When the CEO talks, employees listen. Knowing this, bad actors impersonate C-suite executives in “CEO fraud” spear phishing emails that, if successful, can provide them with access to sensitive company data and systems, or convince the recipient to send money to their accounts.

Any money sent to these scammers gets quickly laundered and dispersed, often becoming unrecoverable. Data, on the other hand, may surface on the dark web, for sale to the highest bidder.

CEO fraud – also known as CEO spear phishing, executive fraud, whaling, and other names – can be a particularly devastating type of attack, as some organizations have already discovered. With the right knowledge and CEO fraud protection tools, however, your business can avoid becoming a victim.

Read on to find out more about CEO fraud and spear phishing in general, including stories about some of the biggest attacks to date. In this post you’ll learn:

  • How some enterprises have fallen for CEO fraud, and the associated costs;
  • How AI is likely to up the ante, increasing CEO fraud and spear phishing attacks;
  • How to spot a phony email from your CEO, CFO, or other business leader; and
  • How to protect your enterprise from becoming the next CEO fraud victim.

Aw, Snap! Some (in)famous CEO fraud incidents

One of the first, and to date the most widely known, CEO fraud attacks hit the disappearing-photos app Snapchat in 2016. By impersonating Snapchat CEO Evan Spiegel, cyber thieves convinced a human resources staffer to send employee payroll information – data that later surfaced on the dark web.

Other companies have been hit in the bank account, some of them hard. An unnamed real estate company in Paris sent nearly 38 million euros to “lawyers” for a widely known French accounting company in late 2021. Europol arrested members of an international network spanning several countries and with bank accounts around the world but recovered only a fraction of the money.

CEO fraud is only one very specific type of business email compromise (BEC), also known as spear phishing. It’s a subset of phishing, another specific type of email crime.

  • In phishing, criminals send out phony emails to a wide range of recipients in the hope that some will click on a phony link or document and install malware on their computer. If it’s a business computer, the bad actors could get access to the company’s entire system, download records, and install ransomware.
  • In spear-phishing, criminals send hand crafted, tailored emails to a narrow list of people whom they’ve researched and targeted for a specific purpose.

AI Raises the Threat

BEC has netted cybercriminals some $3 billion each of the last three years in the U.S. alone, according to Internal Revenue Service (IRS) figures. Companies filed nearly 21,500 phishing reports with the agency in 2023, making it by far the most frequently reported type of cyberattack.

Globally, CEO fraud incidents are said to have skyrocketed – rising 131% – during the COVID-19 pandemic, when most employees worked from home.

CEO fraud works, as we’ve seen. So does spear phishing in general. Worldwide, spear phishing campaigns reportedly result in 66% of all breaches.

But for cybercriminals, CEO fraud and spear phishing have a downside: they require much research and effort to target the right victims. AI will likely make these tasks a lot easier as it enables cybercriminals to create more credible spear phishing campaigns by analyzing publicly available data, mimicking communication language and style, and tailoring messages to each victim.

Copilot AI

How Not to Be a CEO Fraud Victim

“Never trust, always verify” is the best rule of thumb when receiving an email from anyone asking for sensitive information or money or sending links or documents that you don’t expect.

An “urgent” request merits particular caution. When adrenaline rises, your rational mind can be overridden by emotions, causing you to make decisions before you’ve thought the situation through.

If you receive an email from your CEO or any executive asking for anything, take these precautions:

  • Check the sender’s address. Look carefully: a single stray character or missing letter may be the only indicator that something is wrong.
  • Even if everything looks good, call the executive or someone in their office to double-check the request. Don’t ask them to call you: AI makes spoofing someone’s voice increasingly easy to do.

Even the most security-aware employee can make mistakes, however. To fully protect your organization, you need a sophisticated suite of spear phishing protection tools to vet all emails coming in before your employees see them, as well as to safeguard your systems and data from harm.

Advanced Threat Protection Gives CEO Fraud No Chance

Hornetsecurity’s Advanced Threat Protection (ATP) uses Targeted Fraud Forensics with innovative detection methods to prevent losses from CEO fraud, spear phishing, and phishing in general. Our ATP solution provides:

Fraud attempt analysis

  • Checks the authenticity and integrity of metadata and mail content.

Identity spoofing recognition

  • Detect and block forged sender identities.

Intention recognition system

  • Get alerts to content patterns that suggest malicious intent.

Spy-out detection

  • Defend against espionage attacks that aim to obtain sensitive information.

False facts identification

  • Get identity-independent content analysis of news that spots falsified facts.

False facts identification

  • Detect targeted attacks on individuals who are particularly at risk.

Hornetsecurity’s ATP works chiefly with heuristics and some contextual SMTP data (is the sender internal or external?). It uses NLP to analyze large, multilingual datasets of spear phishing emails, and translates the key essence from those emails into heuristics that enable progressively more rapid analysis.

To safeguard your business from CEO fraud and sophisticated phishing attacks, leverage Hornetsecurity’s Advanced Threat Protection. Our ATP solution offers cutting-edge detection and protection, ensuring that your enterprise remains secure from these high-risk threats.

Take the Sting Out of CEO Fraud

CEO fraud and spear phishing aren’t going away. As AI becomes more and more sophisticated, in fact, these types of cyber-attacks will likely become more frequent and effective.

Security awareness can help, but to err is human. Hornetsecurity ‘s ATP uses machine learning technologies such as NLP, and other state-of-the-art technologies to spot and block CEO fraud and spear phishing, beating cybercriminals at their own game. Contact us today to find out how ATP can provide superior CEO fraud protection to your enterprise.

Advanced Threat Protection

FAQ

What is CEO fraud?

CEO fraud, also known as CEO spear phishing or executive fraud, involves cybercriminals impersonating high-level executives to trick employees into divulging sensitive information or transferring money.

How can AI impact CEO fraud?

AI enhances CEO fraud by enabling cybercriminals to create more convincing phishing campaigns through analysis of public data, mimicking communication styles, and personalizing messages to targets.

How can I ensure secure implementation of Copilot for Microsoft 365?

Hornetsecurity’s Advanced Threat Protection (ATP) offers comprehensive defense against CEO fraud and spear phishing by using fraud attempt analysis, identity spoofing recognition, and advanced detection methods to block malicious emails and protect sensitive data.