Email Scams Cost Consumers $1.3 Billion in Past Year

Network security icon with graphic diagram on screen background. Computer defender and security concept.

Would you ignore an email from your boss? Scammers know you probably won’t. An in-depth investigative study by Better Business Bureau (BBB) finds that business email compromise scams are skyrocketing in frequency and have cost businesses and other organizations more than $3 billion since 2016.

This serious and growing fraud has tripled over the last three years, jumping 50% in the first three months of 2018 compared to the same period in 2017. In 2018, 80% of businesses received at least one of these emails. From 2016 through May 2019, the Internet Crime Complaint Center (IC3) received 58,571 complaints on BEC fraud, with reported losses in the U.S. totaling $3.1 billion. BBB’s report finds that the average BEC loss involving wire transfers is $35,000, while the average loss involving gift cards is $1,000 to $2,000. However, the cost to businesses can be much higher: Google and Facebook lost more than $100 million to BEC fraud before the perpetrator was arrested in 2017.

What is BEC fraud?

Business email compromise (BEC) fraud is an email phishing scam that typically targets people who pay bills in businesses, government and nonprofit organizations. It affects both big and small organizations, and it has resulted in more losses than any other type of fraud in the U.S., according to the Federal Bureau of Investigations (FBI).

BEC fraud takes many forms, but in essence, the scammer poses as a reliable source who sends an email from a spoofed or hacked account to an accountant or chief financial officer (CFO), asking them to wire money, buy gift cards or send personal information, often for a plausible reason. If money is sent, it goes into an account controlled by the con artist.

The FBI recognizes at least six types of activity as BEC or email account compromise (EAC) fraud, which differ based on who appears to be the email sender – a chief executive officer (CEO) asking the CFO to wire money to someone, a vendor or supplier requesting a change in invoice payment, executives requesting copies of employee tax information, senior employees seeking to have their pay deposited into a new bank account, an employer or clergyman asking the recipient to buy gift cards on their behalf, even a realtor or title company redirecting proceeds from a real estate sale into a new account. These targeted email phishing scams are sometimes called “spear phishing.”

The investigative study – “Is That Email Really From ‘The Boss?’ The Explosion of Business Email Compromise Scams (BEC)” – looks at the prevalence of BEC scams and the criminal systems that perpetrate them. It digs into the scope of the problem, who is behind it, the multi-pronged fight to stop it and the steps consumers can take to avoid it.

Who is behind this fraud?

According to BBB’s report, the majority of defendants who have been arrested or charged for BEC fraud in the U.S. over the last three years are of Nigerian origin. The report says 90% of BEC groups operate out of Nigeria, with other Nigerian fraud groups operating from the U.S., Canada and many other countries around the world.

How to protect your organization

Better Business Bureau urges businesses and other organizations to take the following technical precautions in order to protect themselves from BEC fraud.

  • Require multi-factor authentication. Examples include sending a text message with a code that must be entered to log in, answering a phone call to a number designated by the user or using thumbprints to unlock smartphones.
  • Change settings so that all emails coming from outside an organization are flagged with a warning. For example, one setting identifies emails from outside the organization, and when delivered, a line is added in red type stating: “This email comes from an external email address.”
  • Monitor email rules. In situations where someone has hacked into email accounts, fraudsters often set rules that automatically forward all emails to them and prevent the real email account owner from noticing.
  • Limit the number of times people can enter incorrect login information. This will stop brute force attacks that try many different passwords until they find one that works.
  • Verify changes in information about customers, employees or vendors. Crooks can log into online accounts and change account information, phone numbers and email or mailing addresses to ones they control. If an employee or vendor claims that their contact information has changed, ensure that the old contact information is no longer active by trying to reach the person using the old information.
  • Confirm requests by phone before acting.Most BEC fraud could probably be stopped if employees who were directed to send money simply called the person supposedly asking them to send money and ask them to confirm it. Emails aren’t sufficient to ensure you are talking to the right person. Pick up the phone or walk down the hall.
  • Train all employees in internet security. Busy executives may just label this “an IT issue” and leave it to the staff to handle. IT staff may not be aware of the scope of risks, and some IT measures require comprehensive staff training in order to be effective.

What to do if your organization has lost money to a BEC fraud

  • If an organization finds that it has been a victim of a BEC fraud, it needs to immediately call its bank to stop the payment and report it to the FBI. If a report is filed within 48 hours, there is a chance the money can be recovered.
  • Complain to the FBI’s Internet Crime Complaint Center. IC3 also asks people to report unsuccessful BEC attempts as well.
  • Report fraud to BBB Scam Tracker.

Source: BBB Serving Connecticut

Notice: you are using an outdated browser. Microsoft does not recommend using IE as your default browser. Some features on this website, like video and images, might not work properly. For the best experience, please upgrade your browser.