Researchers from the Secureworks Counter Threat Unit (CTU) have recently uncovered a threat group known as Gold Galleon, who have been targeting victims via Business Email Compromise (BEC).
BEC is a targeted phishing technique where criminals attempt to gain access to business email accounts, typically those of Financial Directors or Finance/Account Executives, which enables them to intercept the emails and transactions between two companies. At an appropriate time, they then modify the financial details of transactions to direct funds to their own accounts. What makes the Gold Galleon crew unique amongst other BEC groups is that they appear to be focussing their attacks solely on global maritime shipping businesses and their customers.
CTU researchers have observed Gold Galleon targeting firms across the globe including in South Korea, Japan, Singapore, Norway, US, Egypt and Saudi Arabia. As described above, their attacks start with a spear phishing email containing a malicious attachment intended to compromise the victim. If the malware is successfully deployed, the group then monitor existing business transactions and, when the time comes for the exchange of payment details, they intervene and change the destination bank account on the invoice to one controlled by themselves.
To help mitigate the threat of BEC, companies are encouraged to raise awareness to help prevent employees from clicking on spear phishing emails. Staff involved in invoice payments should be particularly vigilant and should also confirm any suspicious payment instructions via a previously established non-email mode of communication (e.g by phone). We also recommend that users thoroughly check email addresses for accuracy or any subtle changes of single characters, as the use of spoof accounts which have made minor changes to trusted email addresses is also a common technique. Whilst some of these measures do undoubtedly add more time to the payment and verification process, it does provide a greater level of assurance and may help prevent such attacks from occurring in the future.
PGI offer a Phishing Vulnerability Assessment. We will send a series of mock malicious e-mails to your staff to gauge their vulnerability to compromised links, followed by training for your staff.
Protection Group International believes that cyber security doesn’t need to be overly complicated, incomprehensible or vastly expensive. We specialise in delivering strategic vulnerability assessment services and offer a range of senior cyber awareness education to enable you to tackle cyber threats in-house. For more information click here.
Our partner company, Protection Vessels International, is focussed on the efficient delivery of high quality, cost effective security solutions for the maritime community. We invest in our well-maintained logistic infrastructure to enhance customers’ business continuity through the protection of their assets and people. For more information click here.
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.