fbpx
Search
Close this search box.

Phishing Email Scam Actively Circulating

The word Phishing spelled out in a series of code.

Please be advised that there is a Phishing email circulating that is an attempt to steal money from your business via wire transfer.   This particular scam uses a spoofed email that appears to be from a trusted source.

In order to avoid falling victim to this sophisticated scam, we strongly recommend that any requests for wire transfers that you receive via e-mail be verified directly with the source of the email before you proceed. We have been working closely with several customers over the last few days who have been targeted, and confirmed that the emails are fraudulent and nothing more than an attempt to steal money.   In each instance that we reviewed, the message looked legitimate, and appeared to be from someone within the respective business. Just like most phishing scams, these emails appear to come from a trusted source.  And with this particular scam more than likely they will appear to be from an individual who is in a position of authority within your company, or from a company that you regularly do business with.  Because of online networking sites like LinkedIn, it has become much easier for criminals to identify who is who within an organization and gather enough information to lend credibility to these requests for wire transfers. The objective of this type of scam is generally for financial gain or to access confidential information.  Earlier this year, the FBI issued an alert for this particular style of phishing emails, which they call a Business Email Compromise (BEC) scam.  They noted that it specifically targets businesses that regularly perform wire transfers and/or work with foreign suppliers. This is a global scam that has hit businesses in 45 countries.  Through the end of 2014, the damages from the BEC Scam are estimated as:

  • Total U.S. victims: 1198
  • Total U.S. dollar loss: $179,755,367.08
  • Total non-U.S. victims: 928
  • Total non-U.S. dollar loss: $35,217,136.22
  • Combined victims: 2126
  • Combined dollar loss: $214,972,503.30

The FBI’s Alert provided a list of some of the characteristics you might expect to see from a BEC email: CHARACTERISTICS OF BEC COMPLAINTS

  • Businesses and personnel using open source e-mail are most targeted.
  • Individuals responsible for handling wire transfers within a specific business are targeted.
  • Spoofed e-mails very closely mimic a legitimate e-mail request.
  • Hacked e-mails often occur with a personal e-mail account.
  • Fraudulent e-mail requests for a wire transfer are well-worded, specific to the business being victimized, and do not raise suspicions to the legitimacy of the request.
  • The phrases “code to admin expenses” or “urgent wire transfer” were reported by victims in some of the fraudulent e-mail requests.
  • The amount of the fraudulent wire transfer request is business specific; therefore, dollar amounts requested are similar to normal business transaction amounts so as to not raise doubt.
  • Fraudulent e-mails received have coincided with business travel dates for executives whose e-mails were spoofed.
  • Victims report that IP addresses frequently trace back to free domain registrars.

You can read the FBI alert in its entirety here. Please be sure to advise your team members about this latest phishing attempt, and recommend that all such requests be verified with additional sources even if it looks like a legitimate email.  This is a real threat that carries the potential for substantial financial loss if anyone is caught unaware.

What Is a Phishing Email?

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. There are generally 3 different types – Phishing, Spear Phishing and Whale Phishing.  Spear Phishing is the same as Phishing with one key difference – the attack is targeted towards a specific person or group. Whaling is the same thing as Spear Phishing, but with Whale Phishing the specific target is high-value, such as company CEOs, CFOs, etc. At least one of the emails we reviewed was a Whale Phishing attempt because it was targeted at the company’s CFO. Have questions about phishing training, email security or how to make sure your business network is secure?  Don’t wait – schedule a free IT assessment with one of our expert technicians.  You can also reach us at 877-367-9348 or service@corsicatech.com.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

IT Outsourcing Company Trends - Corsica Technologies

11 Emerging Trends in Technology and IT Outsourcing

Things change fast in the world of technology. From emerging trends in cybersecurity to EDI and data integration, it’s challenging for midmarket companies to meet the technology needs of their internal and external customers. For many organizations, outsourcing is the

Read more
EDI Issues and Challenges - Corsica Technologies

7 Pitfalls To Avoid On Your EDI Journey

Electronic Data Interchange (EDI) is an essential technology for exchanging transactional data between business partners, also known as Trading Partners in the EDI community. From orders, invoices, and advance shipment notifications to benefit enrollments, claims processing, and payment authorizations, numerous

Read more
Cybersecurity Trends 2024 - Corsica Technologies

10 Cybersecurity Trends Emerging In 2024

When it comes to cybersecurity, things are never static. So far, 2024 is consistent with this theme. We’re seeing a mix of familiar trends intensifying alongside startling new developments. From the cybersecurity skills crunch to AI-powered attacks, 2024 is shaping

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.