Resecurity Identifies AI Tool Being Used to Compromise Business Email

Resecurity, a provider of cybersecurity services, this week identified a GXC Team cybercriminal syndicate that has developed a tool that makes use of artificial intelligence to generate invoices that are then embedded within a business email compromise attack.
The Business Invoice Swapper tool being made available by GXC Team uses proprietary algorithms to scan compromised emails through POP3/IMAP4 protocols, identifying messages that either mention invoices or include attachments with payment details.
Upon detection, the tool alters the banking information of the intended recipient with information automatically generated by the perpetrator.
The altered invoice is then either replaced in the original message or sent to a predetermined list of contacts.
The interface for Business Invoice Swapper also includes options to configure simple mail transfer protocol settings for sending out emails with the fabricated invoices it generates.
The tool also includes a feature that sends reports to a designated Telegram channel to provide command-and-control communication.
This functionality also extends to providing details about the generated invoices.
For the tool to function, the operator must input a list of compromised email accounts to be scanned.
This process involves specifying the credentials, as well as the IBAN and BIC codes that will be used for the 'swapping' or spoofing process in the documents.
Thus far, the tool is designed to specifically target more than 300 entities, with attacks thus far primarily located in the United Kingdom, Spain, France, Poland, Italy, Germany and Switzerland.
Resecurity CEO Gene Yoo said the level of sophistication enabled by Business Invoice Swapper would require organizations to apply significantly higher levels of vigilance when processing invoices.
Today, there is often a tendency within organizations to pay automatically and issue payments without always checking invoice details, he noted.
Many fake invoices will be accompanied by messages conveying a sense of urgency, so organizations should make sure they review any payments being made outside of any normal workflow, added Yoo.
One of the issues that organizations need to come to terms with is that it has become much simpler to wire funds using various online services, any one of which might be used by cybercriminals to facilitate a payment, said Yoo.
Hopefully, AI tools will enable organizations to identify fake invoices, but as tactics and techniques evolve, an AI-based system is going to need to be continuously updated with fresh data to identify attacks, so there will always be a need for humans to review payments, he added.
It's not clear to what degree AI in the hands of cybercriminals might require organizations to completely revamp invoice processing workflows, but it's all but certain the amount of fraud being perpetrated is about to exponentially increase.
The challenge now is making sure there are enough humans aided by machines in place to thwart attacks that could easily lead to organizations collectively losing billions of dollars that will never be recovered.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 04 Jan 2024 13:13:26 +0000


Cyber News related to Resecurity Identifies AI Tool Being Used to Compromise Business Email

Resecurity and ICS Technologies join forces to improve cybersecurity in Iraq - Resecurity and ICS Technologies IRAQ, a well-established ICT System Integration Company with HQ in Baghdad, Iraq, have joined forces to fortify cybersecurity, fraud prevention and risk intelligence measures nationwide. This strategic partnership is ...
1 year ago Helpnetsecurity.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
5 months ago Esecurityplanet.com
10 Best Email Security Gateways in 2025 - Barracuda Email Security Gateway is a solution that helps protect organizations from email-borne threats such as spam, viruses, phishing, and other malicious content. It uses various methods, including filtering, encryption, and sandboxing, to ...
2 weeks ago Cybersecuritynews.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
1 year ago Securityzap.com
Resecurity Identifies AI Tool Being Used to Compromise Business Email - Resecurity, a provider of cybersecurity services, this week identified a GXC Team cybercriminal syndicate that has developed a tool that makes use of artificial intelligence to generate invoices that are then embedded within a business email ...
1 year ago Securityboulevard.com
Hacked Iraqi Voter Information Found for Sale Online - A team of researchers this month uncovered the sale of voter data stolen in an apparent hack against Iraq's Independent High Electoral Commission - yet incident in a pattern of increased malicious activity targeting elections in the Middle East and ...
1 year ago Darkreading.com
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
1 year ago Cybersecuritynews.com
Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning - Our structured query language (SQL) injection detection model detected triggers containing unusual patterns that did not correlate to any known open-source or commercial automated vulnerability scanning tool. We have tested all malicious payloads ...
5 months ago Unit42.paloaltonetworks.com
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
1 year ago Itsecurityguru.org
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
1 year ago Itsecurityguru.org
What is an email signature? - An email signature - or signature block or signature file - is the block of text that appears at the end of an email message that provides more information about the sender. This can include details such as the sender's full name, occupation or job ...
1 year ago Techtarget.com
Beware: PayPal "New Address" feature abused to send phishing emails - The email includes the new address that was allegedly added to your PayPal account, including a message claiming to be a purchase confirmation for a MacBook M4, and to call the enclosed PayPal number if you did not authorize the purchase. The goal of ...
2 weeks ago Bleepingcomputer.com
February 1, 2024: A Date All Email Senders Should Care About - For any organization sending bulk email or high email volumes to Google and Yahoo accounts, there's one date you should have flagged on your calendar. On February 1st, guidance indicates you'll need to pay attention if you are sending over 5000 ...
1 year ago Feedpress.me
Essential Email and Internet Safety Tips for College Students - Your email is one of the most important digital assets and identities because it helps you create accounts on other platforms. Securing your email requires you to pay attention to your passwords, gadgets, and the links you engage with. The places you ...
1 year ago Securityboulevard.com
URL Hunting: Proactive Cybersecurity Designed to Improve Outcomes - Lately, our sales teams have found a message that's resonating within the business community: IT administrators are looking for more proactive ways to identify and evaluate threats within their company's email data. They want to be able to extend ...
1 year ago Cyberdefensemagazine.com
Hundreds of Network Operators' Credentials Compromised on Dark Web - Leaked creds of RIPE, APNIC, AFRINIC, and LACNIC are available on the Dark Web. After doing a comprehensive scan of the Dark Web, Resecurity discovered that info stealer infections had compromised over 1,572 customers of RIPE, the Asia-Pacific ...
1 year ago Cysecurity.news
Security Boulevard - With the rising volume of fraudulent emails and AI-enhanced phishing scams, industry giants such as Google, Yahoo, and Microsoft have doubled their email security efforts. DMARC builds on two existing email authentication technologies: Sender Policy ...
1 year ago Securityboulevard.com
Concerned About Business Email Compromise? 4 Technologies That Can Help - Business email compromise is a sophisticated form of cybercrime that targets commercial, governmental and non-profit organizations. The cybercriminal impersonates a senior executive or a key vendor and sends an email to an unsuspecting employee with ...
1 year ago Securityboulevard.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
1 year ago Securityzap.com
Fake Tokens Exploit BRICS Investment Hype - A rising trend in cryptocurrency counterfeiting has been identified by security researchers, particularly targeting Fortune 100 companies. According to a report published by Resecurity researchers today, these efforts involve the creation of tokens ...
1 year ago Infosecurity-magazine.com
Best Paid and Free OSINT Tools for 2024 - Open Source Intelligence tools are software applications or platforms used to collect, analyze, and interpret publicly available information from various online sources, aiding in investigations, research, and intelligence gathering. These OSINT ...
11 months ago Hackread.com
What are OSINT Tools - Open Source Intelligence (OSINT) tools are incredibly useful for companies, organizations, cybersecurity researchers, and students. This article will discuss the 15 best OSINT tools that can be used for investigations and educational purposes. OSINT ...
2 years ago Hackread.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Bitdefender Email Protection identifies potentially dangerous content in webmail - Bitdefender launched Email Protection, a new feature that scans and identifies potentially dangerous content such as phishing attempts and online scams, in webmail accessed from any device. Email Protection allows users to extend one of the world's ...
1 year ago Helpnetsecurity.com
Dark Web Tool Arms Ransomware Gangs: E-commerce & Aviation Industries Targeted - Cybersecurity researchers have published two concerning reports where the first report highlights the surge in cyber attacks against the aviation and aerospace industries - And the second report exposes a dark web tool called TMChecker fueling ...
11 months ago Hackread.com LockBit

Latest Cyber News


Cyber Trends (last 7 days)