Cybercriminals continuously evolve their tactics, and one common technique they use is combosquatting—registering domains that closely resemble legitimate businesses by adding common terms like "ltd," "secure," or "support." Recently, we encountered a Business Email Compromise (BEC) attack where threat actors leveraged combosquatting to impersonate a well-known energy company and deceive victims into engaging with fraudulent emails.
As part of normal workflow processes, the recipient typically receives numerous legitimate emails related to routine business operations, making it challenging to distinguish between genuine inquiries and BEC impersonation attempts. In this case, the threat actor crafted an email that closely resembled a standard request for product details. Furthermore, to build credibility, the attacker impersonated a legitimate brand.
BEC Email Impersonating Customer and Features extracted from NACE™
The sender's domain, axpoltd[.]com, was crafted using a combo-squatting technique to impersonate axpo[.]com. In addition to combo-squatting, axpoltd[.]com also used an HTTP 302 Found response to redirect to a legitimate brand. A 302 response indicates that the requested resource has been temporarily moved to a different URL. The Location header in the response specifies the new URL, prompting the web browser to automatically follow the redirect and request the new URL instead. As a result, the client browser follows the redirect and makes a new request to http[:]//www[.]axpo[.]com/, leading to the legitimate website and building trust.
DNS Redirection to a Legitimate Brand.
At the time of writing blog, only one out of 96 Anti Virus vendors in VT were classifying the domain axpoltd.com as SPAM.
Virus Total result for the Sender Domain axpoltd[.]com
By employing Generative and Predictive AI for semantic and thematic analysis, NACE™derives intent from email body. Contextual relationship between SMTP headers, and intent of body aided to determine BEC customer impersonation.
Some of the features which aided in classification are:
Based on our analysis, it appears that the primary goal of the BEC was to:
In conclusion, this BEC campaign highlights the evolving landscape of advanced threats and limitations of traditional security methods.
In contrast, NACE has been designed to detect BEC attacks, whether crafted by threat actors or Generative AI. It employs a robust multimodal, semantic-aware, zero-trust approach, leveraging multiple zero-shot analyses, to enhance resilience against semantic variations introduced by Generative AI, ensuring organizations stay ahead of evasive social engineering tactics, generated by threat actor or AI.