3 min read
Malware vs. Ransomware: Spotting the Difference for Idaho’s Digital Safety
In Idaho, where businesses and residents rely on technology for everything from managing agricultural operations in Twin Falls to running tourism...
2 min read
Chelsea Zimmerman
:
February 18, 2026
When most businesses think about cybercrime, they think about ransomware.
Locked files.
Shut down systems.
A ransom note demanding cryptocurrency.
But not every attack ends with encryption. And increasingly, that’s intentional. Some attackers don’t need to lock your files to get paid; they just need access to your email.
We recently heard of a local business that experienced a sophisticated email compromise.
They had multi-factor authentication (MFA) enabled.
They had security tools in place.
They were doing what most businesses are told to do.
But an employee fell victim to a highly convincing phishing attack. This wasn’t a basic “enter your password” scam. It was a modern man-in-the-middle attack designed to capture more than credentials.
The attacker likely stole a session token.
A session token is what keeps you logged into Microsoft 365 or other cloud services after you complete MFA. If an attacker captures that token in real time, they don’t need your password — and they don’t need your MFA code again. They’re not breaking in - they’re inheriting an already authenticated session.
And once inside, they didn’t deploy ransomware.
They watched.
Instead of making noise, the attacker created a mailbox forwarding rule. Copies of emails were silently sent to an external address.
From the employee’s perspective, everything worked normally.
No password change prompts.
No locked accounts.
No antivirus alerts.
Just business as usual.
Behind the scenes, the attacker monitored financial conversations. They learned payment cycles. They observed vendor relationships. They studied internal communication styles. They were patient.
When the right moment came, the attacker inserted themselves into a legitimate payment conversation. Because they were inside a real mailbox, the emails looked authentic.
No spoofed domains.
No obvious red flags.
No broken formatting.
Just updated wiring instructions.
The employee, thinking they were talking to a co-worker, sent the wire transfer that was requested. But the real co-worker didn't know anything about the transfer. It was only after the money left the account leadership realised what had happened.
Silver lining? No ransomware was ever deployed. But that was never the goal.
Ransomware is loud. It forces immediate response. Business Email Compromise (BEC) is quiet — and often just as financially damaging. From an attacker’s perspective, BEC has advantages:
If they can move money without detonating encryption, they reduce risk while maximizing payout.
The end goal isn’t always ransom; It’s revenue.
So did they.
Multi-factor authentication remains critical and dramatically reduces risk. But it is not invincible. Modern phishing kits (often crafted with the use of AI) are specifically designed to:
Security today isn’t just about blocking login attempts. It’s about monitoring what happens after login. If no one is watching for abnormal behavior, a compromised session can look completely legitimate.
In incidents like this, there are usually subtle indicators:
These are not things most organizations review daily - but your IT partner should.
We don’t just focus on malware. We focus on compromise detection. Our updated approach to these new threats includes:
Because preventing Business Email Compromise isn’t about stopping spam; It’s about identifying when trust has been hijacked.
Not every cyberattack ends with a ransom note. Some end with a bank confirmation.
Business Email Compromise is effective because it doesn’t rely on dramatic disruption. It relies on patience, access, and timing. And sometimes, the most dangerous breach is the one that looks like a normal workday. The goal isn’t always encryption. Sometimes, it’s simply getting paid.
3 min read
In Idaho, where businesses and residents rely on technology for everything from managing agricultural operations in Twin Falls to running tourism...
Have you been hearing more about email authentication lately? There is a reason for that. It’s the prevalence of phishing as a major security threat.
As business owners, we do everything we can to keep our businesses secure. We invest in security tools, train our teams to spot scams and stay alert...