Cyber wire transfer fraud alert issued to Cayman Islands
Actors use the compromised account or a spoofed account to send wire transfer instructions. The funds are then sent to other countries all over the world.
Wire transfer fraud usually involves the compromise of or representation of an e-mail account belonging to a business’ CEO/CFO, in order to send an e-mail to an employee with the ability to conduct wire transfers. Additionally, other frauds involve the compromise of a vendor/supplier’s e-mail account with the intention of modifying the bank account associated with that vendor/supplier. The latter scheme may also be labelled as vendor fraud and involves a last minute change of the bank and account number for future payments.
Actors can compromise the legitimate business e-mail accounts through social engineering or malware. They conduct reconnaissance to review the business’ legitimate e-mail communications and travel schedules. Actors can also auto-forward e-mails received by the victim to an e-mail account under their control. This reconnaissance stage lasts until the actor feels comfortable enough to send wire transfer instructions using either the victim’s e-mail or a spoofed e-mail account that is controlled by the actor. The difference in the spoofed e-mail account is very subtle and can easily be mistaken for the legitimate business e-mail address.
Method
The actors utilise multiple methods to ensure their e-mail communications are successful. In some instances, actors will create rules using the compromised business e-mail account to send all communications associated with the actor’s activity to the trash folder or to a hidden folder the victim is unaware of. A common theme in the CEO/CFO scheme is that the actors wait until the CEO/CFO is on official travel before sending wire transfer instructions, making it more likely that the individual would use e-mail for official business and therefore harder to verify the transaction as fraudulent. These requests will sometimes state that the wire transfer is related to urgent or confidential matters and must not be discussed with any other company personnel.
How to Mitigate Your Risk
The key to reducing the risk from this type of cyber fraud is to understand the criminals’ techniques and deploy effective financial transaction/payment risk mitigation processes. There are various methods to reduce the risk of falling victim to this scam and subsequently executing a fraudulent wire transfer. Some of these methods include:
l Verifying a change in payment instructions to a vendor or supplier by calling to verbally confirm the request (the phone number should not come from the electronic communication, but should instead be taken from a known contact list for that vendor);
l Maintaining a file, preferably in non-electronic form, of vendor contact information for those who are authorised to approve changes in payment instructions;
l Limiting the number of employees within a business who have the authority to approve and/or conduct wire transfers;
l Using out of band authentication to verify wire transfer requests that are seemingly coming from executives. This may include calling the executive to obtain verbal verification, establishing a phone Personal Identification Number (PIN) to verify the executive’s identity, or sending the executive via text message a one-time code and a phone number to call in order to confirm the wire transfer request;
l Requiring dual-approval for any wire transfer request involving:
o A dollar amount over a specific threshold; and/or
o Trading partners who have not been previously added to a “white list” of approved trading partners to receive wire payments; and/or
o Any new trading partners; and/or
o New bank and/or account numbers for current trading partners; and/or
o Wire transfers to countries outside of the normal trading patterns.
Incident Reporting
1. CIRT-KY encourages victims of cyber-crime to contact the police station and CIRT-KY at [email protected]
2. Timing is critical. If notified immediately, CIRT-KY and law enforcement can work with you to increase the chance of recovering the stolen funds and limiting further risk.
3. When reporting, be prepared to provide a general description of this crime, how it occurred, losses experienced, and wiring instructions.
4. Money Laundering Reporting Officers, financial institutions’ compliance or anti-money laundering team(s) should submit a Suspicious Activity Reports (SAR) to the Financial Reporting Unit as required by Law.
END
IMAGE: www.fr.com