Invoice Based BEC Threats
18 November 2024
What you'll learn in this notification
Prevent the payment of fraudulent ZipRecruiter and TeamViewer invoices.
- Targeting predominantly the Real Estate and legal Industry
- Attackers create fraudulent emails that appear to originate from TeamViewer, ZipRecruiter and other brands, often using similar domain names or slight variations
- The goal is to facilitate unauthorized monetary transfers.
Mimecast Threat Researchers have detected a surge in Business Email Compromise (BEC) attacks specifically targeting the real estate sector globally. Threat actors are impersonating ZipRecruiter, TeamViewer, Zoom and other products to deceive organizations into paying invoices for services, potentially leading to financial losses. In most cases the emails originate from a compromised account but with a newly observed domain in the reply-to address.
Psychological tricks used
- Long thread with approval from someone senior (appears to be going to the legitimate email address) which can fool the employee to make the payment without double checking
- Sense of urgency added as the thread has been going on for some time and the invoice has been chased
- A well formulated invoice attached
Common Techniques
- Sending emails from compromised accounts ensures authentication checks such as SPF and DKIM pass.
- New domain reply to are used usually to group and manage the replies to campaigns.
- Email headers containing 'From' and 'Reply-to' fields can include display names that mask suspicious sender addresses, as recipients typically only see the display name when viewing emails on mobile devices.
TeamViewer BEC Example
In the two most prevalent examples the accounts processing teams are targeted with an invoice request from a lookalike domain. The invoice amount of is referenced in the email body and the attached invoice includes the attackers bank account details. The same bank account information is across both invoices. The invoice appears to be based on a legitimate TeamViewer invoice which can easily be found through Google.
TeamViewer Invoice
In the second example the threat actor impersonates a legitimate recruitment company, sending the email from a compromised legitimate domain (unrelated to ZipRecruiter).
ZipRecruiter BEC Example
BEC threat language visibility is available through Mimecast Advanced BEC Protection
ZipRecruiter Invoice
Mimecast Protection
We have identified several attributes in the campaigns which have been added to our detection capabilities. View the Advanced BEC Protection page to learn more about how our advanced AI and Natural Language Processing capabilities to aid in detections of evolving threats.
Targeting:
Global, Predominantly Real Estate and legal Industry
IOCs:
Sender Domains:
teamviewing-dashboard[.]com
collections-zoominfo[.]com
Reply-to Domains:
reply-ms-suite[.]online
accounting-zip-recruiting[.]com
usazoominfo[.]com
ar-pitchbook[.]com
zoominfo[.]app
Subjects:
unpaid-bill-inv1912701
request-for-correction-of-double-charge
payment-advice-notification
re-invoice-12862843-for-ziprecruiter-subscription
Recommendations
- Conduct awareness sessions for employees about BEC tactics and how to identify phishing attempts.
- Educate end users around the continued trend of legitimate tools being used in malicious campaigns.
- Implement verification protocols for any unexpected or suspicious emails purportedly from ZipRecruiter and the other brands in this notification, especially those requesting sensitive information or financial transactions.
- Always report any phishing or BEC scam email to Mimecast or your email security provider.
Scam Reporting
TeamViewer Germany GmbH is a legitimate software development company. Unfortunately, as is sometimes the case for long-standing and successful companies, the software or the brand is occasionally targeted or misused by bad actors. TeamViewer takes the security of his customers very seriously and has implemented robust measures to protect against scams and fraudulent activities. If you have experienced or suspect a case of malicious use of TeamViewer, please contact TeamViewer privacy team via the 'Report a Scam' form on this page: https://www.teamviewer.com/en/report-a-scam/
Mimecast is collaborating with TeamViewer to share intelligence and technical indicators related to the Business Email Compromise campaign that is actively exploiting their brand identity.