The company had been working with a long-standing customer who they communicated with via email. Invoices, purchase orders and payment confirmations all came through business email accounts, which unfortunately created the perfect opening for a sophisticated cybercriminal group.
The attackers executed the following business email compromise (BEC) scheme.
- The fraudsters gained access to the email account of an Accounts Receivable employee through a phishing email disguised as a legitimate internal IT alert.
- Once inside the account, the attackers monitored email exchanges for weeks, learning the company's processes, payment schedules and even the tone and language used in the emails.
- When it was time to pay an invoice, the attackers struck. They sent an email to the customer mimicking the Accounts Receivable employee with a slight change to the email address, instructing them to send the payment to a new bank account—one controlled by the fraudsters.
- The customer, who was familiar with the employee and the tone of the communication, saw no reason to doubt the request. He sent the payment. Thankfully, his treasury team did a review of the bank account information and determined it was for an offshore account. They were able to stop the payment – but if they hadn’t, that account could have become untraceable within hours.