CEO scammers are now 'shipmentlifting' physical goods

A common scam has evolved from stealing money from companies to taking actual products that they produce or sell.

According to the FBI, a number of incidents have recently arisen where scammers target physical goods instead of tricking victims to execute wire transfers. In one instance, four fraudulent companies using real employee names placed a $600,000 order for milk powder from a food manufacturer. (Photo: WavebreakmediaMicro/Adobe Stock)

Business email compromise (a.k.a., CEO fraud) attacks are a highly targeted form of phishing where scammers impersonate a C-level executive or a critical supplier by spoofing websites, hijacking emails, faking social media profiles, leveraging deepfake video and other tactics, to make their identities appear more believable and trustworthy. They then instruct victims to carry out unauthorized wire transfers, purchase gift cards, update billing and banking information or other common financial transaction. BEC scams are probably one of the most profitable, low-tech cybercrimes. Global businesses lost a whopping $43 billion to BEC between 2016 and 2021. Some estimate BEC is 64 times costlier than ransomware attacks.

BEC attacks now steal large food shipments

In a recent evolution of BEC tactics profiled in an FBI joint cybersecurity advisory, bad actors are using BEC techniques to snatch food shipments worth hundreds of thousands of dollars. As The Register so aptly put it, “The escalation from shoplifting to shipmentlifting is, if nothing else, black-market capitalism in action.”

How does this scam work?

According to the FBI report, a number of incidents have recently arisen where scammers target physical goods instead of tricking victims to execute wire transfers. In one instance, four fraudulent companies using real employee names placed a $600,000 order for milk powder from a food manufacturer. The orders were picked up and the victim company did not realize something was wrong until they didn’t receive payment.

How can businesses mitigate risks of BEC attacks that steal physical goods?

Regardless of whether a BEC attack targets physical goods or money, the underlying guidance remains the same, which is to stay alert and don’t trust anything at face value. Below are some best practices businesses can follow to mitigate the risks associated with BEC attacks:

Because BEC attacks most often exploit human frailties (like gullibility, impatience, impulsiveness, etc.), and are seldom detected by technical cybersecurity controls, it’s extremely important that organizations invest in building a security culture that includes a healthy dose of skepticism. Train staff to become the first and last line of defense to thwart scams proactively.

If your organization encounters a fraud or BEC activity, immediately report it to the FBI’s Internet Crime Complaint Center at ic3.gov/Home/BEC.

Stu Sjouwerman is the founder and CEO of KnowBe4, [NASDAQ: KNBE] developer of security awareness training and simulated phishing platforms, with over 54,000 customers and more than 25 million users. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.”

Related: