Microsoft: Your business really needs to step up its email protection, and here's why

Phishing
(Image credit: wk1003mike / Shutterstock)

Microsoft has releasednew findings claiming email-borne attacks are growing not just more destructive, but also harder to detect. 

As seen in the company's Cyber Signals report, the number of business email compromise (BEC) attacks that companies face on a daily basis has hit 156,000, representing a 38% increase compared to 2019. 

During a BEC attack, a threat actor will try to impersonate a high-ranking officer within an organization (for example, a chief finance officer or similar), and will try to use their authority to get an employee (for example, someone in the finance department) to transfer funds quickly and silently. Oftentimes, the “CFO” will say the company is finalizing a buyout of a competitor, a process that needs to be kept under wraps, and will ask the employee to transfer the funds “urgently”.

Millions in losses

The results are devastating, with businesses losing millions of dollars on fraudulent transactions. Microsoft cited the UK government’s recent Cost of Cyber Crime Report, which stated that these attacks cost the country’s economy roughly £27bn every year. The National Fraud Intelligence Bureau (NFIB) received more than 40,000 reports from victim organizations between April 2022 and 2023. Thes companies seem to have lost more than £2.2bn in that timeframe. 

Furthermore, the effects of the incident can be felt in the months and years to come, through identity theft and data leaks. 

BEC has gotten more popular lately, prompting some cybercriminals to facilitate the practice through different services. Some cybercrime-as-a-service (CaaS) operators can provide credentials and the IP address of victims, allowing threat actors to easily launch Business Email Compromise (BEC) campaigns that are more difficult to detect and disrupt. 

Through CaaS, malicious actors can buy entire business packages on the dark web, which provide them with everything they need to launch a successfull attack, the company concluded.

"BEC attacks offer a great example of why cyber risk needs to be addressed in a cross-functional way with IT, compliance, and cyber risk officers at the table alongside executives and leaders, finance employees, human resource managers, and others with access to employee records like social security numbers, tax statements, contact information, and schedules," noted Vasu Jakkal, Microsoft Corporate Vice President, Security, Compliance, Identity, and Management.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Fraude en ligne phishing
Phishing clicks nearly tripled in 2024 as criminals aim for smarter attacks
Phishing
Corporate executives are being increasingly targeted by AI phishing scams
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring