Scarinci Hollenbeck, LLC, LLCScarinci Hollenbeck, LLC, LLC

Firm Insights

Cyber Sting Reveals Corporate Vulnerabilities to BEC Scams

Author: Scarinci Hollenbeck, LLC

Date: July 5, 2018

Key Contacts

Back

The DOJ Recently Enacted a Crackdown on BEC Scams, Netting 74 Arrests

The Department of Justice (DOJ) recently announced a global cyber sting operation that netted 74 arrests. The crackdown specifically targeted Business Email Compromise (BEC) scams, which pose a growing threat to businesses of all sizes. A BEC is when a hacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers, or partners of money, etc.

Cyber Sting Reveals Corporate Vulnerabilities to BEC Scams
Photo courtesy of Rayi Christian Wicaksono (Unsplash.com)

According to a press statement by the DOJ, “Operation Wire Wire” involved a coordinated law enforcement effort with the U.S. Department of Homeland Security, U.S. Department of the Treasury, and the U.S. Postal Inspection Service. The operation, which was conducted over a six-month period, resulted in the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

In one case, the defendant gained access to email accounts belonging to a Massachusetts real estate attorney and sent emails to recipients that “spoofed” the real estate attorney’s account in an attempt to cause the email recipient to transfer nearly $500,000, which was intended to be used for payment in connection with a real estate transaction, to a shell account controlled by the defendant. Another case involved 23 individuals charged in the Southern District of Florida with laundering at least $10 million from proceeds of BEC scams, including approximately $1.4 million from a victim corporation in Seattle, as well as various title companies and a law firm.

The Hallmarks of a BEC Scam

BEC scams often target businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. They also seek out businesses or law firms involved in large deals or real estate transactions. The perpetrators compromise legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.

There are several versions of the BEC fraud. In one common scam, a business, which often has a long-standing relationship with a supplier, is asked to wire funds for invoice payment to an alternate, fraudulent account. Another scam involves hacking into the e-mail accounts of high-level business executives and using the compromised account to send a wire transfer request to a second employee within the company who is normally responsible for processing these requests or directly to the financial institution.

BEC scams can take a variety of other forms. For instance, they may involve fraudulent requests for checks rather than wire transfers, and they may target sensitive information such as personally identifiable information (PII) or employee tax records instead of, or in addition to, money. In addition, they do not always involve an actual “compromise” of an email account or computer network. 

Because BEC scams are often fairly sophisticated, they can be difficult to detect. Perpetrators often monitor and gather information about their victims for several months prior to launching an attack. Accordingly, the e-mail requests for a wire transfer are well written and specific to the business being victimized. In addition, the dollar amounts requested are similar to normal business transaction amounts in an effort to avoid suspicion.

How to Prevent Falling Victim to a BEC Scam

Business email compromise scams can significantly hurt your bottom-line by not only causing financial losses, but also by harming your business relationships with clients and vendors. Given the risks, here are several tips for safeguarding your company against these attacks:

  • Avoid using free, web-based e-mail accounts to conduct business.
  • Beware of what your business posts to social media and company websites, especially job duties/descriptions, hierarchal information, and out of office details.
  • Train employees not open e-mail from unknown senders, click on links in the e-mail, or open attachments.
  • Do not use the “Reply” option to respond to any business e-mails. Instead, use the “Forward” option and either type in the correct e-mail address or select it from the e-mail address book to ensure the intended recipient’s correct e-mail address is used.
  • Implement comprehensive policies regarding wire transfer requests that specifically address how to handle requests to change a wire recipient’s account information, requests to add a new recipient, or requests that take place outside of the normal channels.
  • Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail. For example, legitimate e-mail of com would flag fraudulent e-mail of abc-company.com.
  • Register all company domains that are slightly different than the actual company domain.
  • Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign- off by company personnel.
  • Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the e-mail request.
  • Know the habits of your customers, including the details of, reasons behind, and amount of payments.
  • Carefully scrutinize all e-mail requests for transfer of funds to determine if the requests are out of the ordinary.

For businesses, it can be difficult to keep track of the increasing number of cyber threats. As they say in sports, the best defense is a good offense. That means making it as difficult as possible for cyber criminals to target your business and being ready to respond should you still fall victim to an attack.

Do you have any feedback, thoughts, reactions or comments concerning this topic? Feel free to leave a comment below for Fernando M. Pinguelo. If you have any questions about this post, please contact me or the Scarinci Hollenbeck attorney with whom you work. To learn more about data privacy and security, visit eWhiteHouse Watch – Where Technology, Politics, and Privacy Collide (http://ewhwblog.com).

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Scarinci Hollenbeck, LLC, LLC

Related Posts

See all
Does Your Homeowners Insurance Provide Adequate Coverage? post image

Does Your Homeowners Insurance Provide Adequate Coverage?

Your home is likely your greatest asset, which is why it is so important to adequately protect it. Homeowners insurance protects you from the financial costs of unforeseen losses, such as theft, fire, and natural disasters, by helping you rebuild and replace possessions that were lost While the definition of “adequate” coverage depends upon a […]

Author: Jesse M. Dimitro

Link to post with title - "Does Your Homeowners Insurance Provide Adequate Coverage?"
Understanding the Importance of a Non-Contingent Offer post image

Understanding the Importance of a Non-Contingent Offer

Making a non-contingent offer can dramatically increase your chances of securing a real estate transaction, particularly in competitive markets like New York City. However, buyers should understand that waiving contingencies, including those related to financing, or appraisals, also comes with significant risks. Determining your best strategy requires careful analysis of the property, the market, and […]

Author: Jesse M. Dimitro

Link to post with title - "Understanding the Importance of a Non-Contingent Offer"
Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC post image

Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC

Business Transactional Attorney Zemel to Spearhead Strategic Initiatives for Continued Growth and Innovation Little Falls, NJ – February 21, 2025 – Scarinci & Hollenbeck, LLC is pleased to announce that Partner Fred D. Zemel has been named Chair of the firm’s Strategic Planning Committee. In this role, Mr. Zemel will lead the committee in identifying, […]

Author: Scarinci Hollenbeck, LLC

Link to post with title - "Fred D. Zemel Appointed Chair of Strategic Planning at Scarinci & Hollenbeck, LLC"
Novation Agreement Process: Step-by-Step Guide for Businesses post image

Novation Agreement Process: Step-by-Step Guide for Businesses

Big changes sometimes occur during the life cycle of a contract. Cancelling a contract outright can be bad for your reputation and your bottom line. Businesses need to know how to best address a change in circumstances, while also protecting their legal rights. One option is to transfer the “benefits and the burdens” of a […]

Author: Dan Brecher

Link to post with title - "Novation Agreement Process: Step-by-Step Guide for Businesses"
What Is a Trade Secret? Key Elements and Legal Protections Explained post image

What Is a Trade Secret? Key Elements and Legal Protections Explained

What is a trade secret and why you you protect them? Technology has made trade secret theft even easier and more prevalent. In fact, businesses lose billions of dollars every year due to trade secret theft committed by employees, competitors, and even foreign governments. But what is a trade secret? And how do you protect […]

Author: Ronald S. Bienstock

Link to post with title - "What Is a Trade Secret? Key Elements and Legal Protections Explained"
What Is Title Insurance? Safeguarding Against Title Defects post image

What Is Title Insurance? Safeguarding Against Title Defects

If you are considering the purchase of a property, you may wonder — what is title insurance, do I need it, and why do I need it? Even seasoned property owners may question if the added expense and extra paperwork is really necessary, especially considering that people and entities insured by title insurance make fewer […]

Author: Patrick T. Conlon

Link to post with title - "What Is Title Insurance? Safeguarding Against Title Defects"

No Aspect of the advertisement has been approved by the Supreme Court. Results may vary depending on your particular facts and legal circumstances.

Sign up to get the latest from our attorneys!

Explore What Matters Most to You.

Consider subscribing to our Firm Insights mailing list by clicking the button below so you can keep up to date with the firm`s latest articles covering various legal topics.

Stay informed and inspired with the latest updates, insights, and events from Scarinci Hollenbeck. Our resource library provides valuable content across a range of categories to keep you connected and ahead of the curve.

Cyber Sting Reveals Corporate Vulnerabilities to BEC Scams

Author: Scarinci Hollenbeck, LLC

The DOJ Recently Enacted a Crackdown on BEC Scams, Netting 74 Arrests

The Department of Justice (DOJ) recently announced a global cyber sting operation that netted 74 arrests. The crackdown specifically targeted Business Email Compromise (BEC) scams, which pose a growing threat to businesses of all sizes. A BEC is when a hacker gains access to a corporate email account and spoofs the owner’s identity to defraud the company or its employees, customers, or partners of money, etc.

Cyber Sting Reveals Corporate Vulnerabilities to BEC Scams
Photo courtesy of Rayi Christian Wicaksono (Unsplash.com)

According to a press statement by the DOJ, “Operation Wire Wire” involved a coordinated law enforcement effort with the U.S. Department of Homeland Security, U.S. Department of the Treasury, and the U.S. Postal Inspection Service. The operation, which was conducted over a six-month period, resulted in the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

In one case, the defendant gained access to email accounts belonging to a Massachusetts real estate attorney and sent emails to recipients that “spoofed” the real estate attorney’s account in an attempt to cause the email recipient to transfer nearly $500,000, which was intended to be used for payment in connection with a real estate transaction, to a shell account controlled by the defendant. Another case involved 23 individuals charged in the Southern District of Florida with laundering at least $10 million from proceeds of BEC scams, including approximately $1.4 million from a victim corporation in Seattle, as well as various title companies and a law firm.

The Hallmarks of a BEC Scam

BEC scams often target businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. They also seek out businesses or law firms involved in large deals or real estate transactions. The perpetrators compromise legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.

There are several versions of the BEC fraud. In one common scam, a business, which often has a long-standing relationship with a supplier, is asked to wire funds for invoice payment to an alternate, fraudulent account. Another scam involves hacking into the e-mail accounts of high-level business executives and using the compromised account to send a wire transfer request to a second employee within the company who is normally responsible for processing these requests or directly to the financial institution.

BEC scams can take a variety of other forms. For instance, they may involve fraudulent requests for checks rather than wire transfers, and they may target sensitive information such as personally identifiable information (PII) or employee tax records instead of, or in addition to, money. In addition, they do not always involve an actual “compromise” of an email account or computer network. 

Because BEC scams are often fairly sophisticated, they can be difficult to detect. Perpetrators often monitor and gather information about their victims for several months prior to launching an attack. Accordingly, the e-mail requests for a wire transfer are well written and specific to the business being victimized. In addition, the dollar amounts requested are similar to normal business transaction amounts in an effort to avoid suspicion.

How to Prevent Falling Victim to a BEC Scam

Business email compromise scams can significantly hurt your bottom-line by not only causing financial losses, but also by harming your business relationships with clients and vendors. Given the risks, here are several tips for safeguarding your company against these attacks:

  • Avoid using free, web-based e-mail accounts to conduct business.
  • Beware of what your business posts to social media and company websites, especially job duties/descriptions, hierarchal information, and out of office details.
  • Train employees not open e-mail from unknown senders, click on links in the e-mail, or open attachments.
  • Do not use the “Reply” option to respond to any business e-mails. Instead, use the “Forward” option and either type in the correct e-mail address or select it from the e-mail address book to ensure the intended recipient’s correct e-mail address is used.
  • Implement comprehensive policies regarding wire transfer requests that specifically address how to handle requests to change a wire recipient’s account information, requests to add a new recipient, or requests that take place outside of the normal channels.
  • Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail. For example, legitimate e-mail of com would flag fraudulent e-mail of abc-company.com.
  • Register all company domains that are slightly different than the actual company domain.
  • Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign- off by company personnel.
  • Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the e-mail request.
  • Know the habits of your customers, including the details of, reasons behind, and amount of payments.
  • Carefully scrutinize all e-mail requests for transfer of funds to determine if the requests are out of the ordinary.

For businesses, it can be difficult to keep track of the increasing number of cyber threats. As they say in sports, the best defense is a good offense. That means making it as difficult as possible for cyber criminals to target your business and being ready to respond should you still fall victim to an attack.

Do you have any feedback, thoughts, reactions or comments concerning this topic? Feel free to leave a comment below for Fernando M. Pinguelo. If you have any questions about this post, please contact me or the Scarinci Hollenbeck attorney with whom you work. To learn more about data privacy and security, visit eWhiteHouse Watch – Where Technology, Politics, and Privacy Collide (http://ewhwblog.com).

Let`s get in touch!

* The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.

Sign up to get the latest from the Scarinci Hollenbeck, LLC attorneys!

Please select a category(s) below: