A ‘Crimson Kingsnake’ has recently been spotted impersonating well-known international law firms.
A Business Email Compromise (BEC) is a fraud targeting companies regularly having wire transactions in other countries. The scammer group dubbed ‘Crimson Kingsnake’ tricks recipients into approving overdue invoice payments.
According to a technical write-up published by cloud email security platform Abnormal, 92 malicious domains belonging to 19 law firms and debt collection businesses in the United States, United Kingdom, and Australia have been detected and linked to the threat actor.
The company mentioned, “The group, which we call Crimson Kingsnake, impersonates real attorneys, law firms, and debt recovery services to deceive accounting professionals intoquickly paying bogus invoices.”
Crimson Kingsnake preys on businesses in the United States, Europe, the Middle East, and Australia. Abnormal also stated that, like most BEC gangs, the group is industry-agnostic, meaning they do not specifically target companies in specific industries.
“Intelligence collected from some of the active defence engagements we’ve conducted with the group indicates that at least some of the actors associated with Crimson Kingsnake may be located in the United Kingdom,” the advisory stated.
The Crimson Kingsnake attacks typically started with emails imitating reputable attorneys and law offices and referring to an overdue payment.
“To add legitimacy to their communications, Crimson Kingsnake uses email addresses hosted on domains closely resembling a firm’s real domain,” Abnormal emphasised.
“The sender’s display name is set to the attorney that is being impersonated, and the email signature contains the firm’s actual company address.”
According to Sean McNee, CTO at DomainTools, BEC assaults continue to be profitable.
Impersonating third-party sellers is the newest trend in business.
“Criminals are hijacking the external relationships businesses have with their suppliers, particularly those that share susceptible data and invoice large amounts,” McNee told Infosecurity.”
Because BEC attacks that third-party spoof domains are becoming more widespread, businesses must be aware of the hazard. To mitigate these assaults, staff must be trained to validate domains and transactions before starting them. Having the right tools, training, and practices in place can help businesses stay one step ahead of attackers.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...