Business Email Compromise (BEC) is a type of cybercrime where attackers use email to deceive individuals and businesses into making unauthorised financial transfers or sharing sensitive information. These scams often involve the impersonation of executives, vendors, or trusted partners. The attackers typically infiltrate or spoof legitimate email accounts to trick employees into performing actions that can have severe financial repercussions.
Tax time presents an ideal environment for cybercriminals to strike. The heightened financial activity, increased communications with tax consultants, and urgency to meet deadlines create a fertile ground for successful attacks.
Key reasons why BEC scams spike during this period:
Recognising the signs of a BEC scam is the first step in protecting yourself, and your business. Here are common indicators to watch for:
If you suspect that your business has fallen victim to a BEC scam, the Australian Cyber Security Centre (ACSC) recommends following the below 6 steps:
Step 1: Report the incident
You can report cyber security incidents to the Australian Signals Directorate’s ACSC through ReportCyber.
Your report will go directly to the relevant police jurisdiction. By reporting early, you ensure the best chance of a positive outcome. Your report will also allow authorities to check for similar incidents that have occurred, assist with further investigations, and help others who have been affected.
Step 2: Check your account security
Complete as many of the following steps as possible, or seek support from your Managed IT provider:
Step 3: Notify your contacts and relevant third parties
If you have been hacked or impersonated, you should alert your contacts (such as customers, colleagues and suppliers). This will help them recognise suspicious activity and disregard fraudulent emails such as those that refer to the changing of bank details, requests for large payments or unusual links or attachments.
Step 4: Send a takedown request
Step 5: Contact the email provider
If someone is using a common email provider (such as Gmail) to impersonate you, this is known as display name spoofing.
These spoofed email addresses typically originate from Microsoft’s email services (Outlook, Hotmail, Live, MSN), Gmail, or another third-party email provider like ProtonMail. By using valid vendors, spoofed email addresses can bypass anti-spam or anti-phishing filters as they are not coming from forged email addresses.
Step 6: Protect yourself from future email cyber attacks.
Protective measures can help by:
You can review an extensive list of recommendations to prevent business email compromise via the Australian Signals Directory here.
If you want to educate your employees on how to identify potential cyber threats such as scams, our staff education programs and policy and procedure reviews can help. Our Business Technology Consultants are specialists in improving your internal cyber security.
We offer:
If you need advice on how you can ensure your cyber security strategy is fit for purpose, our team of Cyber Security experts are ready to help. Contact our team on 1300 307 907 today.