<figure id="attachment_15062" aria-describedby="caption-attachment-15062" style="width: 350px" class="wp-caption alignright"><a href="https://www.fraudswatch.com/business-emails-compromise-2/" rel="attachment wp-att-15062"><img class="wp-image-15062 size-full" src="https://www.fraudswatch.com/wp-content/uploads/2015/10/Business-Emails-Compromise-1-1.jpg" alt="Business Emails Compromise" width="350" height="293" /></a><figcaption id="caption-attachment-15062" class="wp-caption-text"><em><strong>Business Emails Compromise</strong></em></figcaption></figure>
<p>This is an announcement with features on how to produce business for fraud based emails made by FBI.</p>
<p>This Public Service Announcement (PSA) is an update for the Business E-mail Compromise (BEC) PSA I-012215-PSA posted on <a href="http://www.ic3.gov/">www.IC3.gov</a> and includes new information and updated statistical data as of August 2015.</p>
<h3 id="definition" class="rb-heading-index-0-15061">DEFINITION</h3>
<p>Business Email Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.<sup>1</sup></p>
<p>Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices.</p>
<h3 id="statistical-data" class="rb-heading-index-1-15061">STATISTICAL DATA</h3>
<p>The BEC scam continues to grow and evolve and it targets businesses of all sizes. There has been a 270 percent increase in identified victims and exposed loss since January 2015. The scam has been reported in all 50 states and in 79 countries. Fraudulent transfers have been reported going to 72 countries; however, the majority of the transfers are going to Asian banks located within China and Hong Kong.</p>
<p>The following BEC statistics were reported to the Internet Crime Complaint Center from <b>October 2013 to August 2015:</b></p>
<table>
<tbody>
<tr>
<td>• Total U.S. Victims:</td>
<td>7,066</td>
</tr>
<tr>
<td>• Total U.S. exposed<sup>2</sup> dollar loss:</td>
<td>$747,659,840.63</td>
</tr>
<tr>
<td></td>
<td></td>
</tr>
<tr>
<td></td>
<td></td>
</tr>
<tr>
<td>• Total non-U.S. victims:</td>
<td>1,113</td>
</tr>
<tr>
<td>• Total non-U.S. exposed dollar loss:</td>
<td>$51,238,118.62</td>
</tr>
<tr>
<td></td>
<td></td>
</tr>
<tr>
<td></td>
<td></td>
</tr>
<tr>
<td>• Combined victims:</td>
<td>8,179</td>
</tr>
<tr>
<td>• Combined exposed dollar loss:</td>
<td>$798,897,959.25</td>
</tr>
</tbody>
</table>
<p>These totals, combined with those identified by international law enforcement agencies during this same time period, bring the BEC exposed loss to over $1.2 billion.</p>
<h3 id="recent-trends" class="rb-heading-index-2-15061">RECENT TRENDS</h3>
<p>There has been an increase in the number of reported computer intrusions linked to BEC scams. These intrusions can initially be facilitated through a phishing scam in which a victim receives an e-mail from a seemingly legitimate source that contains a malicious link. The victim clicks on the link, and it downloads malware, allowing the actor(s) unfettered access to the victim’s data, including passwords or <a class="wpil_keyword_link" href="https://www.fraudswatch.com/tag/financial-fraud/" title="financial" data-wpil-keyword-link="linked" data-wpil-monitor-id="484">financial</a> account information.</p>
<p>Three versions of the BEC scam were described in PSA I-012215-PSA. A fourth version of this scam has recently been identified, based on victim complaints. Victims report being contacted by fraudsters, who typically identify themselves as lawyers or representatives of law firms and claim to be handling confidential or time-sensitive matters. This contact may be made via either phone or e-mail. Victims may be pressured by the fraudster to act quickly or secretly in handling the transfer of funds. This type of BEC scam may occur at the end of the business day or work week or be timed to coincide with the close of business of international financial institutions.</p>
<h3 id="suggestions-for-protection" class="rb-heading-index-3-15061">SUGGESTIONS FOR PROTECTION</h3>
<p>Raised awareness of the BEC scam has helped businesses detect the scam before sending payments to the fraudsters. Some financial institutions reported holding their customer requests for international wire transfers for an additional period of time, to verify the legitimacy of the request.</p>
<p>Businesses reported using the following new measures for added protection:</p>
<ul>
<li>Create intrusion detection system rules that flag e-mails with extensions that are similar to company e-mail. For example, legitimate e-mail of <i>abc_company.com would flag fraudulent e-mail of abc-company.com</i>.</li>
<li>Register all company domains that are slightly different than the actual company domain.</li>
<li>Verify changes in vendor payment location by adding additional two-factor authentication such as having a secondary sign- off by company personnel.</li>
<li>Confirm requests for transfers of funds. When using phone verification as part of the two-factor authentication, use previously known numbers, not the numbers provided in the e-mail request.</li>
<li>Know the habits of your customers, including the details of, reasons behind, and amount of payments.</li>
<li>Carefully scrutinize all e-mail requests for transfer of funds to determine if the requests are out of the ordinary.</li>
</ul>
<p>Additional information is publicly available on the United States Department of Justice website <a href="http://www.ic3.gov/egress.aspx?u=http%3a%2f%2fwww.justice.gov&;h=0AE7E607C1CFE033FEEE21D4C8A2DA3A48038F00985D284B0B9CCBDF3E552D5E" target="_blank" rel="ext noopener">www.justice.gov</a> publication entitled <a href="http://www.ic3.gov/egress.aspx?u=http%3a%2f%2fwww.justice.gov%2fsites%2fdefault%2ffiles%2fopa%2fspeeches%2fattachments%2f2015%2f04%2f29%2fcriminal_division_guidance_on_best_practices_for_victim_response_and_reporting_cyber_incidents2.pdf&;h=5674F6DFE2D6CA72C3FDEA7860A05964F05C00CE96B2C436D58B65BB1E9D77EA" target="_blank" rel="ext noopener">&#8220;Best Practices for Victim Response and Reporting of Cyber Incidents&#8221;.</a></p>
<h3 id="what-to-do-if-you-are-a-victim" class="rb-heading-index-4-15061">WHAT TO DO IF YOU ARE A VICTIM</h3>
<p>If funds are transferred to a fraudulent account, it is important to act quickly:</p>
<ul>
<li>Contact your financial institution immediately upon discovering the fraudulent transfer.</li>
<li>Request that your financial institution contact the corresponding financial institution where the fraudulent transfer was sent.</li>
<li>Contact your local Federal Bureau of Investigation (FBI) office if the wire is recent. The FBI, working with the United States Department of Treasury Financial Crimes Enforcement Network, might be able to help return or freeze the funds.</li>
<li>File a complaint, regardless of dollar loss, with <a href="http://www.ic3.gov/">www.IC3.gov</a>.</li>
</ul>
<p>When contacting law enforcement or filing a complaint with IC3, it is important to identify your incident as “BEC” and also consider providing the following information:</p>
<ul>
<li>Originating business name</li>
<li>Originating financial institution name and address</li>
<li>Originating account number</li>
<li>Beneficiary name</li>
<li>Beneficiary financial institution name and address</li>
<li>Beneficiary account number</li>
<li>Correspondent bank if known or applicable</li>
<li>Dates and amounts transferred</li>
<li>IP and/or e-mail address of fraudulent e-mail</li>
</ul>
<p>Detailed descriptions of BEC incidents should include but not be limited to the following when contacting law enforcement:</p>
<ul>
<li>Date and time of incidents</li>
<li>Incorrectly formatted invoices or letterheads</li>
<li>Requests for secrecy or immediate action</li>
<li>Unusual timing, requests, or wording of the fraudulent phone calls or e-mails</li>
<li>Phone numbers of the fraudulent phone calls</li>
<li>Description of any phone contact, including frequency and timing of calls</li>
<li>Foreign accents of the callers</li>
<li>Poorly worded or grammatically incorrect e-mails</li>
<li>Reports of any previous e-mail phishing activity</li>
</ul>
<p> ;</p>
<ol>
<li>This definition was revised to emphasize the different techniques used to compromise victim e-mail accounts.</li>
<li>Exposed dollar loss includes actual and attempted loss in United States dollars.</li>
</ol>

2015 BUSINESS EMAIL: No Longer Safe

Business Emails Compromise
FraudsWatch is а site reporting on fraud and scammers on internet, in financial services and personal. Providing a daily news service publishes articles contributed by experts; is widely reported in thе latest compliance requirements, and offers very broad coverage of thе latest online theft cases, pending investigations and threats of fraud.
Leave a Comment


The Ultimate Guide to Avoiding Online Scams
Stay safe online! Our comprehensive 2025 guide covers phishing, AI scams, investment fraud & more. Learn red flags, prevention steps & how to report scams. Protect yourself now via Fraudswatch.com.
Read More
Categories
- AOL Aim Live ATT
- Celebrities Scammed
- Credit Card
- Credit Scam
- Email Man-Male Scammers
- Email Scam List
- Email Scams Examples
- Fraud
- Fraud News From World
- Fraud Prevention
- Gmail.com
- Hotmail.com
- Insurance
- Jobsearch Scams
- Loans
- Military Scammer
- Mortgage
- Nigerian 419
- Report Fraud
- Romance Scammer
- Russian Email Scam
- Scammer
- Scams Ways
- Shopping & Saving Money
- Spam
- White-Collar Crime
- Yahoo.com
Recent Posts
- The Unseen Battlefield: Your Definitive 2025 Guide to Advanced Scam Detection July 9, 2025
- Bulletproof Betrayal: Inside the $5.2 Million ShotStop Fraud That Sold Counterfeit Body Armor to America’s Law Enforcement July 8, 2025
- The Weapon of Experience: Inside the $28M Memphis Pharmacy Fraud and a Prior Conviction at the Heart of a Record-Breaking National Takedown July 2, 2025
- Chicago Businessman Convicted in $55 Million Fraud Scheme Targeting COVID-19 Relief Funds and Financial Institutions July 2, 2025
- Betrayal in the Classroom: An In-Depth Analysis of the Unprecedented Criminal Charges Against the School District of Philadelphia for Asbestos Failures June 28, 2025
Tags
Bank Fraud
Banking Fraud
Bankruptcy Fraud
Bribery Scheme
Business Fraud
Celebrities Scammed
Charity Fraud
Commodities Fraud
Consumer Fraud
Consumer Protection
COVID-19 relief fraud
Credit
Credit card
Credit Card Fraud
Credit Repair
Credit Repair Scams
Crime
Cyber Crime
Cybercrime
Cyber Criminals
Cybersecurity
data breach
Dating Scammer
Elder Fraud
Elder Justice
Email
Email Letter
Email Scam
Email Scam Examamples
Email Scam Example
Email Scam Examples
Email Scams
Email Scams Examples
False Claims Act
FBI
Fedex
Financial Crime
Financial Fraud
Fraud
fraud prevention
Fraud Scheme
Health
Health and Wellness Scams
Health Care Fraud
Healthcare Fraud
Identity Theft
Immigration Fraud
Insurance
Insurance Fraud
Internet Fraud
Investment Fraud
job
Job Scam
job scams
Loan
Loan Fraud
Loan Scam
Loans Fraud
Lottery Scam
Mail Fraud
Medicare Fraud
Microsoft
Military Scammer
Military Scammer LT. JEFFREY MILLER
Military Scammers
Money Laundering
Money Laundering Scheme
Mortgage
Mortgage Fraud
Mortgage Scam
Mortgage Scams
National Security
Nigerian
Nigerian 419
Nigerian Scam
online fraud
Online Scams
PayPal
personal information
Phishing
Phishing Scams
Ponzi Scheme
Public Corruption
Ransomware
Report Fraud
Romance Scam
Romance Scammer
Romance Scammers
Romance Scams
Scam
Scammer
Scammers
scams
Securities Fraud
spam
Tax Evasion
Tax Fraud
Travel Scams
White Collar Crimes
wire fraud