transactions, particularly where there is an immediate monetary gain for attackers," Hazelton says. "As more organizations move to digitization of banking and all other processes, there is a need to have multiple layers of security."

BEC on the Rise

Business email compromise fraud is a growing problem. In February, the FBI issued its annual Internet Crime Report, which reported that the bureau received over 24,000 complaints about BEC scams in 2019, with a total loss of $1.7 billion to U.S. citizens (see: FBI: BEC Losses Totaled $1.7 Billion in 2019).

In April, the FBI also warned of an uptick in BEC schemes, with fraudsters using COVID-19 as an excuse to request a fraudulent rescheduling of payments or a change to other plans in order to pilfer funds (see: FBI: COVID-19-Themed Business Email Compromise Scams Surge).

Investment Firm Hit by BEC Scam (2024)

FAQs

What is the biggest BEC scam? ›

This article details 16 examples of BEC attacks that have cost victims money, time, and reputation, to help you avoid making the same mistakes.
  • 1. Facebook and Google: $121m BEC scam. ...
  • Ubiquiti: $46.7m vendor fraud. ...
  • Toyota 2019: $37 million BEC attack. ...
  • Obinwanne Okeke: $11 million in losses.

What is the Facebook and Google $121 M BEC scam? ›

3. Facebook and Google: $121m BEC scam

Evaldas Rimasauskas allegedly impersonated an outside vendor by emailing staffers, requesting payment with convincing-looking invoices. After the companies sent urgent wire transfers, he transferred the funds to various bank accounts worldwide.

What dangers could result from a successful BEC attack? ›

The dangers of BEC

Face widespread identity theft if personally identifiable information is stolen. Accidentally leak confidential data like intellectual property.

What actions should you take to stop a business email compromise bec attack? ›

Below are some self-protection strategies your business can employ:
  • Avoid free web-based e-mail accounts. ...
  • Enable multi-factor authentication for business email accounts. ...
  • Don't open any email from unknown parties. ...
  • Secure your domain. ...
  • Double-check the sender's email address. ...
  • “Forward,” don't “reply” to business emails.

What is the biggest stock scam in the US? ›

Bernie Madoff Ponzi Scheme (2008)

The scheme unraveled during the 2008 financial crisis, resulting in billions of dollars in losses for investors. Madoff was convicted and sentenced to 150 years in prison. The case highlighted the need for better regulation and due diligence in the financial industry.

Who was the largest scam in US history? ›

Bernard Lawrence Madoff (/ˈmeɪdɔːf/ MAY-dawf; April 29, 1938 – April 14, 2021) was an American financial criminal and financier who was the admitted mastermind of the largest known Ponzi scheme in history, worth an estimated $65 billion.

Does Facebook track you on Google? ›

Data is collected from various sources, including search engines like Google, to enable the platform to personalize content and advertisem*nts. Facebook utilizes clickstream data, search data, purchase data, and profile data to understand user preferences.

Who was the guy who sent bills to Google? ›

Evaldas wasn't a hacker or an insider. He used a simple email phishing scheme to trick some of the smartest people and companies in the world. He posed as a partner company, Quanta Computer, and sent fake invoices to Google and Facebook.

Is scammer using Google Chat? ›

Do scammers use Google Chat? Anyone with a gmail address can join Google Chat and reach out to users. This makes the platform prone to scams like phishing attempts, fake job offer scams, and fake giveaway scams.

Who is most often targeted in BEC attack style emails? ›

Data Theft: BEC attacks are not only designed to steal money from a company. This type of attack targets HR and Finance personnel and attempts to steal sensitive information about an organization's employees. This information can then be sold on the Dark Web or used in planning and executing future attacks.

What is the average cost of a BEC attack? ›

BEC Attack Frequency Doubles in 2023

The rate of these attacks peaked in October with a monthly average of 14.57 attacks per 1,000 mailboxes. According to FBI IC3 data, the average cost of a successful business email compromise attack is more than $125,000.

Who might a hacker pretend to be in a BEC attack style email? ›

In a BEC attack, a cybercriminal (or cybercriminal gang) sends employees of the target organization emails that appear to be from a fellow employee, a vendor, partner, customer or other associate.

What is the first stage of a BEC attack? ›

Step 1 – Identify the Target Victim

The first step in a BEC attack may be the most time-consuming. During this step, a criminal organization researches the victim to develop an accurate profile of the company.

Which four of the following are common red flags of BEC phishing? ›

Unfamiliar or unusual senders or recipients. Spelling or grammar errors. Request for money or personal information. Call to action, such as clicking a link or downloading an attachment.

What are some identifiers of a BEC attack? ›

How to spot a BEC
  • Bogus email address. One of the first components you should look out for in a spoofed email is the email address. ...
  • Malicious links or attachments. ...
  • Legitimate vendors or executive emails. ...
  • Scheduling and timing. ...
  • Email content. ...
  • Request for payment or change of payment details.
Aug 2, 2023

What was the biggest green scam in America? ›

In July 2011, Denver's 5280 Magazine wrote about Mantria and Speed of Wealth in "The Biggest Green Scam in America". On August 5, 2011, after nearly 21 months, Federal Judge Arguello ruled the Mantria case a ponzi scheme. Arguello called Mantria a Ponzi scheme operating with "sociopathic greed".

What are the examples of bec in real life situations? ›

Examples of BEC Attacks
  • Tech Giants Google and Facebook. From 2013 to 2015, Evaldas Rimasauskas carried out a series of BEC scams, leading him to a 5-year sentence in federal prison. ...
  • Toyota Boshoku Corporation. ...
  • French Film Production Pathé ...
  • False Invoice Scam. ...
  • CEO Frauds. ...
  • Account Compromise. ...
  • Attorney Impersonation. ...
  • Data Theft.
Jun 23, 2022

What type of BEC scam? ›

In BEC attacks, attackers often use spear phishing techniques to target specific individuals, impersonating a company's high-level executives, partners, or suppliers to manipulate employees into making financial transactions, like wire transfers or sharing sensitive company data.

What is CEO BEC scam? ›

CEO/BEC fraud occurs when an employee authorised to make payments is tricked into paying a fake invoice or making an unauthorised transfer out of the business account.

Top Articles
Latest Posts
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 6343

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.