Cyber Alert: Business Email Compromise Schemes Increasing

Porter Hedges LLP

Porter Hedges LLP

We’ve all heard the sad story: A transaction is about to close. The buyer is preparing to wire funds to the seller. Unbeknownst to the buyer, a hacker has hijacked the parties’ email communications to replace the wiring instructions with phony instructions to send the wire to the hacker’s bank account. The buyer wires the funds to the hacker. The buyer’s elation at closing the acquisition turns to panic when the seller reports a day later that it never received the wire.

According to the FBI’s Internet Crime Compliance Center (IC3), this scheme is known as “business email compromise,” and it’s on the rise. In its Internet Crime Report 2020, the FBI reports that it received 19,369 business email compromise/email account compromise complaints in 2020. How much was lost to hackers – $1.8 billion. The FBI IC3 Recovery Asset Team has succeeded in recouping some of these losses (see id. at 11), but the victims still suffer embarrassment, costs, and management distraction even if successful.

So, how do you avoid these schemes? The FBI reports that hallmarks include spoofed emails from counterparties and spoofed emails from the lawyers on the transaction. Other indicators include twisted domain names that change just one or two letters of the parties’ or counsel’s email domains and banks that are located in foreign countries or that differ from institutions previously discussed between the parties.

Deal closings aren’t the only transactions where you may see these hallmarks. The FBI reports that hackers use these same tactics to hijack payroll funds by spoofing emails from employees to ask for changes to direct deposits.

What is your best defense?

Here are four essential steps to avoid business email compromise:

  1. Assume that unencrypted emails are unsecure. These are 99.9% of the emails you deal with.
  2. Don’t use email to communicate financial account information or wire instructions. Call the other party to communicate the instructions. Separate wiring instructions from details about the amounts to be wired or descriptions of the transaction.
  3. Never redirect a wire to a new bank without verifying the change in a phone call with the intended recipient. Call only a trusted phone number for the other party (not a phone number listed in an email, which may be compromised).
  4. Take extra care to verify recipient and sender email addresses and domain names. Email spoofs and domain name twists are subtle and can easily be missed, especially on mobile devices that don’t always show the full email address.

What do you do if your funds get hijacked?

As soon as you recognize the transfer is compromised, the FBI advises:

  • Contact your IT Department and cybersecurity insurer immediately to report the incident.
  • Contact the originating bank to request a recall or reversal and a Hold Harmless Letter or Letter of Indemnity.
  • File a detailed business email compromise complaint with the IC3. Make sure to complete all fields in the complaint form.

Outside counsel is also a resource for preventing fraud and recovery from it.

Finally, to keep updated on business email compromise trends and other cyber fraud schemes, visit the IC3’s industry alerts and public service announcements and the FBI’s Scams and Safety alerts. Awareness and vigilance are the first lines of defense.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Porter Hedges LLP | Attorney Advertising

Written by:

Porter Hedges LLP

Porter Hedges LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.