This Social Engineering email is almost flawless, but one mistake caused the entire attempt to fail A reader recently shared an email that was sent to their comptroller, which by all accounts was a near-perfect social engineering attempt. However, awareness training, combined with full executive support to question any suspect request, prevented what could’ve been a massive financial hit to the organization.The email, which was addressed to the comptroller from an account that (at a glance) belongs to the CEO, is itself similar to prior communications she had gotten from him.The spoofed email mirrors the organization’s Outlook template, uses the CEO’s image, as well as a forged FROM field that uses his email address, the return-path was different, but the comptroller didn’t check the message headers.From her standpoint, even the clip and tone of the message itself looked normal. There are spelling errors, and formatting issues, but again these are expected in quick communications and rather common during day-to-day operations. The message sent to the comptroller, complete with errors, is as follows:In regards to an Acquisition that we are currently working on, Attorney Richard Spink will be getting in contact with you. If you can please devote your full attention and comply with any requests that he makes. We will need to proceed with several payments in regards to this operation. He will further explain to you how to execute the wire instructions following the regulatons in place.Over the last few months, we have been working on it under the supervision of the SEC. It is crucial for the company that this operation is executed swiftly and efficiently.You have my full approval to proceed with any payments that he may request on my behalf. You need to keep this matter extremely confidential as you are the only one currently aware of the situation.You will need to maintain absol ute discretion and work exclusively wit h Richard.Any question you may have must be addressed directly to him.We will be going public with the acquisition next week and the rest of the company will be made aware. I will personally meet with you and Richard a couple of days prior and expect to be fully updated on your progress.Thank you for treating this with your utmost attention.It almost worked. The comptroller was set to comply with instructions, but there was something off about the email; a little thing really – but it stood out. It was signed using the CEO’s full name. The CEO never uses his real name, always the shortened version of it – i.e. Dick instead of Richard.Awareness training is a constant within the reader’s organization. No matter what, employees are encouraged to report anything and everything if they have even the slightest bit of doubt.As such, anyone within the organization is allowed to ignore an executive’s request and report it to the security team for verification. In this case, because the organization has ties to a number of critical markets and industries, a scam such as this could be disastrous.Because the name was different, the comptroller felt the request should be verified and flagged. It was the right call.For the record, this wasn’t a training email. It was a real attack, and it was nearly successful. The only thing that prevented it was awareness and encouragement.The attack presented here happened within the last 30-days. It’s possible other firms working in and around the financial industry and DIB have gotten similar messages, so the reader felt that sounding the alarm and sharing this incident with the public was worthwhile. Here at Salted Hash, we agree. Stay safe![Note: Salted Hash is happy to signal boost and help spread awareness on Phishing, Social Engineering, or other targeted attacks similar to this one. Feel free to contact Steve Ragan or any other editorial staff member on CSO for assistance.][Edit: Clarified that the email was spoofed, the CEOs email account was not compromised.] Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe