Cybercrimes, including phishing and online scams, are not only the biggest current threat in Africa, according to Interpol, they are also the type of crime most likely to increase in the next three to five years.
In this article, we share the prominent cyberthreats identified by Interpol – with Business Email Compromise (BEC) still top of the list, explain what these cybercrimes entail, and also offer some excellent tips from expert sources to help you, your business and your employees remain safe from these growing threats to businesses and individuals.
“The bottom line is that cyber risks sit right alongside rising systemic risks, and is the biggest emerging, and constantly evolving risk facing businesses today.”(SHA Specialist Risk Review 2022)
In Africa, Interpol has identified phishing – particularly Business Email Compromise (BEC) – as well as online scams, as both the biggest current crime threats, and the crimes most likely to increase in the next three to five years.
This is Interpol’s list of the prominent cyberthreats identified in the African region:
- Business Email Compromise
- Cyber extortion including ransomware attacks
- Online scams
- Banking trojans and stealers
Business Email Compromise (BEC)
For 7 consecutive years, BEC attacks have been the most financially devastating cyber threat worldwide, and continue to be the most prevalent cybercrime, says Interpol. A type of phishing attack, it causes significant financial losses and often reputational damage.
It includes cybercriminals using an organisation’s email account to send out fraudulent messages with malicious links or attachments that install malware or steal confidential information.
Most commonly, however, BEC involves cybercriminals manipulating emails, especially payment requests containing bank account details. This is because it’s common business practice to send confirmation of or changes to bank details, or invoices containing bank details, via email.
In BEC attacks, these emails are intercepted – or fraudulent emails or invoices are created – changing the account details to the cybercriminal’s account. Any payments subsequently made are lost to cybercrime.
A recent High Court ruling in this regard, set a precedent applicable to all businesses, as the judge noted: “… the plaintiff’s case established clearly that sending bank details by email is inherently dangerous, and so must either be avoided in favour of, for example, a secure portal or it must be accompanied by other precautionary measures like telephonic confirmation or appropriate warnings which are securely communicated.”
Specific BEC preventative measures include:
- Inform clients that your company will never change banking details via letter, SMS or email.
- Consider not putting banking details on your invoices – rather ask customers to phone you to check the details they have.
- Use bank-defined beneficiaries for online banking where possible.
- Before making payment to a supplier’s bank account after receiving an emailed invoice, check that the bank account details on the invoice are genuine.
- If you receive any instructions to change banking details from a supplier, call them to verify.
- Check with your insurers if you can get cover for this risk.
One of the oldest, most pervasive cyberthreats and a major source of stolen credentials and information, phishing is a cyber-attack aimed at stealing sensitive information like usernames, passwords and credit card details, typically using deceptive emails or websites, apparently from trusted sources, that contain malicious attachments or links to viruses or malware.
Phishing is linked to an estimated 90% of data breaches and causes not only direct financial losses but enables other forms of cybercrime.
Cyber extortion and ransomware attacks
Cyber extortion involves cybercriminals using digital methods to threaten or extort victims for money and/or assets. It often involves the attacker threatening to reveal embarrassing personal information, delete important data, sabotage systems and networks, or launch distributed denial-of-service (DDoS) attacks.
An increasingly popular type of cyber extortion is ransomware, a malicious software that locks users out of their own data, business systems and devices by encrypting their files. Victims must pay a ransom to have their files decrypted and regain access.
Such attacks can be extremely costly to businesses with substantial financial losses incurred due to ransom payments and recovery efforts, as well as downtime, lost production, and reputational damage.
Ask your accountant for help in preparing a business continuity and disaster recovery plan so you are prepared if the worst happens.
Online scams take advantage of users’ poor levels of digital literacy to lure them with false promises. Below are the most common online scams increasingly prevalent in the African region.
- Advance payment scams – fraudsters ask for financial deposits and then fail to deliver goods or services.
- Shopping scams – criminals deceive online buyers to pay upfront and then receive counterfeit items or nothing at all.
- Romance scams – criminals create a false social media identity and build an emotional connection with a victim, with the aim of soliciting money or gaining access to personal accounts.
- Tech support scams – criminals posing as representatives from technology companies offer technical assistance to gain access to users’ computers and extract valuable data such as passwords and financial information.
- Cryptocurrency scams – criminals entice investors into buying fake currencies.
Banking trojans and stealers
These malicious software programs are spread through phishing emails and malicious websites to steal sensitive information such as usernames, passwords and financial data by capturing keystrokes or stealing login credentials from unsuspecting victims. Cybercriminals may use the information to steal money directly from the victim or sell the information on underground markets.
What are the risks
According to the 2022 SHA Specialist Risk Review, cybersecurity ranks third on the list of top threats for local businesses, after power disruptions and labour matters.
The report says that not addressing cybersecurity opens companies to a range of risks, including:
- the financial loss of payments made into incorrect accounts due to BEC;
- the financial impact of business interruption due to a cyberattack;
- the financial impact of having to pay a ransom;
- the legal consequences that follow a breach of confidential or personal information;
- the reputational consequences that may impact a company’s share price and brand.
How to prevent becoming a cybercrime victim
- Keep applications, software and operating systems (OSs) updated with the latest patches.
- Use and keep updated preventative anti-virus and anti-malware protections, software and protocols, as well as data encryption, firewalls and email filters.
- Use long, complicated passwords and change them often.
- Always double check you’re really on the right website or app. Only download apps from trusted app stores.
- Don’t fall for any offer that seems to be too good to be true – it usually is.
- Never provide your password, credit card or other financial information, or control of your computer, to a third party who calls unexpectedly.
- If you suspect you are being targeted by a scammer, stop all communications immediately and report it.
- If you click on a harmful link, immediately disconnect your device from the internet by unplugging your network cable or disconnecting from the Wi-Fi, then run a full anti-virus scan.
- Regular, mandatory cybersecurity awareness training for all employees is crucial to keep everyone informed about the latest cybercrime techniques.
October is Cyber Security Awareness Month – Stay Alert!
NOTE FOR ACCOUNTANTS: Read more about the most prominent cyberthreats in Interpol’s 2023 African Cyberthreat Assessment Report and about the local cybercrime landscape in the SHA Specialist Risk Review 2022. SABRIC offers excellent advice to prevent cybercrimes of all kinds on their Stay Safe webpage.
Share this article