Security Experts:

Connect with us

Hi, what are you looking for?



FBI Warns of BEC Scams Abusing Virtual Meeting Platforms

The Federal Bureau of Investigation (FBI) this week issued an alert regarding the increasing use of virtual meeting platforms to conduct business email compromise (BEC) and email account compromise (EAC) scams.

The Federal Bureau of Investigation (FBI) this week issued an alert regarding the increasing use of virtual meeting platforms to conduct business email compromise (BEC) and email account compromise (EAC) scams.

As part of such schemes, attackers target employees who can make or authorize payments, using social engineering to trick them into transferring funds into fraudulent accounts.

Typically, such schemes are carried out over email (either business or personal email addresses), but over the past three years the FBI’s Internet Crime Complaint Center (IC3) has seen an increase in complaints related to BEC attacks carried out over virtual meeting platforms.

Facilitating collaboration between remote teams and increasingly popular due to the COVID-19 pandemic, which has forced many to work remotely, such platforms allow users to engage in video conferencing, screen sharing, and more.

To conduct BEC scams over virtual meeting platforms, cybercriminals first compromise the email address of an employer or financial director (including CEO or CFO), and then instruct employees to participate in an online meeting.

[READ: Nigerian Authorities Arrest 11 Members of Prolific BEC Fraud Group]

In order to hide their identity, the attacker claims that their video/audio is not working, inserts a still picture of the hacked account’s owner instead, and instructs the employees to transfer funds to an account the attacker controls.

In other cases, the attackers compromise an employee’s email to access internal virtual meetings and collect information about the company’s day-to-day operations.

The attackers may also send spoofed emails from a compromised employer’s account, asking an employee to initiate the transfer of funds, claiming that the CEO is engaged in a virtual meeting and cannot make the transfer on their own.

To stay protected, organizations should always confirm the use of outside virtual platforms, employ two-factor authentication and other means to verify any request for modifying account information, check email addresses and URLs for signs of spoofing, and refrain from sharing credentials or personal information via email.

Related: Microsoft Disrupts Large-Scale BEC Campaign

Related: Introducing DAIC: A Suggested System for Preventing BEC Fraud

Related: Two Nigerians Sentenced to Prison in U.S. for Role in BEC Scams

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.


Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.