11 BEC Gang Members Arrested By Interpol

Share post:

Interpol, in partnership with the Nigerian police, has arrested 11 personalities allegedly involved in an international business email compromise (BEC) ring. 

BEC refers to an attack done via email involving the spear-phishing of company employees responsible for approving payments to contractors and suppliers.

By impersonating a coworker, a supervisor, or a client/supplier, BEC actors are able to divert payments to their bank accounts, therefore stealing them from the business being targeted.

The Interpol operation, codenamed ‘Falcon II,’ happened between December 12 and 22 of last year.  Leads provided by cyber-intelligence firms Group-IB and Palo Alto Networks’ Unit 42 were followed by the police, leading to the arrest of suspects in Lagos and Asaba.

Based on the available evidence, the Interpol is convinced that some of the arrested persons are members of  the BEC gang known as SilverTerrier (aka TMT).

This is the second arrest of members of the notorious gang after the Interpol arrested many of them during the so-called ‘Falcon I” operations last year. 

According to a report by Palo Alto Unit 42, most of the arrested persons have had a long involvement in or prior convictions for BEC scams.

BEC scammers are unable to steal funds using untraceable cryptocurrencies. Hence, the only way for them to hide is by moving funds around to obscure the money trail.

Despite this, the international collaboration and global exchange between law enforcement and intelligence agencies have made the world of BEC scammers much smaller.

To be able to fight off potential BEC attacks, multi-factor authentication along with choosing a strong and unique password are highly recommended practices. 

Organizations should also protect their domain from spoofing by registering potential domain typo-squatting candidates and telling their workers not to over-share business information especially online.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways