{"id":51252,"date":"2023-03-30T20:15:00","date_gmt":"2023-03-30T20:15:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/bec-fraudsters-expand-snatch-real-world-goods-commodities-twist"},"modified":"2023-03-30T20:15:00","modified_gmt":"2023-03-30T20:15:00","slug":"bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/","title":{"rendered":"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Some cybercriminals are flipping their playbook on business email compromise (BEC) scams and, rather than posing as vendors seeking payment, are now posing as buyers, taking their profits in easily sold commodities.<\/p>\n<p>By adopting the identity of a known company, criminal actors are able to order various goods in bulk, get beneficial terms of credit, and disappear before the manufacturer discovers the fraud, stated the FBI in a recent&nbsp;advisory on the trend. The scheme has become more common in specific sectors, with targets&nbsp;including construction materials, agricultural supplies, computer technology hardware, and solar-energy systems, according to the agency.<\/p>\n<p>This form of fraud also allows attackers to escape the notice of financial institutions, which have become very skilled at tracking currency movement and clawing back funds, says Sourya Biswas, technical director of risk management and governance at NCC Group, a consultancy.<\/p>\n<p>&#8220;BEC targeting commodities may have electronic records regarding the ordering, dispatch, and receipt of goods, but not for the last-mile piece where those goods are sold,&#8221; he says. &#8220;Considering the types of commodities targeted \u2014 construction materials, computer hardware, etc. \u2014 these are typically easy to sell in pieces for cash to multiple buyers without triggering red flags.&#8221;<\/p>\n<p>This is not the first time that&nbsp;commodity theft has come to light. Last summer, BEC criminal groups <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/fbi-warns-criminals-bec-attacks-steal-food-shipments\" target=\"_blank\" rel=\"noopener\">targeted food manufacturers<\/a>, stealing sugar and powdered milk by the truckload. In 2021, fraudsters used similar methods, posing as an electrical contracting company, to have <a href=\"https:\/\/www.1011now.com\/2021\/04\/22\/lpd-roughly-110000-worth-of-laptops-stolen-in-scam\/\" target=\"_blank\" rel=\"noopener\">35 MacBooks worth almost $110,000 delivered<\/a> to a business address, but switched the destination at the last minute.<\/p>\n<h2 class=\"regular-text\">Same Tactics, Different Outcome<\/h2>\n<p>In its advisory, the FBI noted that the tactics used by the criminal groups mimics those of more <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/cybercriminals-see-allure-bec-attacks-ransomware\" target=\"_blank\" rel=\"noopener\">traditional&nbsp;BEC scams<\/a>, with threat actors taking control of, or spoofing, legitimate domains of US companies, researching the proper employees to contact at a vendor, and then emailing&nbsp;requests to the vendor that appear to originate with the legitimate company.<\/p>\n<p>However, commodities-fraud operations are harder to uncover than funds-focused BEC fraud. For instance, the criminal groups will often apply for Net-30 or Net-60 terms for payment by providing fake credit references and fraudulent tax forms to vendors, giving them lead time to fence the goods and disappear&nbsp;before suspicion might arise, <a href=\"https:\/\/www.ic3.gov\/Media\/Y2023\/PSA230324\" target=\"_blank\" rel=\"noopener\">the FBI stated in the advisory<\/a>.<\/p>\n<p>&#8220;Victimized vendors assume they are conducting legitimate business transactions fulfilling the purchase orders for distribution,&#8221; the advisory stated. &#8220;The repayment terms allow criminal actors to initiate additional purchase orders without providing upfront payment.&#8221;<\/p>\n<h2 class=\"regular-text\">A Significant Evolution for BEC<\/h2>\n<p>Commodities scams are decades old, especially with easy-to-resell electronics, says Roger Grimes, data-driven defense evangelist at KnowBe4, a cybersecurity services firm.<\/p>\n<p>&#8220;If you know a little industry vernacular and how supply chains work, it&#8217;s easier to convince the victims of the scam,&#8221; he says. &#8220;It&#8217;s also harder to trace the resell of those goods once the fraudster has obtained possession of them. But it also isn&#8217;t every fraudster&#8217;s first choice of how to get paid, because it significantly cuts down on profit margin.&#8221;<\/p>\n<p>The difference now is the interest in the gambit by cybercriminals previously carrying out BEC scams focused on fraudulent money transfers.&nbsp;<\/p>\n<p>The transition to targeting commodities is being driven by necessity in some cases, because <a href=\"https:\/\/www.darkreading.com\/risk\/bec-fraud-attempt-thwarted-ai\" target=\"_blank\" rel=\"noopener\">BEC fraud is squarely on organizations&#8217; radars<\/a> these days. In its &#8220;Internet Crime Report 2022,&#8221; the FBI noted that its Recovery Asset Team (RAT) has recovered nearly three-quarters (73%) of all funds stolen by BEC groups since 2018. And financial institutions have become better at detecting fraud and cutting off funds more quickly, which has forced attackers to adapt, says Dmitry Bestuzhev, senior director of cyberthreat intelligence at BlackBerry.<\/p>\n<p>&#8220;Financial institutions on both sides \u2014 sending or receiving funds \u2014 have been working to make it harder for the BEC operators,&#8221; he says, adding that, for attackers, by &#8220;focusing on goods purchasing, it&#8217;s an easier way to escape the monitoring algorithms &#8230; so even if it&#8217;s a two-step operation, it&#8217;s still safer in terms of traceability and anti-fraud, prevention algorithms.&#8221;<\/p>\n<p>In addition, the simplicity of the scam has made the social-engineering aspects more effective. By asking for payment for goods, impersonating someone in authority, and using the language expected of business transactions, attackers are able to fool non-tech-savvy business people, says the NCC Group&#8217;s Biswas.<\/p>\n<p>Paying attention to advisories, such as the FBI&#8217;s public service announcement, and building processes that can withstand social-engineering attacks is important, he says.<\/p>\n<p>For instance,&nbsp;employees should be trained to spot obvious red flags.&nbsp;While compromising a legitimate company&#8217;s email server provides a more convincing identity with which to conduct fraud, most criminal groups just use variants on the company name, such as changing a &#8220;company.com&#8221; domain to &#8220;co-pany.com&#8221; or &#8220;company-usa.com&#8221; domain, for example.<\/p>\n<p>&#8220;Cybercriminals are always evolving, and defenders should evolve as well,&#8221; Biswas says. &#8220;Any organization that pays for vendor services or supplies goods and services \u2014 that pretty much includes everyone \u2014 should always be on the lookout for &#8230; new cybercrime tactics, techniques, and procedures (TTPs).&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/bec-fraudsters-expand-snatch-real-world-goods-commodities-twist\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business email compromise scams are moving beyond just stealing cash, with some threat actors fooling companies into sending goods and materials on credit, and then skipping out on payment.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/bec-fraudsters-expand-snatch-real-world-goods-commodities-twist\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51252","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-30T20:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist\",\"datePublished\":\"2023-03-30T20:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/\"},\"wordCount\":851,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltabfcc7bbe29d0edc\\\/6425e0c570656e13231f6429\\\/warehouse-Michael_Doolittle-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/\",\"name\":\"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltabfcc7bbe29d0edc\\\/6425e0c570656e13231f6429\\\/warehouse-Michael_Doolittle-alamy.jpg\",\"datePublished\":\"2023-03-30T20:15:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltabfcc7bbe29d0edc\\\/6425e0c570656e13231f6429\\\/warehouse-Michael_Doolittle-alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltabfcc7bbe29d0edc\\\/6425e0c570656e13231f6429\\\/warehouse-Michael_Doolittle-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/","og_locale":"en_US","og_type":"article","og_title":"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-03-30T20:15:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist","datePublished":"2023-03-30T20:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/"},"wordCount":851,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/","url":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/","name":"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg","datePublished":"2023-03-30T20:15:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltabfcc7bbe29d0edc\/6425e0c570656e13231f6429\/warehouse-Michael_Doolittle-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bec-fraudsters-expand-to-snatch-real-world-goods-in-commodities-twist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51252"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51252\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}