• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
    • AS4
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • CxO Fraud und Corona-Pandemie - So schützen Sie sich

CxO Fraud and Corona Pandemic: How to Protect Yourself

Since the beginning of the Corona pandemic at the end of 2019, cybercriminals have been exploiting fears of the Corona virus to spread malicious code via email. The criminals are doing this, for example, by establishing a relationship with the Corona virus in the contaminated emails, arguing emotionally or claiming a particular urgency. Many of the sensitized recipients fall for it, causing the entire IT network to become infected and allowing malware and ransomware to be spread unhindered.

Authentic looking emails from superiors

These attacks are particularly dangerous because the quality of fake and contaminated emails is now very high. For the inexperienced – and sometimes even the experienced – viewer, many of these emails seem authentic: they are often written in correct language, contain correct addresses and phone numbers, and are visually elaborately designed, including company logo and email disclaimer.

Attacks using the method of the so-called CxO Fraud are currently increasing. In this form of fraud, formerly known as CEO Fraud, the attackers pretend to be managers or other decision-makers of a company and encourage employees to transfer money to their accounts. In some cases, the identity of a superior is faked, in other cases that of a customer or supplier, for example, to send supposed invoices on his behalf.

Cybercriminals seize millions

Particularly glaring cases were the case of the car supplier Leoni in 2016 and the case of the cinema chain Pathé in the Netherlands in2018. In the first case, 40 million Euros and in the second case 19 million Euros were transferred to the accounts of the criminals. By the time the scam was uncovered, the money had already disappeared into unknown accounts in both cases.

CxO Fraud has been a growing problem not only since Corona: a survey in autumn 2019 showed that of 500 companies surveyed, more than a third had received emails from fake superiors or suppliers. The fact that the criminals were successful in almost half of the cases is also due to the fact that in many cases the attacks are prepared over weeks or months.

The cyber attacks are carefully prepared

In many cases, the affected companies are first spied on via social networks in order to identify the persons relevant to the attack. This is followed by initial contact by email or telephone, which is intended to psychologically manipulate the employees contacted in order to eliminate any doubts that may arise. An alleged particular urgency or alleged time pressure then often leads to transfers actually being executed.

As is generally the case with malware, ransomware and phishing, the first antidote here is to sensitize employees. It is even better if the email security solution used recognizes CxO Fraud and rejects fraudulent emails.

Reliable protection against CxO Fraud – with NoSpamProxy

CxO fraud detection in NoSpamProxy compares the sender name of incoming emails with the names of key users in your company. This will intercept fake emails sent to you or your employees on behalf of supervisors, employees or customers.

90 percent of all cyber attacks occur via email. Especially in times of corona-related home office work and authentic-looking fake emails, a reliable email security solution is the most secure protection against malware, ransomware and spam. And from ill-advised wire transfers to cyber criminals.

Try NoSpamProxy for free for 30 days

  • share 
  • share 
  • share 
  • email 

SEARCH

PRODUCT

  • All Topics
  • NoSpamProxy Cloud
  • NoSpamProxy Protection
  • NoSpamProxy Encryption
  • NospamProxy Large Files

You need support?

You can find more information about NoSpamProxy in our documentation and forum.

CATEGORY

  • All Topics
  • News
  • Product
  • Tech & Support
  • Events
RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

NoSpamProxy

  • NoSpamProxy Cloud
  • NoSpamProxy Encryption
  • NoSpamProxy Large Files
  • NoSpamProxy Disclaimer
  • Price request
  • Team
  • Career
  • General terms and conditions
  • Data Protection Information for Business Partners and Applicants
  • Cybersecurity (PSIRT)

Partners

  • Becoming a reseller
  • Partners
  • Order Certificates
  • Newsletter

Categories

  • All topics
  • News
  • Support
  • Updates
  • Order certificates

Latest News

  • Info Icon
    Limited support hours on Friday, May 16, 202513.05.2025 - 11:35
  • Was ist ein Zero Day Exploit Preview
    What is a Zero-Day Exploit?23.04.2025 - 14:00
  • Info Icon
    UPDATE: New Google email sender guidelines: What you need to do17.04.2025 - 12:00
IMPRINT • EULA • Privacy Policy • • © 2025 Net at Work GmbH
  • Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
Link to: Inside Emotet: 3 current examples and how Project 32Guards can protect you Link to: Inside Emotet: 3 current examples and how Project 32Guards can protect you Inside Emotet: 3 current examples and how Project 32Guards can protect youEmotet Mails 3 Beispiele Link to: How healthcare institutions protect themselves against cyber attacks Link to: How healthcare institutions protect themselves against cyber attacks So schützen sich Gesundheitseinrichtungen vor CyberattackenHow healthcare institutions protect themselves against cyber attacks
Scroll to top Scroll to top Scroll to top