Security Experts:

Connect with us

Hi, what are you looking for?



Venture Capital Giant Sequoia Targeted in BEC Attack

Silicon Valley-based venture capital giant Sequoia Capital said the recently disclosed data breach was apparently the result of a business email compromise (BEC) attack attempt.

Silicon Valley-based venture capital giant Sequoia Capital said the recently disclosed data breach was apparently the result of a business email compromise (BEC) attack attempt.

The company informed investors last week that their personal and financial information may have been accessed after an employee fell victim to an email phishing attack.

In a data breach notice sent to impacted individuals, a copy of which has been submitted to attorney general’s offices, Sequoia revealed that it learned of unauthorized access to an employee’s business email inbox on January 20, 2021.

The company believes the breach was part of a “wire diversion scam,” which is a type of BEC attack where hackers typically pose as an executive or a trusted vendor and attempt to trick an employee into wiring money to a bank account they control instead of a legitimate account. The fraudulent transaction may be related to paying a vendor, making a large purchase, or making a deposit.

Sequoia has not provided other information on the attack itself, but the company has found no evidence of other email accounts being compromised. However, the firm has determined that the hacked inbox contained files that included “certain individuals’ personal information,” and those files may have been acquired by the attacker.

It’s unclear exactly what type of information was compromised, but impacted individuals are being offered two years of free credit monitoring and identity theft protection services.

“Out of an abundance of caution, Sequoia has also conducted dark web monitoring to determine whether any of the data from the business email mailbox is being sold or traded by cyber criminals, and we have not seen any indication that the email mailbox data is being exploited for any purpose,” Sequoia told impacted individuals.

In response to the incident, Sequoia said it addressed the configuration issue that allowed the attacker to gain initial access, it deployed additional technology to detect suspicious user activity and malicious email content, it reviewed methods for storing and sharing sensitive information, and “refreshed” security training with an emphasis on phishing awareness and data handling.

Sequoia has invested in hundreds of firms in the United States, China, India and Israel. Sequoia has also invested in several cybersecurity companies, including NetskopeSalt SecurityStackRoxWizSkyhigh NetworksSentinelOne, FireEye and Palo Alto Networks.

Related: Supermarket Chain Kroger Discloses Data Breach

Related: Embedded Software Developer Wind River Discloses Data Breach

Related: Clothing Brand Bonobos Notifies Users of Data Breach

Related: Antivirus Firm Emsisoft Discloses Data Breach

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.