Wait, don’t pay that invoice!

Wait, don’t pay that invoice!

The FBI has issued a warning about a scam that tricks employees into paying invoices that appear legit, but are actually fraudulent. This scam, named the Business E-mail Scam (BEC), has caught the U.S. Government’s eye because of its increasing popularity.

In the past 14 months, reported victims of BEC rip-offs have lost over $200 million. And remember that as my co-founder wrote in Forbes last year, when a business is the victim of wire fraud, you can't always count on the banks making good again.

How it works

In one version of the scam, criminals learn who your company’s vendors are. They do this in a variety of ways, including spyware installed during an employee’s work or personal browser session. Once the thieves know your vendors they spoof those firms’ email addresses and invoice payment from you.

In another scenario, the scammer either spoofs or hacks into the account of your CEO or other senior officer. From that account the thief sends a message to an employee, asking them to pay to a vendor’s invoice. The email includes a link to complete the payment, but that link transfers the money straight into a criminal’s bank account.

In the third version of the BEC scam, the personal email of your vendor’s employee is hacked. The criminal then sends emails to you and the vendor’s other customers, invoicing for payments. Again, the payment links in the emails are connected to the crook’s bank account.

The second and third scenarios described above are especially scary because the email account requesting the fraudulent payment might be a completely legitimate address.

We all know crooks are getting smarter. Using complicated methods they can learn the details of your vendor relationships and hide behind the email account of anyone in your company. To pull off scams like BEC, criminals often hack browsers as a starting point to gain information and slither into your network.

Protect ya neck!

Keep in mind, it’s not just your work machines’ browsers that leave your company vulnerable. Your employees use their personal computers’ browsers to do work. It’s this combination of personal browsing at work and work browsing on personal machines that puts your network and email accounts at risk. Your responsibility to protect your network also includes helping staff be safe on their personal web sessions and email exchanges.

One solution is education and training. Teach workers to check sender email addresses and keep an eye out for unusual invoice requests. In addition, we recommend creating a protocol of telephone or face-to-face verification before someone pays an invoice, and many websites will offer 2-factor authentication to add another layer of security.

A technology solution is also essential -- something that safeguards your staff’s connection to the Internet both inside and outside the office. This can be accomplished by installing a secure browser that serves as the exclusive link to your business apps and email. Secure browsers insulate potentially dangerous web code in a sandbox, preventing infection from malware. It’s even better if your secure browser stores long, complex, encrypted passwords in a lockbox in the cloud, rather than on employees’ local hard drives. The browser should also delete cookies (and malware) the moment the Internet session ends.

Secure browsers are ideal, but some folks at your company might prefer to continue using their familiar old browsers. No problem. That challenge is solved with a secure cloud-based browser that seamlessly launches only when those employees link to a work account or launch a business app. Your staff are happy because they can do most of their surfing in their favorite browsers. Meanwhile, your network stays secure.

When it comes to keeping track of scams, the FBI’s updates are invaluable. Yet some firms won’t heed the warnings. They’ll soon find themselves victims of BEC and other ripoffs. Luckily, you can take steps to make sure you’re not one of them.

Tools can help, but the first solution you mention is the most important. Every medium to large company should offer (and require) training in social engineering "defense."

Like
Reply

Good reminder. Training is good. Automated secure browsers - like yours - are better.

Like
Reply

Slippery characters out there!

Like
Reply

To view or add a comment, sign in

More articles by Scott Petry

  • So Much Leaking.

    In the wake of the devastating WannaCry and NotPetya ransomware campaigns, it was hard to imagine that things could get…

    3 Comments
  • Why the Architecture of the Web Puts Today's World at Risk

    The Internet is based on protocols that assume content is secure. We need a new, more realistic model.

    16 Comments
  • ISPs & Privacy: Why it Matters, and How to Cover Your A$$

    Both the US Senate and the House of Representatives have cleared the way to remove privacy rules for internet service…

  • What They Really Do With Your Medical Data (Book Review)

    Happy Data Privacy Day. A new book provides an in-depth look at the commercial trade in patient medical data.

    1 Comment
  • Face Your Worst Cyber Security Fears

    Survey results: What cyber security issues scare people most? "There is a time to take counsel of your fears," General…

  • Malware Targeting Energy Utilities Avoids AV Products

    …and so should we. At least that’s my take after looking into various reports about a particularly aggressive malware…

    2 Comments
  • Personal Email at Work - the "Hillary Factor"

    Hillary Clinton’s personal email workarounds during her term as Secretary of State have received much scrutiny in…

  • Industrial Control Systems (ICS) Under Attack

    Did you read Booz Allen Hamilton’s newest Industrial Cybersecurity Threat Briefing [PDF] yet? If you are an IT security…

  • Smart Nation. Dumb Move.

    Singapore is awesome. Since starting Authentic8, I haven’t been back, but I was lucky enough to visit regularly in…

    3 Comments
  • Credential Management: Did We Learn Anything?

    Online credential management as we know it is not secure and doesn’t work. How else would we explain that weak, default…

Others also viewed

Explore content categories