Sri Lanka Loses $625K in Second Hack as BEC Attacks Expand

Key Takeaways

- Sri Lanka lost $625,000 in a payment to the U.S. Postal Service that went missing weeks ago
- This follows a $2.5 million theft from the finance ministry disclosed last week
- Australia has flagged irregularities in Sri Lankan payments, suggesting the breach may be broader
A Second Payment Goes Missing
Sri Lanka disclosed on Tuesday that a payment of approximately $625,000 (about 199.7 million Sri Lankan rupees) to the U.S. Postal Service has been missing for several weeks. U.S. officials alerted Sri Lankan authorities after the payment failed to arrive, according to local media reports.
Authorities discovered this incident while investigating hackers who allegedly attempted to divert another payment intended for India. The disclosure comes just days after Sri Lankan officials announced they were probing a separate $2.5 million theft targeting the country's finance ministry.
The situation may extend beyond these two incidents. Australian officials have reportedly identified irregularities in payments owed to their country, suggesting the Sri Lankan breaches could be broader than initially thought.
Business Email Compromise: A Billion-Dollar Problem
Both incidents appear to be business email compromise attacks. In BEC attacks, hackers break into email inboxes or accounting systems to manipulate bank accounts and routing numbers during invoice payments. The attackers redirect funds to accounts they control instead of the intended recipients.
“to other bank accounts, instead of the intended recipient.”
— Treasury Secretary Harshana Suriyapperuma, describing how hackers diverted the $2.5 million payment
BEC scams remain among the most profitable cybercriminal operations. FBI data shows these attacks resulted in billions of dollars in losses last year alone. The appeal is simple: hackers can steal large sums through a single successful breach, often without deploying malware or complex technical exploits.
Another recent example of how integration vulnerabilities create security gaps
Political Pressure on a Recovering Economy
The successive security failures have added pressure on the Sri Lankan government during an already difficult period. The country is still recovering from an economic crisis that led to a debt default in 2022. That crisis triggered months of protests and the ouster of then-president Gotabaya Rajapaksa.
It remains unclear whether the two confirmed thefts are linked. Member of Parliament Nalinda Jayatissa said the government is investigating whether the incidents are connected.
What Makes BEC Attacks So Effective
BEC attacks succeed because they exploit trust and process rather than technical vulnerabilities. Attackers typically gain access to email accounts through phishing, then monitor communications to understand payment workflows. When they spot a pending large transaction, they insert themselves into the conversation, often impersonating a trusted party and requesting a change to payment details.
Government agencies face particular risks. They handle large, regular payments to foreign entities. Payment processes often involve multiple departments with limited cross-verification. And international wire transfers are difficult to reverse once completed.
- Attackers monitor email to learn payment schedules and vendor relationships
- They impersonate trusted parties to request account number changes
- Wire transfers, especially international ones, are hard to recover
- Multiple departments handling payments create verification gaps
How organizational failures can lead to security incidents
Implications for Government Cybersecurity
The Sri Lankan incidents highlight a persistent blind spot in government cybersecurity. Agencies often focus on protecting classified information and critical infrastructure while treating financial processes as routine administrative functions. But payment systems handle real money in real time, making them attractive targets.
Standard defenses include multi-factor authentication on email accounts, out-of-band verification for payment changes (calling a known number rather than one provided in an email), and real-time monitoring of payment anomalies. The challenge is implementing these controls consistently across large bureaucracies.
Logicity's Take
Frequently Asked Questions
What is a business email compromise attack?
A BEC attack occurs when hackers gain access to email accounts or accounting systems to intercept and redirect legitimate payments. They typically monitor communications to understand payment workflows, then impersonate trusted parties to request changes to bank account details.
How much money has Sri Lanka lost in these attacks?
Sri Lanka has disclosed two incidents totaling $3.125 million: a $2.5 million theft from the finance ministry and a $625,000 missing payment to the U.S. Postal Service. Additional irregularities flagged by Australia suggest the total could be higher.
How can organizations prevent BEC attacks?
Key defenses include multi-factor authentication on email, out-of-band verification for payment changes (calling a known number to confirm requests), real-time monitoring for payment anomalies, and treating any request to change payment details as a potential red flag requiring verification.
Are the Sri Lanka hacks connected?
Authorities are still investigating whether the incidents are linked. Member of Parliament Nalinda Jayatissa confirmed the government is examining potential connections between the thefts.
Need Help Implementing This?
Source: TechCrunch / Zack Whittaker
Huma Shazia
Senior AI & Tech Writer
Related Articles
Browse all
Robotaxi Companies Are Hiding How Often Humans Take the Wheel
Autonomous vehicle firms like Waymo and Tesla are under scrutiny for refusing to disclose how often remote operators step in to control their self-driving cars. A Senate investigation reveals major gaps in transparency, raising safety and accountability concerns.

Wisconsin Governor Throws a Wrench in Age Verification Plans
Wisconsin Governor Tony Evers has vetoed a bill that would have required residents to verify their age before accessing adult content online, citing concerns over privacy and data security. This move comes as several other states have already implemented similar age check requirements. The veto has significant implications for the future of online age verification.

Apple's App Store Empire Under Siege: The Battle for the Future of Tech
The long-running feud between Apple and Epic Games has reached a boiling point, with Apple preparing to take its case to the Supreme Court. The tech giant is fighting to maintain control over its App Store, while Epic Games is pushing for more freedom for developers. The outcome could have far-reaching implications for the entire tech industry.

Tesla's Remote Parking Feature: The Investigation That Didn't Quite Park Itself
The US auto safety regulators have closed their investigation into Tesla's remote parking feature, but what does this mean for the future of autonomous driving? We dive into the details of the investigation and what it reveals about the technology. The National Highway Traffic Safety Administration found that crashes were rare and minor, but the investigation's closure doesn't necessarily mean the feature is completely safe.
Also Read

Samsung Foundry Hits 80% Yield on 4nm Chips
Samsung's 4nm chip manufacturing process has crossed the 80% yield threshold, signaling process maturity after six years of production. The milestone positions Samsung to compete more directly with TSMC for AI accelerator and automotive chip contracts.

5 Best VPNs for Gaming in 2026: Speed Tested and Ranked
PC Gamer overhauled its VPN gaming guide with fresh benchmarks. NordVPN takes the overall crown, but Windscribe delivered the lowest ping in testing. Here's how each top pick performs for different use cases.

Why Affinity 2 Beats Photoshop for Most Users
Serif's Affinity suite went free after Canva's acquisition, offering Photoshop-level features without Adobe's $240/year subscription. For photographers, designers, and casual users, it's now the best alternative to both Photoshop and Canva.