Email Security Blog

The “I’s” Have It: How BEC Scammers Validate New Targets with Blank Emails

Crane Hassold August 13, 2019 Cybercrime

Have you ever received a blank email from someone you don’t know? If you have, it may have been from a cybercriminal making sure your email account is legitimate prior to a BEC attack.

We released a report on a business email compromise (BEC) cybercriminal group named London Blue in December 2018. The report dove into the organizational structure of West African criminal groups and described how they operate like modern corporations. In a follow-up report published in April, we discussed how London Blue made the foolish decision to send a BEC email to our CFO here at Agari (again!) and how our significant visibility into London Blue’s operations gave us an opportunity to observe the group’s entire attack chain—from preparation to execution.

BEC Attack Chain

The second step in this attack chain is “Lead Validation and Processing,” during which a BEC group member takes the raw leads gathered by another member and takes the following steps:

  1. Validates the contact information to confirm that it is accurate
  2. Supplements the leads with open-source intelligence to identify additional information, such as the name of the CEO to be impersonated
  3. Organizes the leads in a way that will allow the scammer sending the BEC emails to be more efficient.

The first part of this step—validation—is integral because it gives the BEC scammer confidence that his attacks are being directed to a live mailbox. So how do the scammers actually validate these potential target email addresses?

Taking the Easy Way Out

Many BEC groups use legitimate commercial lead generation services that are also used by companies all over the world to identify sales prospects, which we discussed first in London Blue and again in a threat dossier on cybercriminal group Scarlet Widow. Once a scammer conducts a customized search for corporate employees meeting their specific criteria, the service will provide a spreadsheet with target information, and even indicate whether their company has previously verified the email address.

Example Results from Lead Generation Service 

Some scammers, though, use a more hands-on approach to validating target email addresses. During our research into a Nigerian BEC organization we’ve named Curious Orca, we uncovered a more monotonous process some scammers use to verify target contact information prior to initiating BEC campaigns.

Using the i to Validate Email Targets

The validation process used by Curious Orca is very rudimentary and straightforward. First, a group member starts with a list of raw targeting leads containing the names and possible email addresses of employees with the title “Controller” or “Accountant.” All of the targets processed by this group have these titles, which is a common tactic employed by BEC groups to identify targets. London Blue, for example, specifically looked for employees with “CFO” in their title.

Using this raw targeting list, Curious Orca attempts to validate any unvalidated email address on the spreadsheet by simply sending a probing blank email with the subject “i” to the target to see if the email is delivered successfully. Unlike the emails for BEC campaigns, which are usually sent during work hours in the morning, these validation emails are sent during non-working hours, often in the middle of the night, when targets are unlikely to immediately see the email.

Curious Orca Probe Email

After sending this reconnaissance email, Curious Orca waits to see if an automated “bounce” is sent from the target’s mail server, which would indicate the email address is not valid. Usually, these emails come in the form of an “Undeliverable” or “Delivery Status Notification” message.

Examples of Email Bounce Notifications

If no bounce notification is received, the target’s email address is assumed to be valid and operational. In the case of Curious Orca, once this contact information has been validated, their name, email address, and title are added to one of the hundreds of consolidated text files containing verified targets. In many cases, this file includes supplemental information about the CEO at the target company, who will be impersonated in the BEC attack.

Example of a Consolidated List of Validated Targets

If a Curious Orca scammer receives one of these automated bounce responses, however, the address is deemed to be invalid. When an email address is invalidated, the scammer moves on to other tactics.

Continuing the Chase

The target information is useful, so the scammer does not want to immediately give up immediately. As a result, he begins iterating through a series of likely email username combinations to see if one works. For example, if the target’s name was John Smith and the original invalid email address was jsmith@company.com, the scammer may cycle through the following email variations:

john@company.com
john.smith@company.com
johns@company.com
johnsmith@company.com

For each email variation, Curious Orca sends another blank probing email looking for a bounce. If one of the alternate email permutations fails to generate a bounce message, the target and the newly-validated information is added to a verified target list. If, however, the scammer burns through all of the obvious address combinations and receives a bounce email for all of them, then the target is simply excluded from the final target list—sparing that address from receiving a subsequent BEC attack.

While Curious Orca manually tests various email address variations, there are also online tools that attempt to predict the likely pattern used by email addresses on a specific domain. Like other commercial services used by BEC groups to identify initial raw target sets, these services are widely used by legitimate marketing teams; however, cybercriminals are exploiting them for more nefarious purposes.

Examples of an Online Service Predicting Likely Email Patterns

By using these services, the cybercriminals are able to quickly and easily spot patterns and then test the most likely email combination, without having to go through the manual testing outlined above.

The Ugly Truth About Cybercrime

You might be thinking to yourself at this point… “This verification process seems like a lot of work. Surely, this group isn’t able to probe THAT many email addresses!”

Cybercriminal organizations have become practiced in these tactics to the point that they are able to perform them in an extremely efficient manner. Since August 2018, a single Curious Orca associate has sent blank reconnaissance emails to more than 7,800 email addresses at over 3,200 companies in at least twelve countries including Australia, Canada, Denmark, Hong Kong, Israel, Italy, the Netherlands, Papua New Guinea, Singapore, Sweden, the United Kingdom, and the United States. The validated contact information collected by this actor has contributed to a master targeting database containing more than 35,000 financial controllers and accountants at 28,000 companies around the world.

Even more surprising, these scammers are not using automation to send their probing emails. Each validation email is sent manually. Recently, over the course of a week, one Curious Orca actor spent 46 hours performing reconnaissance using probe emails and consolidating validated address into master target lists. This is a significant amount of time and looks very similar to an actual work schedule, which underscores our previous findings that these groups operate very similarly to normal, everyday businesses.

A Week in the Life of a Curious Orca Email Validation Actor
(Times are West Africa Standard Time, GMT +1)

So what can you do to protect your company and your employees against these types of pre-attack email probes?

One easy step is to disable email bounce messages to external senders. This tactic will prevent threat actors conducting bounce reconnaissance from getting a notification telling them whether an email address is valid. While this would make an actor think that any email address they test is valid, meaning that all target email addresses on your domain would likely make it into the final target list, it would prevent them from being alerted if a test address is invalid. In this case, any email they send to an illegitimate address would simply go into a black hole and they would be none the wiser.

Another strategy is to configure your inbound email filter to look for inbound emails with no content. Since these emails are often used as a precursor for a follow-up attack, notifications of this nature would allow your team to alert targets to be cautious of any suspicious activity and block additional phishing emails before they reach the inbox.

Discover more about what the Agari Cyber Intelligence Division (ACID) has learned about West African cybercriminals at acid.agari.com

Leave a Reply

Your email will not be published. All fields are required.

Agari Blog Image

July 23, 2019 James Linton

Weaponizing Accounts Receivable: How Scammers Use Aging Reports to Target Your Customers

Receipts and invoices—two accounting powerhouses that require little introduction. But step a little further into…

Agari Blog Image

July 10, 2019 Ronnie Tokazowski

‘Til Death Do Us Part… Romance Scams and the BEC Game

When we think of business email compromise (BEC), the first thing that comes to mind…

Agari Blog Image

June 5, 2019 Crane Hassold

From One to Many: Scattered Canary Evolves from One-Man Startup to BEC Enterprise

There is no denying that business email compromise (BEC) is big business, with losses exceeding…

Agari Blog Image

April 25, 2019 Crane Hassold

Bitcoin: The Next Evolution in BEC Cash Out Methods?

Historically, business email compromise (BEC) threat actors have used wire transfers as a means to…

Agari Blog Image

April 18, 2019 Ronnie Tokazowski

Do You Know Where Your W-2 Is? Probably Where You Left It

It’s like clockwork. Every year around tax time security vendors (even us!) push out warnings…

mobile image