These articles are for general information purposes only and are not intended to provide legal, tax, accounting or financial advice. PNC urges its customers to do independent research and to consult with security, financial and legal professionals before making any financial decisions. This site may provide reference to internet sites as a convenience to our readers. While PNC endeavors to provide resources that are reputable and safe, we cannot be held responsible for the information, products or services obtained on such sites and will not be liable for any damages arising from your access to such sites. The content, accuracy, opinions expressed and links provided by these resources are not investigated, verified, monitored or endorsed by PNC.
Small Business Email Compromise & Spoofing
Communication and validation are key to protection
When an accounts payable employee at a small manufacturing company received an urgent email from the firm’s CEO to wire a significant amount of money immediately to an unfamiliar account, her urge to confirm the details was waylaid when informed in a follow up email that the funds were needed for an acquisition that must be completed with haste or the opportunity would pass. After $250,000 was wired, it was discovered that the CEO was not the source of the request; his email account had been taken over by a fraudster who disappeared with the funds.
Business Email Compromise is a type of fraud perpetrated via email in which a business is tricked into transferring funds to accounts controlled by the criminals or handing over sensitive data, such as employees’ names, addresses and Social Security numbers. While scammers target businesses of all sizes, small businesses often lack the scale or the resources, for a sophisticated cybersecurity program. However, small businesses are not defenseless. These basic precautions can help to prevent Business Email Compromise.
How It Works
Business Email Compromise, or BEC, occurs when someone falsifies a legitimate email address to authorize the disclosure of sensitive information or the transfer of funds to accounts managed by criminals. The scammer either hijacks or spoofs (impersonates) the email account of an executive who is authorized to instruct other employees to initiate payments, such as wire transfers or an Automated Clearinghouse (ACH) transfer.
Sometimes, fraudsters impersonate legitimate vendors, and trick unsuspecting victims (businesses of all sizes) to re-route future payments to a different account, set up and controlled by fraudsters. Some reasons offered for the creation of new accounts include moving their business account to a different bank or because the account routinely used is undergoing an audit.
The employee believes the email instructions to be legitimate and completes the transfer of funds as requested, unknowingly depositing company funds into bank accounts controlled by the scammer.
Types of Attack
The scammer needs some critical information in order to successfully impersonate the executive’s or legitimate vendor’s real email account to initiate the fraudulent transfer of funds or data:
Warning Signs
- An employee receives an email from a higher-up executive/manager ordering them to quickly process an invoice, change the recipient of a payment or provide sensitive data.
- The message is urgent and presses the employee to bypass standard policies and procedures.
- The email comes from the executives/managers personal account rather than their company account.
- The email address of the sender is a variation of the real company’s email addresses.
Tips for Employers
- Create a culture that encourages employees to verify instructions directly with those executives who are authorized to approve payments prior to releasing funds.
- Establish basic security practices and policies for employees, such as requiring strong passwords and multi-factor authentication for employees to access areas of the network with sensitive information.
- Train staff on Business Email Compromise and how to spot spoofed and spear-phishing emails.
- Have a separation of duty – the same employee should not be able to initiate and approve money movement.
Tips for Employees
- Call the appropriate executive/manager to request validation or clarification of unusual payment requests prior to authorizing transactions or disclosing sensitive data, such as personnel records. Use a known phone number.
- Verbally confirm emailed instructions from a vendor or supplier to change payment methods or bank information. Call them on a known contact number.
- Do not deviate from established policies and procedures regarding payments, the transfer of funds or disclosure of sensitive data.
- Carefully check the email address of any individual requesting a transfer of funds or sensitive data; scammers may slightly vary a genuine address, adding a letter or changing punctuation to make it appear legitimate.
- Be cautious about sharing specific information about your job on social media sites. Attackers can use your profile information to gain knowledge about your company, your role and technology used, and target you with phishing or social engineering campaigns to execute this type of fraud.