8 July 2020

Cosmic Lynx cyber gang launched over 200 BEC attacks against Fortune 500 firms


Cosmic Lynx cyber gang launched over 200 BEC attacks against Fortune 500 firms

For more than a year a group of scammers has been conducting email-based campaigns against Fortune 500 and Global 2000 companies attempting to steal hundreds of thousands of dollars fr om their victims.

The group, dubbed “Cosmic Lynx” by Agari researchers who uncovered the operation, has been active since July 2019 and has targeted individuals in 46 countries across the globe, often victimizing senior-level executives from large multinational corporations. The researchers said they observed more than 200 BEC (business email compromise) campaigns conducted by this group since July last year.

The group is typically impersonating the CEO of the target company, sending a senior-level executive - in three quarters of the cases the titles are Vice President, General Manager, or Managing Director - an email request to close an acquisition with an Asian company as part of corporate expansion.

The target employee is asked to work with “external legal counsel” in order to coordinate the payments for closing the acquisition. The group then hijacks the identity of the a legitimate attorney at a UK-based law firm whose job it is to facilitate the transaction.

“While the average amount requested in most executive impersonation BEC attacks is $55,000, the average Cosmic Lynx attack requests is $1.27 million,” the researchers said.

If the attack is successful, Cosmic Lynx directs money to accounts in Hong Kong, Hungary, Portugal, and Romania, wh ere it is withdrawn by so-called money mules.

Agari believes that Cosmic Lynx could be operating from Russia based on several findings, such as metadata from email headers delivered to victims, which contained time and date stamps set to Moscow Standard Time, and some IP addresses used by Cosmic Lynx overlapped with infrastructure that hosted websites providing fake documents in Russian language (diplomas, birth certificates and death certificates).

“Most email-based threats today, like BEC attacks, are very simple social engineering attacks that are technically unsophisticated. To effectively protect against these threats, companies need to make sure they have defenses in place that are equipped to detect identity deception attacks that traditional inbound filters are not accustomed to handling. Additionally, organizations should have good internal processes in place, so payment requests, regardless of source, are verified before they are processed,” the researchers advised.

Back to the list

Latest Posts

Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024
International police operation takes down massive PhaaS platform LabHost

International police operation takes down massive PhaaS platform LabHost

The investigation found over 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
18 April 2024