We recently observed a BEC impersonation email at one of our deployments. This BEC Attack Analysis details how the scammer went to great lengths to create an authentic and convincing message that resonated well with the target organization's industry. Following is the screenshot of the email:
Figure: BEC email impersonating Dreistern
The recipient typically receives numerous legitimate Request For Quotation (RFQ) emails as part of routine business operations, making it challenging for them to distinguish between genuine and BEC impersonation attempts. In this case, the scammer crafted an email that closely resembled a standard RFQ request for a product directly relevant to the target's industry. Furthermore, in an attempt to build credibility, the attacker impersonated a legitimate employee, including their official title of 'Manager'. This added layer of deception made it more difficult for users to verify the sender's identity through LinkedIn or other business intelligence platforms like ZoomInfo.
A closer examination of the email header reveals several telling details about the scammer's tactics. The sender is impersonating an employee from Dreistern Inc., attempting to create a veneer of legitimacy.
Upon further investigation, we discovered that the email originated from a recently registered domain: 'dreisterns[.]com'. This domain was only 78 days old at the time of writing and is currently parked on Hostinger. Notably, it is a clear case of typo-squatting - an attempt to deceive users by mimicking Dreistern Inc.'s legitimate domain ('dreistern.com').
The email managed to pass SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) checks. As shown below:
ARC-Authentication-Results: i=3; mx.google.com; dkim=pass header.i=@dreisterns.com header.s=selector1 header.b=hn1YyDyA; arc=pass (i=1 spf=pass spfdomain=dreisterns.com dkim=pass dkdomain=dreisterns.com dmarc=pass fromdomain=dreisterns.com); spf=pass (google.com: domain of *******@dreisterns.com designates 2a01:111:f403:2412::709 as permitted sender) smtp.mailfrom=*******@dreisterns.com |
These security measures are designed to verify the authenticity of emails, but in this case, the scammer properly configured the SPF and DKIM records for the look-alike domain which allowed them to pass email validation checks.
A closer look at the email body reveals a well-crafted attempt to deceive the victim. The language is clear and concise, with no obvious grammatical mistakes that might raise suspicion. The scammer chose a familiar theme - an RFQ request - which is commonly seen in normal business communications for this company. They also included a relevant product from their industry, making it more likely to grab the attention of the victim.
Furthermore, the email includes a standard signature and features the company logo, designed to reinforce legitimacy and establish trust with the victim. Interestingly, there are no URLs or attachments in the email, which may have been deliberately avoided to minimize triggering spam filters. However, this restraint only serves as an initial lure - once the scammer has established a rapport with the victim, they can proceed to make more malicious requests.
Figure: NACETM Intent based approach
This email was flagged as malicious by InceptionCyber’s Neural Analysis and Correlation Engine (NACETM). By leveraging Generative and Predictive AI for semantic and thematic analysis, NACE extracts intent from email content and headers. The contextual relationship between intent and SMTP headers, such as the sender’s domain, enables accurate detection of this BEC email.
NACE's advanced AI models detected a combination of semantics commonly found in Business Email Compromise (BEC) emails, irrespective of whether the email is crafted by threat actor or AI.
The analysis revealed several key characteristics:
In addition to these semantic characteristics, further analysis revealed several features from the sender domain:
While semantic characteristics alone might not indicate malicious intent, when analyzed together with the sender domain features using NACE's proprietary technology, we can confidently conclude that this email is sent with malicious intentions.
Based on our analysis, we can draw some insights into this BEC campaign.
Based on our analysis, it appears that the primary goal of this campaign was to:
In conclusion, this BEC campaign highlights the evolving landscape of advanced threats and the limitations of traditional security measures.
In contrast, NACE has been designed to detect BEC attacks, whether crafted by threat actors or Generative AI. It employs a robust multimodal, semantic-aware, zero-trust approach, leveraging multiple zero-shot analyses, to enhance resilience against semantic variations introduced by Generative AI, ensuring organizations stay ahead of evasive social engineering tactics, generated by threat actor or AI.
Learn more about how Inception Cyber stops the Business Email Compromise attacks that other technology misses.