top of page

The Whaling cyber attack on Belgian Crelan Bank

Writer: Akshay JainAkshay Jain

In 2016, Crelan Bank, a prominent Belgian financial institution, became the target of a sophisticated whaling attack, a type of Business Email Compromise (BEC) that exploits human vulnerabilities more than technical ones. The attackers stole a staggering €70 million by leveraging advanced social engineering tactics. This breach serves as a cautionary tale for organizations worldwide, highlighting the critical need for robust cybersecurity awareness and defenses.


But what exactly is a whaling attack, and how did it unfold at Crelan Bank? In this blog, we’ll dive deep into the technical workings of the attack, the methods employed by the cybercriminals, and the lessons every organization can learn to prevent similar incidents.


What Is a Whaling Attack?

A whaling attack is a specific form of phishing that targets high-ranking individuals within an organization - often C-suite executives like CEOs or CFOs. These attacks aim to exploit the authority and access of such individuals to manipulate others or directly steal sensitive data and funds.


Key Characteristics of Whaling Attacks
  1. Highly Personalized: Unlike generic phishing emails, whaling attacks are tailored to the victim, often referencing their name, position, or specific organizational details.

  2. Deceptive Communication: Attackers use emails that appear to come from trusted sources, such as another executive, a board member, or even regulators.

  3. Psychological Manipulation: They exploit human tendencies, such as urgency or trust in authority, to prompt quick action without scrutiny.

  4. No Malware Required: Many whaling attacks rely solely on social engineering, making them harder to detect with traditional antivirus solutions.

The attack against Crelan Bank was a textbook example of a whaling attack executed to perfection.



Whaling attack
Whaling attack


The Anatomy of the Crelan Bank Attack

Let’s break down the attack step by step to understand how the cybercriminals orchestrated this breach.


Step 1: Reconnaissance

Before launching the attack, the perpetrators conducted extensive open-source intelligence (OSINT) to gather detailed information about Crelan Bank’s internal structure. They likely:

  • Identified key executives through LinkedIn, company press releases, and social media.

  • Collected organizational details, such as recent financial activity or ongoing projects.

  • Analyzed email patterns and writing styles to craft convincing impersonation emails.


Step 2: Crafting the Attack

The attackers posed as a senior executive - potentially the CEO and sent a spoofed email to employees in the finance department. The email contained:

  • A tone of urgency, requesting immediate action.

  • Instructions to transfer a large sum of money (€70 million) to an external account.

  • A convincing rationale, such as covering a confidential transaction.


Step 3: Execution

The finance team, trusting the apparent authority of the sender, complied with the instructions. Unfortunately, due to the realistic nature of the email and the urgency it conveyed, no verification was performed, allowing the attackers to successfully steal the funds.


Step 4: Post-Attack Actions

Once the funds were transferred, the attackers quickly moved the money across multiple accounts, likely using money mule networks and cryptocurrency exchanges to obscure the trail. By the time the fraud was discovered, recovering the stolen funds became nearly impossible.


Practical Applications: Defending Against Whaling Attacks

Organizations can implement several strategies to mitigate the risk of whaling attacks:

1. Cybersecurity Awareness Training

Educating employees especially those in high-risk roles like finance is critical. Training should cover:

  • Identifying signs of phishing and whaling.

  • Recognizing psychological manipulation tactics.

  • Encouraging a culture of verification, even for requests from senior executives.


2. Implementing Multi-Layered Verification

Dual-approval processes for sensitive transactions can prevent unauthorized actions. For example:

  • Require verbal confirmation or a secondary authorization from another executive.

  • Use secure communication channels to verify requests.


3. Email Authentication Technologies

Technical measures can significantly reduce the risk of spoofed emails:

  • SPF (Sender Policy Framework): Ensures emails are sent from authorized servers.

  • DKIM (DomainKeys Identified Mail): Verifies that email content hasn’t been tampered with.

  • DMARC (Domain-based Message Authentication, Reporting, and Conformance): Combines SPF and DKIM to provide a robust email authentication framework.


Conclusion: Lessons Learned from Crelan Bank

The whaling attack on Crelan Bank serves as a stark reminder of the evolving cyber threat landscape. While technology plays a crucial role in cybersecurity, human awareness and vigilance remain the first line of defense.

By investing in employee training, implementing layered security protocols, and fostering a culture of skepticism toward unsolicited requests, organizations can significantly reduce their risk of falling victim to whaling and other social engineering attacks.

As cybercriminals become more sophisticated, the question isn’t if an organization will be targeted, but when. The key to resilience lies in preparation, education, and continuous adaptation. Let’s learn from incidents like the Crelan Bank attack to build a safer digital world.


-AJ

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page