{"id":1742,"date":"2018-07-23T18:42:16","date_gmt":"2018-07-23T18:42:16","guid":{"rendered":"http:\/\/www.blackopspartners.com\/?p=1742"},"modified":"2018-07-23T18:42:16","modified_gmt":"2018-07-23T18:42:16","slug":"fbi-email-account-compromise-losses-reach-12b","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/fbi-email-account-compromise-losses-reach-12b\/","title":{"rendered":"FBI: Email Account Compromise Losses Reach $12B"},"content":{"rendered":"

Originally published at DARKReading<\/a><\/em><\/p>\n

 <\/p>\n

There were more than 78K business email account (BEC) and email account compromise (EAC) scam incidents worldwide between October 2013 and May 2018.<\/strong><\/p>\n

New FBI data shows that business email compromise (BEC) and email account compromise (EAC) scam losses worldwide spiked 136% from December 2016 to May 2018.<\/p>\n

There were 78,617 BEC\/EAC incidents reported between October 2013 and May 2018, resulting in $12 billion in losses. Of those incidents, 41,058 were in the US, resulting in $2.9 billion in losses. China and Hong Kong banks led the locations for receipt of fraudulent funds, while the UK, Mexico, and Turkey are emerging regions, the FBI report shows.<\/p>\n

“The scam may not always be associated with a request for transfer of funds. A variation of the scam involves compromising legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees,” the FBI said in its public service announcement reporting the latest statistics.<\/p>\n

The real estate industry is the new hot target: from 2015 to 2017, there was an increase of 1,100% of BEC\/EAC victims in that sector.<\/p>\n

The following BEC\/EAC statistics were reported to the IC3 and are derived from multiple sources, including IC3 and international law enforcement complaint data and filings from financial institutions between October 2013 and May 2018:<\/b><\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Domestic and international incidents:<\/td>\n78,617<\/td>\n<\/tr>\n
Domestic and international exposed dollar loss:<\/td>\n$12,536,948,299<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
The following BEC\/EAC statistics were reported in victim complaints where a country was identified to the IC3 from October 2013 to May 2018:<\/b><\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
Total U.S. victims:<\/td>\n41,058<\/td>\n<\/tr>\n
Total U.S. victims:<\/td>\n$2,935,161,457<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
Total non-U.S. victims:<\/td>\n2,565<\/td>\n<\/tr>\n
Total non-U.S. exposed dollar loss:<\/td>\n$671,915,009<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
The following BEC\/EAC statistics were reported by victims via the financial transaction component of the IC3 complaint form, which became available in June 20163<\/a><\/sup>. The following statistics were reported in victim complaints to the IC3 from June 2016 to May 2018:<\/b><\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
Total U.S. financial recipients:<\/td>\n19,335<\/td>\n<\/tr>\n
Total U.S. financial recipients:<\/td>\n$1,629,975,562<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
Total non-U.S. financial recipients:<\/td>\n11,452<\/td>\n<\/tr>\n
Total non-U.S. financial recipients exposed dollar loss:<\/td>\n$1,690,788,278<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

 <\/p>\n

Read the FBI’s full Public service Announcement here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Originally published at DARKReading   There were more than 78K business email account (BEC) and email account compromise (EAC) scam incidents worldwide between October 2013 and May 2018. New FBI data shows that business email compromise (BEC) and email account compromise (EAC) scam losses worldwide spiked 136% from December 2016 to May 2018. There were […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,21],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1742"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=1742"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1742\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=1742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=1742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=1742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}