{"id":974,"date":"2016-05-31T19:43:29","date_gmt":"2016-05-31T19:43:29","guid":{"rendered":"http:\/\/54.201.249.27\/?p=974"},"modified":"2016-05-31T19:43:29","modified_gmt":"2016-05-31T19:43:29","slug":"sc-magazine-ceo-sacked-aircraft-company-grounded-whaling-attack","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/sc-magazine-ceo-sacked-aircraft-company-grounded-whaling-attack\/","title":{"rendered":"SC Magazine: CEO sacked after aircraft company grounded by whaling attack"},"content":{"rendered":"

CEO sacked after aircraft company grounded by whaling attack.<\/h1>\n

The CEO of an Austrian aircraft parts manufacturer has been sacked after the company lost \u20ac40.9 million (\u00a331 million) to a whaling attack.<\/p>\n

A whaling attack is also known as a C-level fraud and BEC (business email scam) and involves targeting high level executives with forged emails asking for urgent payments. Usually they are spoofed to appear to come from a trusted colleague or business partner.<\/p>\n

FACC Operations GmbH is an Austrian company that produces spare parts for major aircraft manufacturers. In January it\u00a0revealed<\/a>\u00a0that it had been the victim of an email fraud in which it lost \u20ac50 million (\u00a338 million) as a result of the CEO falling for a whaling attack.<\/p>\n

Since then the company reports it managed to recover \u20ac10 million, reducing the losses to \u20ac40 million. This loss wiped out its profits for the year, resulting in a net loss of \u20ac23 million (\u00a317.5 million).<\/p>\n

The company had previously stated that while the amount lost had been large, it didn’t pose an \u201ceconomic threat to the company\u201d, although it did lead to an immediate 17 percent drop in its share price.<\/p>\n

The CEO, Walter Stephan, was sacked following the release of the company’s annual results. He had been CEO for the past 17 years. The company sacked its chief financial officer over the same incident in February.<\/p>\n

Ryan Kalember, senior vice president of cybersecurity strategy at Proofpoint, warned that BECs are hitting all industries, with no sign of it letting up. \u201cAs evident with this unfortunate FACC event, these attacks can have serious financial consequences. The recent surge in impostor emails is part of a larger cyber-crime trend \u2014 fooling humans into becoming unwitting accomplices in the quest to steal information and money,\u201d he said.<\/p>\n

Proofpoint research indicates that the problem will get worse as cyber-criminals use large databases of personal information and automated tools to personalise these emails on a mass scale.<\/p>\n

\u201cIt’s especially critical that finance, payroll, and human resources departments be alert for these scams as nearly 50 percent target the CFO and 25 percent target HR inboxes. Impostor messages often ask employees to keep things confidential and bypass normal approval channels. Employees should be suspicious if they receive a request for unusual information or a wire transfer via email. Check the reply-to email address and always call to confirm the request.\u201d<\/p>\n

It’s more difficult to screen out imposter emails because they don’t use malicious attachments or dodgy URLs.<\/p>\n

In a report issued at the end of 2015, Mimecast\u00a0predicted<\/a>\u00a0a rise in whaling attacks in 2016, a conclusion based on a survey of 500 IT experts in the US, UK, South Africa and Australia.<\/p>\n

This article originally appeared in SC Magazine<\/a><\/span>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

The CEO of an Austrian aircraft parts manufacturer has been sacked after the company lost \u20ac40.9 million (\u00a331 million) to a whaling attack. A whaling attack is also known as a C-level fraud and BEC (business email scam) and involves targeting high level executives with forged emails asking for urgent payments. Usually they are spoofed to appear to come from a trusted colleague or business partner.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/974"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=974"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/974\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}