BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Scammers Convinced Erie Employee to Wire Million Dollars

Small Town Reeling After BEC Scammers Get Employee to Wire $1M

Would you fall for this scam that cost a small town $1M? Find out what a BEC scam is, how it works, and what you can do to keep your company from falling victim.

What would you do if you found out your employee just cost you a million dollars? We’ll just guess they probably wouldn’t stay working for you much longer.

The little town of Erie, Colorado, was recently faced with this scenario. Hackers used a Business Email Compromise (BEC) scam to deplete the town’s savings.

Don’t know what a BEC scam is? You should. Here’s what you need to know

Business Email Compromise

What Is a BEC Scam & How Does It Work?

BEC scams are targeted and sinister. In this scam, a hacker gains access to the business email someone in C-suite, or of similar power.

Once inside, they monitor the account to determine who among your staff they should target from that account for financial gain. Once they’ve identified the person who holds the purse strings, they send that person an email from your account with instructions to wire money somewhere.

If the person who receives the email is suspicious, hackers don’t want their cover blown. So they may also mess with your email rules so that any emails received with words like “scam”, “is this a joke” or “please verify” in them automatically get deleted.

They may target several people to see who takes the bait. And the scammers use the principle of social engineering to convince people to comply.

In the case of the Erie BEC scam, the criminals were able to find a real account payable and request that the employee change where the payment was sent.

This gave legitimacy to the request that reduced suspicion.

How Do Hackers Get Access to Your Email?

The most common way to hack your email is through a phishing email scam. The fraudster may send an email to you that looks like it’s from your email service provider. They then trick you into giving up your password by having you log into a spoofed website or download malicious key-tracking software.

If your business email is through Microsoft, Google or another company with many product lines that use a single password, they can get it in a roundabout way, further lowering your guard.

If you don’t have a strong password, they may also be able to guess it by following the bread crumb trail all of us leave online.

How Do You Protect Against BEC Scams?

BEC scams are convincing. You’re dealing with professional con artists, not hacker hobbyists. Because of that, you need a multi-faceted plan, which will include email scam security solutions like:

  • Employee education
  • Having a clear verification process including additional safeguards when changing where payment is sent or when other red flags go up
  • Email server monitoring for suspicious activity
  • Strong password policy with two-step verification along with enforcement
  • Spam filters, which reduce the risk of you or someone else in C-suite seeing the spoof email in the first place.
  • Up-to-date malware protection

And above all, stay informed about scams and schemes like these. Criminals constantly adapt their strategies. Don’t fall for it. Follow our blog to stay up-to-date.

More Like This

Are You Ready For Pandemic 2.0?

Will We Have Another Wave Of COVID-19? Dr. Anthony Fauci has made clear that he is almost certain the novel coronavirus will come back in the fall. Even so, a whopping 42% of CFOs don’t have a plan for what to do if the pandemic and accompanying shutdowns hit yet again. Don’t wait until fall hits to start …

Are You Ready For Pandemic 2.0? Read More »

Read More

AA20-133A: Top 10 Routinely Exploited Vulnerabilities

Original release date: May 12, 2020 Summary The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government are providing this technical guidance to advise IT security professionals at public and private sector organizations to place an increased priority on patching the most commonly known vulnerabilities exploited by …

AA20-133A: Top 10 Routinely Exploited Vulnerabilities Read More »

Read More

AA20-126A: APT Groups Target Healthcare and Essential Services

Original release date: May 5, 2020 Summary This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC continue to see indications that advanced persistent threat (APT) groups are exploiting the Coronavirus Disease 2019 …

AA20-126A: APT Groups Target Healthcare and Essential Services Read More »

Read More

Is this a new version of Nefilim Ransomware or something different?

Original release date: May 5, 2020 Summary A possible new variant or maybe a different tactic now being used by the Nefilim Ransomware Background As noted originally by the BleepingComputer the ransomware going by the name of Nefilim came to be around the end of February2020. While these threat actors originally deployed a Tor Payment …

Is this a new version of Nefilim Ransomware or something different? Read More »

Read More

How to Use Microsoft Teams

How to Use Microsoft Teams Technology Microsoft Teams has quickly become one of the most popular tools businesses are using as employees have migrated to working from home. How can your business best use Teams and its features to keep employees connected and productive during the COVID-19 pandemic? What Is Microsoft Teams? Microsoft Teams is …

How to Use Microsoft Teams Read More »

Read More

AA20-120A: Microsoft Office 365 Security Recommendations

Original release date: April 29, 2020 Summary As organizations adapt or change their enterprise collaboration capabilities to meet “telework” requirements, many organizations are migrating to Microsoft Office 365 (O365) and other cloud collaboration services. Due to the speed of these deployments, organizations may not be fully considering the security configurations of these platforms. This Alert …

AA20-120A: Microsoft Office 365 Security Recommendations Read More »

Read More