Our website uses cookies to ensure a great experience. We also use third party cookies. To find out more about the cookies on our web site, please read our privacy policy. By continuing to use our website, you agree to the use of cookies. Continue
How Can We Help You? Request a Quote Today! Click Here

Wire Transfer Fraud

Tue, Oct 29, 2019 at 10:30AM

Wire Transfer Fraud

What would you do if you received an email from your CEO or CFO asking you to make an immediate or urgent wire transfer of funds? If you are the person in your organization who is responsible for such tasks and receive requests like this regularly, you may not think twice. However, with the increased sophistication of hackers and cybercriminals, you must Stop, Look, and Think before deciding how to proceed.

Business Email Compromise is an advanced form of spear-phishing which targets employees of businesses that routinely perform wire transfer payments or work with foreign companies or suppliers. This form of cybercrime is steadily on the rise, and companies are losing thousands, even millions of dollars instantly because of a spoofed or compromised email address.

How it Happens:
First, the scammers target the email accounts of business executives or high-level employees. Either they will gain actual access to those individuals’ email accounts through a targeted phishing attack and wait for the perfect time to take over (such as when those employees go on vacation or leave for a business trip), or they will simply spoof the email address and change where the email is sent when it is replied to. This is called header manipulation. Then, they will email an employee within an organization who may be responsible for making wire transfers or handling funds, asking them to process a transaction.

When you receive any requests to transfer or wire funds:

  • Look closely to verify the email address when you receive a wire transfer or monetary transaction request. Check for any spelling errors or missing letters. 
  • Call the person who is requesting the transfer directly to verify that the request is legitimate, or follow your corporate verification procedures carefully. 
  • If you think a request is suspicious in any way, trust your instincts and inform management or IT immediately.
  • If you reply to the message, be sure to look at the real email address before replying.
  • To prevent YOUR email from being the one that is compromised:
  • Never provide your security or account credentials to anyone. 
  • Do not click on any links or open attachments in emails you receive, unless you are absolutely positive they are safe and from a legitimate sender. 

It is best to have a wire transfer process in place that requires more than just an email request. Either a phone call, face-to-face, or multi-person process is best.

Remember, you are the key to preventing cybercrime in your organization. 

 


Bookmark & Share



User Comments


Be the first to comment on this post below!