Skip to main content

The FBI issues warnings about an email scam that’s stolen more than $1.2 billion

FBI Cybercrime
FBI
The Federal Bureau of Investigations (FBI) put out a pair of warnings (1, 2) in recent weeks regarding a fraud scheme that involves email, wire transfers, checks, and international business. The target of these schemes are businesses that work with foreign suppliers and those that perform wire transfer payments.

The warnings state that since January, the number of victims has nearly tripled, at an increase of 270 percent. Victims have been reported in all 50 U.S. states and across 79 different countries. More than 8,000 victims and $800 million in losses later, the report dives into how social engineering and phishing have been the point of attack. Once the target is compromised (potentially you), the attacker conducts unauthorized transfers of funds, typically stealing through wire transfers. Once the international law enforcement reports are tallied into the figure, the losses total more than $1.2 billion. One of the biggest hauls on record comes from the networking company known as Ubiquiti Networks, which reports that cyber thieves stole $46.7 million with this scam.

Recommended Videos

Common methods, direct targets

The culprit here in most cases is phishing, and more specifically, spearphishing. The intended victim will receive a link with a malicious payload in their email, which will appear to come from a valid source. Once the victim clicks the link the malware is installed. Next thing you know, usernames, passwords, financial information, etc. is all theirs. The bottom line: If you work in international business, and you wire transactions, you might be a target.

Please enable Javascript to view this content

The FBI prescribes awareness and detection, as well as a few common sense things to avoid being a victim.

Possible ways to protect yourself, or your business:

  • Create intrusion detection system rules that flag emails with extensions that are similar to company email. For example, legitimate email of abc_company.com would flag fraudulent email of abc-company.com.
  • Register all company domains that are slightly different than the actual company domain.
  • Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign- off by company personnel.
  • Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the email request.
  • Know the habits of your customers, including the details of, reasons behind, and amount of payments.
  • Carefully scrutinize all email requests for transfer of funds to determine if the requests are out of the ordinary.

There’s a lot you can do on an individual basis along these same lines. Use two-factor authentication, change your passwords up verify all transactions, check all email links, and other tips could help you avoid losing $46.7 million.

John Casaretto
Former Digital Trends Contributor
John is the founder of the security company BlackCert, a provider of SSL digital certificates and encryption products. A…
PayPal vs. Venmo vs. Cash App vs. Apple Cash: which app should you use?
PayPal, Venmo, Cash App, and Apple Wallet apps on an iPhone.

We’re getting closer every day to an entirely cashless society. While some folks may still carry around a few bucks for emergencies, electronic payments are accepted nearly everywhere, and as mobile wallets expand, even traditional credit and debit cards are starting to fall by the wayside.

That means many of us are past the days of tossing a few bills onto the table to pay our share of a restaurant tab or slipping our pal a couple of bucks to help them out. Now, even those things are more easily doable from our smartphones than our physical wallets.

Read more
How to change margins in Google Docs
Laptop Working from Home

When you create a document in Google Docs, you may need to adjust the space between the edge of the page and the content --- the margins. For instance, many professors have requirements for the margin sizes you must use for college papers.

You can easily change the left, right, top, and bottom margins in Google Docs and have a few different ways to do it.

Read more
What is Microsoft Teams? How to use the collaboration app
A close-up of someone using Microsoft Teams on a laptop for a videoconference.

Online team collaboration is the new norm as companies spread their workforce across the globe. Gone are the days of primarily relying on group emails, as teams can now work together in real time using an instant chat-style interface, no matter where they are.

Using Microsoft Teams affords video conferencing, real-time discussions, document sharing and editing, and more for companies and corporations. It's one of many collaboration tools designed to bring company workers together in an online space. It’s not designed for communicating with family and friends, but for colleagues and clients.

Read more