0% found this document useful (0 votes)
2K views13 pages

How To Do Bec Phishing Attack

Uploaded by

aslanbeyaaz2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views13 pages

How To Do Bec Phishing Attack

Uploaded by

aslanbeyaaz2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

HOW TO DO BEC ATTACK (COMPANY BUSINESS EMAIL

HACKING/BUSINESS EMAIL COMPROMISE)

This is a form of hacking that is straightforward and precise. You get access to the business email of a
business. With this you can redirect funds from purchase of equipment, add a different account
number to the business payroll and even get sensitive business information.

In some cases, you can even get access to the business bank account if it is connected to their business
email.

I will be outlining the steps needed for this type of phishing attack.

The only tool/program you will need is the “adminrootaccess.py” hack code which will give you full
authorization and remote access into the business email.

I (@checkspammer on Telegram) coded this program myself and only if you know how to code would
you be able to build something similar.

If you want to get it, come to my DM.

I’d show you how it works using AnyDesk software and teach you how to use it.

Back to the tutorial…

No need for SMTP because we will be targeting one business at a time so there wouldn’t be any need
for sending out bulk emails.

If you decide to do more than one business at a time, you may end up missing out on deals that will
go on in other business emails.

Best way is to focus on one business, complete the phishing attack, monitor transactions going on in
their email, redirect funds and then move on to another business.

Step 1:
Connect your VPN/911. This will help you get better search results.

Find an agriculture business to impersonate. Go to google and type in the search box:

“List of companies that sell agricultural machinery and equipment”


The reason I always choose to use agricultural businesses most times is because of how often they
buy machinery and equipment. These are opportunities to divert funds during the purchase process
into another bank account which I have access to.

When doing BEC, you need the following:

- Good internet connection (deals of thousands of dollars can be lost if you are not quick to
send a reply email with a different account number attached)
- Good USA/Canadian Bank with quick cashout method
- Bank accounts connected to a crypto wallet are a plus

When finding businesses to send phishing attacks, another method is to find businesses located in
areas where people buy and sell in cryptocurrency. When you send phishing attacks to these kinds of
businesses, you will see that they normally send invoice emails to their customers to get paid in crypto.

You can intercept these emails and send a different one with your own crypto address.

Step 2:
Pick one and create a new Gmail account similar to the name.

For this step we would be using:

“San Joaquin Tractor Co”


Step 3:
Create a new Gmail account.
Make sure to create a business account with Gmail and not a personal account.

Now we have our email address, let’s move on to the next step of the tutorial.
Step 4:

Next, use this new email address to create a LinkedIn account located in the United States. You can
use this site to generate random USA address you can use when signing up on LinkedIn:
https://www.bestrandoms.com/random-address

This is a LinkedIn account I have already opened. It would come in handy soon.

The reason for the LinkedIn account is this:

“Most businesses in the US have an account on LinkedIn because it is a sign of professionalism. We


would use this to do research on the business before proceeding with the phishing attack.”

Step 5:
Go to go this website: www.dnb.com. Click on “Search here”
Type in “Agriculture”. Other types of businesses you can send a phishing attack to are:

- Law firms
- Construction
- Consulting
- Courier Services
- Cleaning Company
- Home Care Services
- Real Estate
Scroll down and click on “See all company results”

Since we are sending the phishing attack to USA companies alone, include the following filters:

If you have spammed accounts from other countries that you can redirect funds into, then you can
also send phishing attacks to companies and businesses in other countries.

The reason we are choosing “0-5” employees is because we are targeting just small businesses that
do their own payroll and the business email address is managed by the CEO of the business.
Now, pick anyone. Go to their website, check their social media pages, confirm that they are also on
LinkedIn, then copy out the business email from the website.

Sometimes the business email is different from the email managed by the CEO. This is why we need a
LinkedIn account. We can find the CEO of the business on LinkedIn and get his email address together
with the email address of the business.

Already from this search I have gotten:

- Business website
- Business address
- Phone number
- Yearly revenue
- Number of employees
- Name of CEO/Key Principal

Already I can see that they are on LinkedIn


And on their website, I can see the name of their CEO/Chief Growth Officer together with other
employees in the company.

You can see the name of the key principal we found on dnb.com is the same as the name on their
website.

“Edward (Eddy) Mejia”

And the best part is that his LinkedIn account is linked to his bio. Let’s go to it.
We found the founder/CEO of the business. Jackpot!

Now, let’s get his email address. This is the business email we would be sending the phishing attack
to.

On clicking “Contact Info”, we are sent to his personal website, where he has his email address.
Email address gotten: [email protected]

Email address of the company: [email protected]

Now we have gotten the two important emails of the business, it is time to start the phishing attack.

First, we build a “Phishing Document”, this is the document that we will attach the hack program to,
once it is opened, the program automatically begins to run on their device and authorization is
granted.

Remember for our phishing email address, we used this business name: “San Joaquin Tractor Co”

So I went to their website: https://www.sanjoaquintractor.com/


Then I took screenshots of parts of the website and used it to build the “Phishing Document”.

Next, in the email I will send to the business email, I would introduce “sanjoaquintractor co” as my
business and give them reasons why they can request a quote even if they are not yet ready to buy
agricultural machinery from us.

Attached to the email will be the document above which would already contain the hack program.
Once they open the document, we now have full adminaccess to their business email from which we
can monitor:

- Transactions
- Invoices
- Payrolls

And a lot more.


This is a sample of a “Scam Letter” you can send with the PDF attached. Once they click on it, all that
is left is to monitor the account and be ready to divert any funds going out or coming into the company
from emails entering the inbox.

That’s how BEC is done. Once you are done with one business/company, move on to the next and
keep repeating the process.

If you have any questions, feel free to text me on Telegram @checkspammer


(https://t.me/checkspammer/)

Also, if want hands-on training/walkthrough together with the “adminrootaccess.py” hack code, you
can also DM me.

Price for the code alone: $500

Price for hands-on walkthrough with the code: $700

For other spamming methods:

- Checks
- Bank Logs
- Credit Card Info
- Bitcoin Wallets

And many more, visit our channel: https://t.me/banklogscashoutchecks/

You might also like