• XRATOR
  • Contact Us
  • Privacy & Policy
Conquer your risk
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
  • Home
  • Articles
  • News
  • Research
  • State of the art
No Result
View All Result
Conquer your risk
No Result
View All Result
Home Cybercrime

Food Shipment BEC Attacks: A New Target for Cybercriminals

FBI warns that cybercriminals are targeting organizations in the food sector using Business Email Compromise (BEC) attacks.

Gert Van de VenbyGert Van de Ven
April 7, 2023
in Articles, Cybercrime, Risk Management
0
Food Shipment BEC Attacks: A New Target for Cybercriminals

Business email compromise (BEC) attacks have been on the rise in recent years, with losses due to such scams growing significantly each year. The FBI, along with other federal agencies, have issued a joint advisory that warns of a new target for cybercriminals: the food sector. The advisory reveals that organizations in the food industry are now being targeted using BEC attacks that aim to steal entire shipments of food, costing companies hundreds of thousands of dollars. The criminals behind these schemes may also repackage the stolen goods and resell them, risking contamination and violating food safety regulations.

BEC Attacks Targeting the Food Industry

BEC attacks are now targeting the food sector, with cybercriminals using tactics such as spoofing email addresses and domains or using compromised email accounts belonging to legitimate companies to order large shipments of food products that never get paid. The value of the stolen food reaches, in some cases, hundreds of thousands of dollars. Criminals may also repackage the stolen goods, risking contamination and violating food safety regulations.

Measures to Defend Against BEC Fraud Attempts and Product Theft

Businesses in the food sector that might become the target of such attacks can take measures to defend themselves against BEC fraud attempts and product theft. These measures include training employees on how to identify fraudulent email addresses and domains, implementing user training and phishing exercises to raise awareness about the risks of suspicious links and attachments, and conducting web searches for your company name to identify fraudulent websites that may be used to impersonate you in a scam.

The Rising Cost of BEC Scams

The FBI warns that losses due to BEC scams continue to grow each year, with a 65% increase in identified global exposed losses recorded between July 2019 and December 2021. From June 2016 to July 2019, the FBI’s Internet Crime Complaint Center received complaints about more than 241,000 domestic and international incidents, with a total exposed dollar loss of over $43.3 billion. In 2021 alone, victims have reported roughly $2.4 billion in losses, according to 19,954 complaints linked to BEC attacks and targeting individuals and businesses.

Conclusion

BEC attacks targeting the food sector represent a new challenge for companies operating in the industry. Cybercriminals are using increasingly sophisticated tactics to steal entire shipments of food, costing companies hundreds of thousands of dollars. To defend against BEC fraud attempts and product theft, businesses in the food sector should take measures to train their employees and raise awareness of the risks of suspicious links and attachments. The rising cost of BEC scams highlights the need for increased vigilance and cybersecurity measures across all industries.

Tags: BEC attackscybercrimecybercriminalscybersecurityemail fraudFBIFDAfood industryproduct theftUSDA

Categories

  • Cybercrime
  • Malware
  • Vulnerability & Weakness
  • Threat Intelligence
  • Cyber Attacks
  • Cybersecurity
  • Offensive Security
  • Risk Management
  • Cyberdefense
  • Cyber Insurance

Popular News

  • Cybercriminals regularly hack into individual and organization network. They may steal password to sell them on the darkweb.

    4 websites to check if your password is in the darkweb

    0 shares
    Share 0 Tweet 0
  • 10 Essential Tools for IoT Pentesting

    0 shares
    Share 0 Tweet 0
  • Threat Modeling : from Software Security to Cyber Risk Management

    0 shares
    Share 0 Tweet 0
  • 8 TV Shows and Movies about Personal Data Abuse

    0 shares
    Share 0 Tweet 0
  • The Code Knight: Mastering the Craft of Defensive Programming

    0 shares
    Share 0 Tweet 0

"Conquer Your Risk" is a corporate blog for Cybersecurity and Risk Management executives and specialists, sharing XRATOR experts' views on Cybersecurity, Threat Intelligence, Risk Management and Cyber Insurance.

Categories

  • Articles
  • Cyber Attacks
  • Cyber Insurance
  • Cybercrime
  • Cyberdefense
  • Cybersecurity
  • Malware
  • News
  • Offensive Security
  • Research
  • Risk Management
  • Scams
  • State of the art
  • Threat Intelligence
  • Uncategorized
  • Vulnerability & Weakness

Quick Links

  • XRATOR
  • Our Experts
  • Privacy Policy
  • Contact Us

XRATOR® – copyright 2020-2021

No Result
View All Result
  • Contact Us
  • Homepages

© 2018 JNews by Jegtheme.

Manage Cookie Consent
We use cookies to optimize our website and our service.
By closing this windows, you automatically deny non-functionals cookies.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}