If you work in finance or accounting and receive an email from your boss asking you to transfer some funds to an external account, you might want to think twice.
That's because so-called "whaling" attacks -- a refined kind of phishing in which hackers use spoofed or similar-sounding domain names to make it look like the emails they send are from your CFO or CEO -- are on the rise, according to security firm Mimecast.
If fact, 55 percent of the 442 IT professionals Mimecast surveyed this month said their organizations have seen an increase in the volume of whaling attacks over the past three months, the firm reported on Wednesday.
Those organizations spanned the U.S., U.K., South Africa and Australia.
Domain-spoofing is the most popular strategy, accounting for 70 percent of such attacks, Mimecast said; the majority pretend to be the CEO, but some 35 percent of organizations had seen whaling emails attributed to the CFO.
"Whaling emails can be more difficult to detect because they don't contain a hyperlink or malicious attachment, and rely solely on social engineering to trick their targets," said Orlando Scott-Cowley, a cybersecurity strategist with Mimecast.
(Score: 3, Interesting) by bziman on Sunday December 27 2015, @02:41AM
Outside of the United States, you don't have to submit a blood sample and a first born child to open an account capable of receiving a wire. Even in the United States, it is easy enough to fake the required documentation to open an account. The trick is you only have the account open long enough to receive funds from all of your scams over the course of a day or two, and then you transfer the money out to another account where you have the money converted to a cashier's check or cash or whatever. If you run the money through a country with poor controls, and you make off with the money before anyone has bothered to investigate the accounts, you can get away with this.