Fraudulent electronic fund transfers are big headaches for businesses and individuals alike. Thanks to sudden and dramatic increases in internet payments during the pandemic, fund transfer fraud also spiked rapidly. In late 2022, the FBI presented a report to Congress on Business Email Compromise stating that BEC-related losses for 2021 topped $2.4 billion, making it one of the fastest-growing categories of global cybercrime (https://www.fbi.gov/file-repository/fy-2022-fbi-congressional-report-business-email-compromise-and-real-estate-wire-fraud-111422.pdf/view). Unfortunately, there’s no way to stop all cybercrime, but we can and should take precautions to reduce opportunities for scammers to pick our proverbial pockets. Here are Digital Mountain’s suggestions:
Eliminate the Human Factor
Many fraudulent transfers begin with a social engineering phishing or whaling attack. With the proliferation of social networking accounts sharing occupations, titles, organization affiliations, and contact information, scammers can easily target employees by impersonating management and executive staff. That doesn’t mean you should shut down your social networking accounts; there are other sources through which a determined scam artist can find an organization’s information (website, press articles, industry associations, etc.). Beyond spam filtering software, we recommend the following six steps to reduce human error in email security:
Keep Scammers Out of Your Email
Stopping scammers from accessing bank account information is often a matter of keeping phishing emails out of your email system. By ensuring that your email server has proactive security settings enabled, you can reduce the chances that a cybercriminal will sneak in.
Sender Policy Framework (SPF): SPF is a basic gatekeeper on the Outgoing Mail Server that also verifies that the domain from which the email is being sent is an approved domain. With SPF enabled, you can restrict emails being sent to only those from domains that your organization uses for email messaging.
Domain Keys Identified Mail (DKIM): DKIM relies on an encrypted signature, assigned by the sender’s email server, to verify that the owner of the domain authorized that mail transmission. With DKIM in place, a hash value is assigned automatically to the original message, basically locking in the content and header information. DKIM is hard to fool because the hash value signature is generated automatically, encrypted, and invisible to the end user.
Domain-based Mail Authentication Reporting and Conformance (DMARC): With SPF and DKIM in place, DMARC is the protocol that answers the question: Block, Quarantine, or Distribute? DMARC relies upon the results of SPF and DKIM to complete its mission, so if the message passes those tests, it’s probably going to end up in the user’s inbox.
Banking (Cyber) Securely
Moving money is easier and faster thanks to internet-enabled banking functions. However, fast and easy doesn’t mean safe. Automated Clearing House (ACH) payments, which originate with the requester (payee), not the payor, are rich targets for cybercriminals. With the correct banking details frequently obtained by email scams, cybercriminals create payment demands that most banks will honor before alerting you to the request. ACH transfers operate on the assumption that you authorized the requesting party to remove regular or one-time payments. Business accounts may have only 24 or 48 hours to report a fraudulent ACH payment for any chance of reimbursement, and even then, there’s no hard and fast rule as to what the banking institution must do in response. Organizations and individuals can do more to protect their accounts from being accessed fraudulently:
When BEC leads to fraudulent electronic transfers, it represents a critical undermining of an organization’s comprehensive security goals. Once an organization’s email system and financial accounts are accessed by malicious actors, there’s every reason to call your financial institution to mitigate the financial losses. Here at Digital Mountain, we can help restore security measures, and assess and address remaining vulnerabilities. However, don’t delay taking some proactive steps to prevent BEC and banking fraud. A penny saved from a fraudulent wire transfer is still a penny earned.