Page 25 - AASBO Winter 2019.indd
P. 25

BY JOHN FLANDERS


               e ABCs of BEC — Business Email Compromise




              In years past, hackers had to in  ltrate computer networks   services (e.g., construction, janitorial services) or purchases (e.g.,
            to steal funds  or sensitive information. By  updating their  vehicles, playground equipment). Alternatively, an employee
            methods, online criminals are increasingly able to achieve their  may receive an email from a “vendor” — really, a hacker
            unscrupulous ends through simpler avenues. Unfortunately,  pretending to be a vendor — containing an invoice attachment.
            these crimes are not something that happens to someone else.  Opening the attachment starts the infection process, resulting in
            For example, Arizona school districts have reported a number  malware being downloaded.    e malware can infect the entire
            of such attacks to their property and liability coverage provider,  network, making it inaccessible. When this occurs, instructions
            the Arizona School Risk Retention Trust, Inc. (the Trust). Many  are often given on how to make payments to the hacker to
            of these reports have involved   nancial losses.       decrypt the computer or network. Some malware, too, has the
              The general name for these attacks is “Business Email   ability to obtain credit card or banking information.
            Compromise” (BEC). A BEC scam is an attempt to persuade   Finally, the most common method of stealing sensitive
            someone within an organization to: (1) conduct an authorized  information from school districts is through an email request
            transfer of funds; or (2) provide information that will allow  for W-2 forms around the time they are prepared. In most
            for such a transfer. Earlier this year, the Federal Bureau of  cases, a Human Resources Department employee receives
            Investigation announced that these crimes have cost businesses   an  email  from  someone  posing  as  the  superintendent.     e
            $12.5 billion worldwide.                               “superintendent” requests a copy of W-2s for all employees.
              When targeting schools and other organizations with a  If the employee acquiesces to the request without  first
            BEC scam, the hacker uses a technique known as “social  con  rming its legitimacy, personally identi  able information
            engineering.”    is involves drafting an email to one or more  is released.    is triggers noti  cation requirements and other
            employees that appears to come from someone within the  expensive protections for victims, such as legal services and
            organization.    at person — really, the cyber criminal posing  credit monitoring.
            as that person — asks the employee to verify log-in credentials   School districts should be on high alert for BECs and other
            or take a brief survey that requires the sharing of sensitive  email scams.    is means raising awareness of such scams with
            information.    ese requests often contain a web link to a fake  employees and training them to look for indicators of fakery
            website built to look like the school’s portal.        when asked to send money or sensitive information. Employees
                 is scam works all too often because the return email  should be instructed to look closely at the email address
            addresses used are similar to the organization’s site address   (not just the name) of the sender, and to check for grammar
            (e.g., “@schooldistrict.org” vs. “@schooldistrict.com”; or “@  mistakes in an email. Employees should also be informed not to
            arizonaschooldistrict.edu” vs. “@azsd.com”). Sometimes  click on web links, especially ones that request that they verify
            the hacker simply creates an email address using a popular  their log-in and password information. Finally, employees
            email service provider (e.g., “HRdirector@gmail.com” or   should keep this telltale sign in mind: More often than not, a
            “Superintendent@aol.com”).                             criminal request will stress the urgency of sending money or
              Using this basic approach, hackers have a variety of  information quickly (e.g., by noon, by close of business, “before
            techniques available to them. A hacker might, for example,  you go home”). A bogus request may also include instructions
            request the credentials for a payroll account. With those  not to call the person asking for information.
            credentials in hand, he or she changes the direct deposit   If a fraudulent transfer has already been made and discovered,
            information so that the money is directed to another   nancial  the district’s   nancial institution should be called immediately,
            institution or to prepaid cards.    e crook may then withdraw  and a request should be made for a recall of the funds. Time is
            the money from ATM machines or use the cards to make   of the essence. In some cases, some or all of the funds may not
            purchases.                                             have been withdrawn yet. Similarly, in the event of an actual or
              A related scam involves sending an email request to update  suspected scam, the district’s technology department should be
            banking information for direct deposits. Again, the email  made aware so that it can block further attempts.
            appears to come from a district o   cial; in one case known to
            the Trust, it was designed to look as if it was from the district  If you have questions regarding the contents of this article, or
            superintendent.                                        you would like to know how the Trust can assist your district in
              Another  type  of BEC  involves a wire-transfer  scam  that  addressing the threat of cyber crimes, please contact your Trust
            attempts to trick someone into issuing an electronic payment for  member services coordinator at (800) 266-4911.



            WINTER 2019  |  THE EDGE                                                                                 25
   20   21   22   23   24   25   26   27   28   29   30