Which of the following scenarios describes a possible business email compromise attack?
Which of the following scenarios describes a possible business email compromise attack?
A Business Email Compromise (BEC) attack involves an attacker impersonating a trusted individual within an organization or compromising a legitimate business email account to deceive employees into taking actions that compromise security. Given this, the scenario where a service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account best fits this description. This is because the attacker is impersonating a high-level authority to gain sensitive information, which is a common tactic in BEC attacks.
C. In a BEC attack, the attacker typically impersonates a high-ranking executive or authority figure within the organization and requests sensitive information or actions from employees. In this case, the HR director is requesting log-in credentials for a cloud administrator account, which is a classic example of BEC where the attacker seeks to gain access to privileged accounts through deception.
Answer: A. It could be C if there wasn't a better option, but a BEC is about impersonating, and in the answer choice C it doesn't specify that someone is acting as hr, whereas A is a better choice because they are clear that someone is being impersonated. Your boss requests documents all the time, they don't need to demand it. The choice is clearly A.
Option A describes an executive whaling attack Option B describes a ransomware attack Option D describes a phishing attack to harvest credentials Option C describes a BEC attack. Business email compromise (BEC) attacks involve an attacker gaining access to a legitimate business email account or impersonating a trusted figure within an organization to deceive employees into taking actions that compromise security. The service desk employee received an email from the legitimate HR director account. This means the HR director's email account has been compromised, and the attacker is attempting to access sensitive information by requesting login credentials from the service desk employee.
The answer is A. A whaling attack is also referred to as a Business Email Compromise attack (BEC).
Everywhere I read from credible online sources like FBI, CloudFlare, Cisco, etc., state that BEC is financially motivated and is the main goal, not compromising credentials. Professor Messer even mentions financial fraud.
i think you are right in your answer, C is more like credential harvesting and not a BEC attack
C. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account. Here’s the reasoning: • Business Email Compromise (BEC) attacks typically involve a cybercriminal impersonating a trusted person, such as an executive or a manager, to trick employees into divulging sensitive information, making unauthorized wire transfers, or performing actions that compromise the security of the organization. • Scenario C fits this description because it involves an attacker impersonating the HR director to trick a service desk employee into providing sensitive log-in credentials. This is a common tactic in BEC attacks.
A business email compromise (BEC) attack typically involves an attacker impersonating a legitimate business email account to deceive an organization or its employees into making unauthorized transactions or divulging sensitive information. A. - This is a common form of BEC, where the attacker impersonates an executive to request a gift card purchase or other financial action. B. - This describes a ransomware attack, not a BEC. Ransomware typically encrypts files and demands a ransom for decryption. C. - This scenario is a BEC attack, where the attacker impersonates an HR director to gain sensitive credentials. D. - This describes a phishing attack. While phishing can be part of a BEC attack, it is not a BEC attack itself unless it involves the specific impersonation and fraudulent intent typically seen in BEC. The scenario that best describes a possible business email compromise attack is: C.
So by your reasoning both A and C are BEC?
It's A because THE Classic BEC attack comes in the form of an attacker emailing an internal asking for them to purchase gift cards with the company debit card for a 'future meeting that they don't have time to handle.' This is a scam as it's not really the CFO or whoever and they'll ask you to leave the gift cards 'outside' or somewhere where the attacker can take them. It's also so low in monetary value that nobody cares to investigate, thus enabling the attackers to continue operating with impunity. C is way more than a BEC.
A does not qualify as a BEC, it's just a regular phishing attack. In option C, the email could actually be compromised because it came from the legitimate HR director's address, suggesting that their email has been compromised.
C is the correct answer. A is a close second but beware the wording on this one. Answer A indicates this is a spoofed account while answer C appears to be an actual compromise of the HR directors email where an attacker has control.
C is the obvious choice Contact me for full questions at <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="3b4f535e5a154856524f53090b7b544e4f5754545015585456">[email protected]</a>
I believe the answer is C. In the A scenario, an employee receives an email "that has an executive’s name in the display field" which does not necessarily mean that it came from an executive, while in C scenario it explicitly says that an email came from the HR director.
The Answer is A: Read carefully...The attacker impersonates an executive or high-level authority within the company to deceive employees into taking actions like sending money. This scenario describes an attempt to trick employees into purchasing gift cards by pretending to be an executive, which is a classic example of BEC. Example: An attacker sends an email claiming to be from the CEO asking the recipient to buy gift cards and send the details back, leveraging the EXECUTIVE'S NAME to create a sense of urgency and authority.
Answer is A. I first picked "C", but the key words in the question is "Gift card Request", seriously, why would an executive REQUEST a gift card from a subordinate?
Common Types of BEC Attacks: CEO Fraud: The attacker impersonates a high-ranking executive, instructing an employee to transfer funds to a fraudulent account.
C for sure, anyone can look up an executives name but receiving an email from the actual HR director's email address and not a look alike is a bigger threat.
Obviously, it's C Why does HR need a Cloud Admin Password
BEC is a mail seeming to have come from a known identifiable colleague. C is right.
Business Email Compromise (BEC) ● Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker ● Taking over a legitimate business email accounts through social engineering or cyber intrusion techniques to conduct unauthorized fund transfers, redirect payments, or steal sensitive information
C for me on this one. A could possibly be a BEC, however the attacker is only impersonating the "Name" of the CEO, where as the HR Director has had his/her email actually compromised.