These attacks are relatively simple for cyber criminals to carry out – all they need is access to an email account and some patience as they try to trick victims into making financial transfers under false presences. This commonly involves sending messages to employees, purportedly from their boss or a colleague, that suggest a payment – often very large – must be made quickly in order to secure an important business deal.
With money to be made in this way, cyber criminals are increasingly turning towards BEC campaigns and businesses are falling victim. According to cybersecurity analysts at Arctic Wolf, the number of BEC attacks to which they have responded doubled between January-March and April-June – and these attacks accounted for over a third of all incidents investigated.
There was a common theme among many of the victims: according to incident responders, 80% of the organisations that fell victim to BEC attacks didn't have MFA in place.
Multi-factor authentication provides an extra layer of security for email accounts and cloud application suites, requiring the user to verify that it really was them who logged into the account, helping to protect against unauthorised intrusions – even if the attacker has the correct username and password.
"MFA requires careful planning and coordination to implement successfully, ensuring that organizations can continue to operate without disruption. Because users require training in how to use the MFA system, this may be difficult for some organisations," Adrian Korn, manager of threat intelligence research at Arctic Wolf Labs, told ZDNET.
"In addition, configuring and testing a new MFA deployment across an organisation can place a heavy burden on already strained IT departments," he added.
Despite these potential restraints, applying MFA to all user accounts is one of the most significant things organisations can do to help protect their employees and their network from cyberattacks – if they're set up correctly.
"Organisations should plan their MFA deployments out well in advance to account for technical hiccups they may encounter. In addition, organisations should take time to ensure that MFA configurations are tested ahead of prime time and that users are well-trained on how to use the new MFA platform of choice," said Korn.
There different methods which organisations can use to provide staff with MFA. One of the most common is by using identity and access management software or authenticator apps to help manage account security by requiring login attempts to be verified by with the use of an alert sent to smartphone mobile application. Only after the push alert or code has been accepted will the user be able to login to their account.
Another way of providing users with MFA is by providing them with a hardware key which must be plugged into the device being used to login to the account before it can be accessed.
With BEC attacks using social engineering to trick people into thinking they're doing the right thing, it's also important for organisations to train their employees to detect when a request – even if it comes from a legitimate account – could be suspicious.
"Users should be trained to recognise suspicious financial requests. If something feels off, users should heed that instinct and inquire further. Urgent financial requests should be validated through additional means before finalising major transactions," said Korn.