Security Experts:

Connect with us

Hi, what are you looking for?



Venture Capital Giant Sequoia Targeted in BEC Attack

Silicon Valley-based venture capital giant Sequoia Capital said the recently disclosed data breach was apparently the result of a business email compromise (BEC) attack attempt.

Silicon Valley-based venture capital giant Sequoia Capital said the recently disclosed data breach was apparently the result of a business email compromise (BEC) attack attempt.

The company informed investors last week that their personal and financial information may have been accessed after an employee fell victim to an email phishing attack.

In a data breach notice sent to impacted individuals, a copy of which has been submitted to attorney general’s offices, Sequoia revealed that it learned of unauthorized access to an employee’s business email inbox on January 20, 2021.

The company believes the breach was part of a “wire diversion scam,” which is a type of BEC attack where hackers typically pose as an executive or a trusted vendor and attempt to trick an employee into wiring money to a bank account they control instead of a legitimate account. The fraudulent transaction may be related to paying a vendor, making a large purchase, or making a deposit.

Sequoia has not provided other information on the attack itself, but the company has found no evidence of other email accounts being compromised. However, the firm has determined that the hacked inbox contained files that included “certain individuals’ personal information,” and those files may have been acquired by the attacker.

It’s unclear exactly what type of information was compromised, but impacted individuals are being offered two years of free credit monitoring and identity theft protection services.

“Out of an abundance of caution, Sequoia has also conducted dark web monitoring to determine whether any of the data from the business email mailbox is being sold or traded by cyber criminals, and we have not seen any indication that the email mailbox data is being exploited for any purpose,” Sequoia told impacted individuals.

In response to the incident, Sequoia said it addressed the configuration issue that allowed the attacker to gain initial access, it deployed additional technology to detect suspicious user activity and malicious email content, it reviewed methods for storing and sharing sensitive information, and “refreshed” security training with an emphasis on phishing awareness and data handling.

Sequoia has invested in hundreds of firms in the United States, China, India and Israel. Sequoia has also invested in several cybersecurity companies, including NetskopeSalt SecurityStackRoxWizSkyhigh NetworksSentinelOne, FireEye and Palo Alto Networks.

Related: Supermarket Chain Kroger Discloses Data Breach

Related: Embedded Software Developer Wind River Discloses Data Breach

Related: Clothing Brand Bonobos Notifies Users of Data Breach

Related: Antivirus Firm Emsisoft Discloses Data Breach

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...