image

Rising Social Engineering Crimes Changing Cyber Coverage

Internet-based crime shows no sign of letting up. According to the FBI’s Internet Crime Complaint Center, 2019 saw both the highest number of cybercrime complaints and the biggest monetary losses reported since the center’s establishment in 2000. The FBI received an average of almost 1,300 complaints each day and documented more than $3.5 billion in losses for individual and business victims.

Source

 

The greatest number of complaints focused on social engineering scams.3 Social engineering is a ruse that persuades people to let down their guard and inadvertently reveal or permit access to valuable information. Criminals have utilized social engineering tactics for centuries, but modern technology is enabling scammers to expand the victim pool. In our increasingly connected world, many cyber insurers are reporting a significant rise in social engineering claims — particularly from the real estate sector and financial service providers.

During the last several years, cybercrime has become a key exposure for small and medium-size businesses. NetDiligence’s Cyber Claims Study revealed that since 2014, approximately 96% of cyber claims reviewed have come from organizations with $2 billion or less in revenue.2 The report also found that social engineering, ransomware, hacking, and malware/viruses were the leading causes of loss in 2019. Another of the most visible trends in the data was the rising percentage of claims caused by criminal activity, which has increased from 72% in 2014 to 86% in 2017 and 2018.2 Only 14% of claims had non-criminal causes, such as employee error or system glitches.

Since January 2015, Business Email Compromise, BEC) cases have generated business losses in excess of $3 billion.

COMMON SOCIAL ENGINEERING SCAMS

When it comes to cybercrime, the most common social engineering scams employed by criminals include:

PHISHING A ubiquitous method of scamming victims through impersonal but official-looking email, recipients are invited to click a link or open an attachment that allows a cybercriminal to gain account information or launch malicious software. Phishing can open the door to a variety of cybercrimes, including ransomware attacks. SPEAR-PHISHING A more personalized form of phishing that uses specific information to defraud a targeted individual, a spear-phishing attack might include partial account numbers or the names of business associates to suggest that the sender is trustworthy. BAITING Similar to phishing attacks, this scam promises an item that malicious actors use to trick victims into providing login credentials.5 TAILGATING Also known as “piggybacking,” in these attacks, an individual without authorization follows an employee into a restricted area. For example, attackers may impersonate a delivery driver. When an employee opens the door, the attacker then asks the employee to hold the door and gains access to the building. This doesn’t generally work in large corporate settings that require the use of a keycard; however, with small or mid-size businesses, attackers can start conversations with employees and use that familiarity to navigate past the front desk.5 BUSINESS EMAIL COMPROMISE A costly and growing problem, the FBI’s Internet Crime Complaint Center reviewed 23,775 cases of Business Email Compromise (BEC) in 2019, resulting in losses of more than $1.7 billion.1 BEC scams are particularly known for targeting individuals responsible for handling wire transfers. For example, an employee may receive an email from an executive’s hacked email account, or an email that appears to be from that account, requesting wired funds for a business transaction. Other variations of BEC may involve personal email accounts, texts, or phone calls that appear to come from a person authorized to make such requests. VENDOR/SUPPLIER IMPERSONATION Another variation of BEC, this form of crime tricks the victim into diverting funds normally paid to an actual vendor or supplier to a fraudulent account. This tactic often succeeds when the victim fails to verify the account change by contacting the vendor using existing records. All too often, victims later call a number provided by the cybercriminal, which also turns out to be fraudulent.

CYBER COVERAGE CONSIDERATIONS

Coverage for social engineering losses originally debuted in cyber insurance policies around 2012. Sometimes known as fraudulent instruction or cyber deception, cyber insurers readily added coverage on a sub-limited basis. Typically, this coverage was conditioned on call-back procedures within insureds’ accounting departments, but competition in the marketplace has since softened this requirement. However, the increase in social engineering claims means that retail agents and insureds can expect marketplace changes. Some insurers have reduced cybercrime limits, raised premiums, required policyholders to employ clear risk mitigation plans, or withdrawn from the cyber marketplace completely.

Over the past few years, the industry has seen an increase in insurance coverage disputes involving General Liability and Commercial Crime policies regarding coverage for cyberattacks.4 When an insured claims coverage for cyberattack under a traditional business insurance policy, the carrier may claim that this was unforeseen coverage, resulting in a dispute or litigation. Insurance companies have taken notice of such litigation, and amplified the need for Stand-Alone Cyber Insurance policies that give businesses clear cyber coverage. The decision to obtain Stand-Alone Cyber Insurance helps businesses avoid claim disputes and saves valuable time and money when a cyber incident occurs.4

When it comes to cybercrime, a stand-alone crime policy is another possible coverage option. Unlike most cyber policies, which impose an aggregate annual limit, standard crime policies are historically written on an each-and- every-claim basis and usually have no aggregate limit. With the increasing frequency of social engineering claims, an each-and-every-claim approach has significant benefits to any insured worried about multiple claims within a policy period. In addition, underwriters may be better equipped to evaluate crime exposures and recommend reasonable risk management steps. Finally, crime underwriters may be more flexible in providing higher social engineering limits, especially for insureds that successfully implement risk management requirements. While some cyber insurers exclude funds held in escrow, crime insurers also generally include coverage for third-party funds held by an insured.

Capitalize Social Engineering Ransomware have become the dominant causes of cyber loss for small and medium-sized businesses since 2017.

BOTTOM LINE

As criminals get more sophisticated, it gets harder and harder for victims to identify red flags.3 Depending on the risk, it may be advantageous for retail agents to explore different coverage structures for cybercrime, such as using cyber coverage on an excess basis with underlying losses paid under a commercial crime policy. If such an approach is taken, some cyber carriers will amend the form to recognize deductible erosion by any payment made by the commercial crime carrier that is also covered under the cyber policy.

Ultimately, the marketplace dictates the availability and structure of cybercrime coverage, whether that be existing cyber policies or the creation of hybrid forms that cover traditional commercial crime and cybercrime exposures, along with first-party and third-party cyber risks. Agents and insureds should strive to fully understand cyber exposures and partner with experienced wholesale specialists to determine the most appropriate coverage option for each client.

Agents can contact their CRC Group Producer for more information about how we can help protect businesses in today’s connected, digital world.

Contributor

  • Mark A. Smith is a CRC Senior Vice President and Professional Liability Broker, based in Seattle and a member of the ExecPro Practice Advisory Committee.

ENDNOTES

  1. Federal Bureau of Investigation’s Internet Crime Complaint Center, https://www.ic3.gov/media/annualreport/2018_ IC3Report.pdf
  2. NetDiligence Cyber Claims Study: 2019 Report, NetDiligence, 2020. https://netdiligence.com/wp-content/uploads/2020/05/2019_NetD_Claims_Study_Report_1.2.pdf
  3. 2019 Internet Crime Report Released: Data Reflects an Evolving Threat and the Importance of Reporting, FBI, February 11, 2020. https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120
  4. Silent Cyber: The Case for Stand-Alone Cyber Insurance, Jacksonville Business Journal, May 20, 2020. https://www.bizjournals.com/jacksonville/news/2020/05/20/silent-cyber-the-case-for-stand-alone-cyber-insur.html
  5. 5 Social Engineering Attacks to Watch Out For, Tripwire, November 5, 2019. https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/