In today’s interconnected world, cyber threats are a constant challenge for businesses across sectors. At Breitto, we take cybersecurity seriously and strive to protect our customers and partners from potential threats. Recently, we have noticed suspicious activity related to fraudulent emails sent from domains that mimic our official breitto.com address. The purpose of this article is to inform readers how to identify such threats, what actions we have taken and what recommended security measures we should take.
Understanding the Threat: Fraudulent Emails
Phishing emails are a common method used by cyber criminals to impersonate trustworthy organisations and extract sensitive information. These emails can be sent from addresses that resemble legitimate domains, such as breito.org, breito.net, or from unofficial emails that contain employee names (e.g. [email protected]). These fraudulent messages often ask for information related to shipments, documents or itineraries in an attempt to breach data security.
“Breitto’s response: Cooperation with authorities
When Breitto detected the suspicious emails, it took immediate action to prevent any possible exposure. We gathered all relevant information and notified law enforcement authorities and the National Cyber Security Centre (NCSC) for further investigation. In cooperation with these authorities, we ensured a thorough assessment and comprehensive response to the incident.
How to identify and protect yourself from phishing attacks
To help you protect yourself against similar threats, here are the main ways to recognise and prevent phishing emails:
- Check the sender’s email address
Always double check the sender’s address. Even small deviations from the official domain (e.g. extra letters, different domain extensions) may indicate a fraud attempt. - Be aware of language and formatting red flags
Fraudulent emails often contain grammatical errors, unusual wording or an unprofessional tone. If the style seems unusual or does not fit the typical communication of your company or partners, be careful. - Question unexpected requests for sensitive information
Be wary of emails that ask for confidential information or create a sense of urgency. Legitimate companies rarely ask for confidential information by email without due diligence. - Avoid clicking on suspicious links or opening unknown attachments
Fraudulent emails may contain links or attachments that look legitimate but lead to malicious websites or contain malware. Hover over links to check the URL before clicking on them and avoid downloading attachments unless you are sure of their authenticity.
Recommended actions if you receive a suspicious email
- Do not reply to the email or contact it. Avoid clicking on any links or downloading attachments.
- Report the email to your IT department or security team, if any. “In the case of Breitto, we advise our customers to forward such emails to us so that we can monitor and report if necessary.
- Alert the authorities. If you believe you have been the target of a fraudulent scam, please report it to the relevant law enforcement authorities or a cyber security centre such as the NCSC.
Breitto’s commitment to security
While we await the outcome of the investigation by law enforcement authorities and the NCSC, we are committed to keeping our customers and partners informed and safe. By sharing these insights and recommendations, we aim to promote awareness and strengthen collective cyber security practices.
Stay vigilant
Cybersecurity is a shared responsibility. By recognising fraud attempts and knowing how to react to them, individuals and businesses can protect themselves from becoming victims of cyber-attacks. Breitto continues to prioritise security and transparency, working closely with experts and authorities to maintain safe and secure services for all.