Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Ed Sheeran Asks Fans to Choose Songs for Australia & New Zealand Tour

    January 18, 2026

    FBI asks agents to voluntarily travel to Minneapolis

    January 18, 2026

    Trump’s Stupidity Is Destroying His Presidency

    January 18, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Business Email Compromise Scams Are Poised to Eclipse Ransomware
    Technology

    Business Email Compromise Scams Are Poised to Eclipse Ransomware

    By AdminJune 6, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Business Email Compromise Scams Are Poised to Eclipse Ransomware


    Ransomware attacks, including those of the massively disruptive and dangerous variety, have proved difficult to combat comprehensively. Hospitals, government agencies, schools, and even critical infrastructure companies continue to face debilitating attacks and large ransom demands from hackers. But as governments around the world and law enforcement in the United States have grown serious about cracking down on ransomware and have started to make some progress, researchers are trying to stay a step ahead of attackers and anticipate where ransomware gangs may turn next if their main hustle becomes impractical.

    At the RSA security conference in San Francisco on Monday, longtime digital scams researcher Crane Hassold will present findings that warn it would be logical for ransomware actors to eventually convert their operations to business email compromise (BEC) attacks as ransomware becomes less profitable or carries a higher risk for attackers. In the US, the Federal Bureau of Investigation has repeatedly found that total money stolen in BEC scams far exceeds that pilfered in ransomware attacks—though ransomware attacks can be more visible and cause more disruption and associated losses. 

    In business email compromise, attackers infiltrate a legitimate corporate email account and use the access to send phony invoices or initiate contract payments that trick businesses into wiring money to criminals when they think they’re just paying their bills.

    “So much attention is being paid to ransomware, and governments all over the world are taking action to disrupt it, so eventually the return on investment is going to be impacted,” says Hassold, who is director of threat intelligence at Abnormal Security and a former digital behavior analyst for the FBI. “And ransomware actors are not going to say, ‘Oh, hey, you got me’ and go away. So it’s possible that you would have this new threat where you have the more sophisticated actors behind ransomware campaigns moving over to the BEC space where all the money is being made.”

    BEC attacks, many of which originate in West Africa and specifically Nigeria, are historically less technical and rely more on social engineering, the art of creating a compelling narrative that tricks victims into taking actions against their own interests. But Hassold points out that a lot of the malware used in ransomware attacks is built to be flexible, with a modular quality so different types of scammers can assemble the combination of software tools they need for their specific hustle. And the technical ability to establish “initial access,” or a digital foothold, to then deploy other malware would be extremely useful for BEC, where gaining access to strategic email accounts is the first step in most campaigns. Ransomware actors would bring a much higher level of technical sophistication to this aspect of the scams.

    Hassold also points out that while the most notorious and aggressive ransomware gangs are typically small teams, BEC actors are usually organized into much looser and more decentralized collectives, making it more difficult for law enforcement to target a central organization or kingpin. Similar to Russia’s unwillingness to cooperate on ransomware investigations, it has taken time for global law enforcement to develop working relationships with the Nigerian government to counter BEC. But even as Nigeria has put more emphasis on BEC enforcement, countering the sheer scale of the scam operations is still a challenge.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleLiz Woods’ Weight-Loss Secrets Revealed
    Next Article The best products we’ve tested in May: Pillows, budget laptops and more

    RELATED POSTS

    Why Silicon Valley is really talking about fleeing California (it’s not the 5%)

    January 18, 2026

    Reddit Has Thoughts on Paris Hilton Cookware. So Do We

    January 17, 2026

    AI cloud startup Runpod hits $120M in ARR — and it started with a Reddit post  

    January 17, 2026

    Ads Are Coming to ChatGPT. Here’s How They’ll Work

    January 16, 2026

    Silicon Valley’s messiest breakup is definitely headed to court

    January 16, 2026

    Why ICE Can Kill With Impunity

    January 15, 2026
    latest posts

    Ed Sheeran Asks Fans to Choose Songs for Australia & New Zealand Tour

    Ed Sheeran is putting part of his Australia and New Zealand Loop Tour directly in…

    FBI asks agents to voluntarily travel to Minneapolis

    January 18, 2026

    Trump’s Stupidity Is Destroying His Presidency

    January 18, 2026

    Trump plans executive order protecting Army-Navy game broadcast slot

    January 18, 2026

    Why Silicon Valley is really talking about fleeing California (it’s not the 5%)

    January 18, 2026

    First treaty to protect the high seas comes into force

    January 18, 2026

    Matt Damon Says Netflix Wants Plots Reiterated for Distracted Viewers

    January 18, 2026
    Categories
    • Books (1,008)
    • Business (5,913)
    • Events (29)
    • Film (5,849)
    • Lifestyle (3,959)
    • Music (5,950)
    • Politics (5,914)
    • Science (5,264)
    • Technology (5,843)
    • Television (5,527)
    • Uncategorized (6)
    • US News (5,901)
    popular posts

    Woolworths Cuts Expectations for Australian Food Earnings

    Australian grocer Woolworths expects fiscal first-half earnings in its key Australian food division to be…

    These Nanobots Can Swim Around a Wound and Kill Bacteria

    May 12, 2022

    The Front Room review – a strangely scatalogical chamber piece

    October 27, 2024

    AI went to Washington and here’s what you need to know about this mind-blowing technology

    May 22, 2023
    Archives
    Browse By Category
    • Books (1,008)
    • Business (5,913)
    • Events (29)
    • Film (5,849)
    • Lifestyle (3,959)
    • Music (5,950)
    • Politics (5,914)
    • Science (5,264)
    • Technology (5,843)
    • Television (5,527)
    • Uncategorized (6)
    • US News (5,901)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    First treaty to protect the high seas comes into force

    January 18, 2026

    Matt Damon Says Netflix Wants Plots Reiterated for Distracted Viewers

    January 18, 2026

    Blake Shelton Shares Non-Filtered Thoughts On Dry January

    January 18, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT